From dbaca6d9dde54227f5f4e1f09f103c88a00ba522 Mon Sep 17 00:00:00 2001 From: Chris Lamb Date: Thu, 9 Apr 2020 12:30:40 +0100 Subject: Add DLA-2171-1. Signed-off-by: Holger Levsen --- english/lts/security/2020/dla-2171.data | 9 +++++++++ english/lts/security/2020/dla-2171.wml | 27 +++++++++++++++++++++++++++ 2 files changed, 36 insertions(+) create mode 100644 english/lts/security/2020/dla-2171.data create mode 100644 english/lts/security/2020/dla-2171.wml diff --git a/english/lts/security/2020/dla-2171.data b/english/lts/security/2020/dla-2171.data new file mode 100644 index 00000000000..0aa4dc393fb --- /dev/null +++ b/english/lts/security/2020/dla-2171.data @@ -0,0 +1,9 @@ +DLA-2171-1 ceph +2020-04-09 +CVE-2020-1760 +ceph +yes +yes +no + +#use wml::debian::security diff --git a/english/lts/security/2020/dla-2171.wml b/english/lts/security/2020/dla-2171.wml new file mode 100644 index 00000000000..dd7270d7247 --- /dev/null +++ b/english/lts/security/2020/dla-2171.wml @@ -0,0 +1,27 @@ +LTS security update + + +

It was discovered that there was a header-splitting vulnerability in ceph, a +distributed storage and file system.

+ +
    + +
  • CVE-2020-1760 + +

    header-splitting in RGW GetObject has a possible XSS

  • + +
+ +

For Debian 8 Jessie, these problems have been fixed in version +0.80.7-2+deb8u4.

+ +

We recommend that you upgrade your ceph packages.

+ +

Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: https://wiki.debian.org/LTS

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2020/dla-2171.data" +# $Id: $ -- cgit v1.2.3