Operating System:

[Debian]

Published:

25 January 2023

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.0437
                           swift security update
                              25 January 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           swift
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-47950  

Original Bulletin: 
   http://www.debian.org/security/lts/2023/dla-3281

Comment: CVSS (Max):  7.7 CVE-2022-47950 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)
         CVSS Source: Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -----------------------------------------------------------------------
Debian LTS Advisory DLA-3281-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Utkarsh Gupta
January 25, 2023                            https://wiki.debian.org/LTS
- - -----------------------------------------------------------------------

Package        : swift
Version        : 2.19.1-1+deb10u1
CVE ID         : CVE-2022-47950
Debian Bug     : 1029200

Sebastien Meriot discovered that the S3 API of Swift, a distributed
virtual object store, was susceptible to information disclosure.

For Debian 10 buster, this problem has been fixed in version
2.19.1-1+deb10u1.

We recommend that you upgrade your swift packages.

For the detailed security status of swift please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/swift

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=cPyy
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=Deq+
-----END PGP SIGNATURE-----