[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [SECURITY] [DSA 2549-1] devscripts security update



~smi~ s Vaughn

Raphael Geissert <geissert@debian.org> wrote:

>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>- -------------------------------------------------------------------------
>Debian Security Advisory DSA-2549-1                   security@debian.org
>http://www.debian.org/security/                          Raphael Geissert
>September 15, 2012                     http://www.debian.org/security/faq
>- -------------------------------------------------------------------------
>
>Package        : devscripts
>Vulnerability  : multiple
>Problem type   : local (remote)
>Debian-specific: no
>CVE ID         : CVE-2012-2240 CVE-2012-2241 CVE-2012-2242 CVE-2012-3500
>
>Multiple vulnerabilities have been discovered in devscripts, a set of
>scripts to make the life of a Debian Package maintainer easier.
>The following Common Vulnerabilities and Exposures project ids have
>been assigned to identify them:
>
>CVE-2012-2240:
>
>    Raphael Geissert discovered that dscverify does not perform
>    sufficient validation and does not properly escape arguments to
>    external commands, allowing a remote attacker (as when dscverify is
>    used by dget) to execute arbitrary code.
>
>CVE-2012-2241:
>
>    Raphael Geissert discovered that dget allows an attacker to delete
>    arbitrary files when processing a specially-crafted .dsc or
>    .changes file, due to insuficient input validation.
>
>CVE-2012-2242:
>
>    Raphael Geissert discovered that dget does not properly escape
>    arguments to external commands when processing .dsc and .changes
>    files, allowing an attacker to execute arbitrary code.
>    This issue is limited with the fix for CVE-2012-2241, and had
>    already been fixed in version 2.10.73 due to changes to the code,
>    without considering its security implications.
>
>CVE-2012-3500:
>
>    Jim Meyering, Red Hat, discovered that annotate-output determines
>    the name of temporary named pipes in a way that allows a local
>    attacker to make it abort, leading to denial of service.
>
>
>Additionally, a regression in the exit code of debdiff introduced in
>DSA-2409-1 has been fixed.
>
>For the stable distribution (squeeze), these problems have been fixed in
>version 2.10.69+squeeze4.
>
>For the testing distribution (wheezy), these problems will be fixed
>soon.
>
>For the unstable distribution (sid), these problems will be fixed in
>version 2.12.3.
>
>We recommend that you upgrade your devscripts packages.
>
>Further information about Debian Security Advisories, how to apply
>these updates to your system and frequently asked questions can be
>found at: http://www.debian.org/security/
>
>Mailing list: debian-security-announce@lists.debian.org
>-----BEGIN PGP SIGNATURE-----
>Version: GnuPG v1.4.12 (GNU/Linux)
>
>iEYEARECAAYFAlBUxE4ACgkQYy49rUbZzlpq0ACfaegRy0LXMZmnnJ/fwi2PH1iB
>5XcAnjbRtMlPy1+PASvWy4/DI+Zm3PuR
>=VmvQ
>-----END PGP SIGNATURE-----
>
>
>-- 
>To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
>with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
>Archive: http://lists.debian.org/201209151309.18182.geissert@debian.org
>

Reply to: