|                            Debian-security                                        2. März, 21:53                                                       -----BEGIN PGP SIGNED MESSAGE-----   Hash: SHA512         - -------------------------------------------------------------------------   Debian Security Advisory DSA-3178-1                   security@debian.org http://www.debian.org/security/                      Salvatore Bonaccorso   March 02, 2015                         http://www.debian.org/security/faq   - -------------------------------------------------------------------------         Package        : unace   CVE ID         : CVE-2015-2063   Debian Bug     : 775003         Jakub Wilk discovered that unace, an utility to extract, test and view   .ace archives, contained an integer overflow leading to a buffer   overflow. If a user or automated system were tricked into processing a   specially crafted ace archive, an attacker could cause a denial of   service (application crash) or, possibly, execute arbitrary code.         For the stable distribution (wheezy), this problem has been fixed in   version 1.2b-10+deb7u1.         For the upcoming stable distribution (jessie), this problem has been   fixed in version 1.2b-12.         For the unstable distribution (sid), this problem has been fixed in   version 1.2b-12.         We recommend that you upgrade your unace packages.         Further information about Debian Security Advisories, how to apply   these updates to your system and frequently asked questions can be   found at: https://www.debian.org/security/         Mailing list: debian-security-announce@lists.debian.org   -----BEGIN PGP SIGNATURE-----   Version: GnuPG v1         iQIcBAEBCgAGBQJU9Mw0AAoJEAVMuPMTQ89EIMkP/1QVDTGcBl37MhPpON76e0ik   jLipT0szpX9/14wdZZzumZa673rlNXi9fC9YHlGVxolsT24hETJo9EIyrspksQiW   eSp9hqXr6l5qsfdEmY8JChR3/UOPM9dQ0giRSefjjvgwpHGDeC1Laqa1Oa0V3AOf   U9DjmFg50YK64CAKX2aDdhKOtbaVS2FyVqpEzH844hCqTm8QwiSp1pBSo4o/i87w   FzB57NKIih1qmDpGRaCKKsehg1CGzic6CnNRnie4L89gVT1fvHd7lalHQF/HuTaq   RSO7DiuF3czU+LVwQt/KxlqyUhCiT5XG9v/W6fl3uBOoy5sWuuuRDBWHHPciR9ns   Jzw17jw5asL4OcHsq5GL3H4Ax228eU2GtWwzJyFErW5w9SHfnts2HUP7r+7qEWf8   YJIyaqsczKIWep7BrX37BWd9x+fc1ei1XzgychgaQNgJrrGORjpuBd+ow1qhXHC1   GmplBwTzHYmZKeYsRczb3E0Mm5n9kP/tsnLD0spNXK8DclhpxsWOw5EC+GRc+QDu   aOpVDZi3K9/fpRky+vZJlMg+vMnqxG8KKwoSbXWq/uuwgYUaZUQUKiKRTUlrYRl2   RAVsjA93cx4yq5gcYX715p923I991YflVkvz38RhbrmRzaQPN153NMnx6XLO+fpR   fT88TocQH3F2YdgqjaLV   =MznR   -----END PGP SIGNATURE-----            --    To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org   with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org   Archive: https://lists.debian.org/E1YSXFF-0005Ew-SE@master.debian.org                                      |