[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[sipgate Adminteam] Betreff: [SECURITY] [DSA 3178-1] unace security update



##- Bitte geben Sie Ihre Antwort über dieser Zeile ein. -##

Deine Anfrage (# 2976) wurde aktualisiert. Um darauf zu antworten, antworte einfach auf diese Mail.

SmartList

SmartList

3. März, 14:53

Your message was not posted to the debian-security-announce mailing list.
It has instead been forwarded to the security team and the listmaster team.

The debian-security-announce list is a moderated mailing list on
which security-related announcements are made by the security team for
Debian GNU/Linux.

Here are the email addresses that you should contact about
security-related questions with Debian:

* security@debian.org
will reach only the security team

* debian-private@lists.debian.org
will reach most Debian developers

* team@security.debian.org
will reach only the security team

If you simply want to subscribe to the debian-security-announce list,
please send an email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "subscribe", and follow the procedure you'll receive.

--
Thanks,
Debian Security Officers

--
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

Frank Menz

Frank Menzel (sipgate Adminteam)

3. März, 14:45

Haben wir nicht, sagt dpkg-info

Debian-sec

Debian-security

2. März, 21:53

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3178-1 security@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
March 02, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : unace
CVE ID : CVE-2015-2063
Debian Bug : 775003

Jakub Wilk discovered that unace, an utility to extract, test and view
.ace archives, contained an integer overflow leading to a buffer
overflow. If a user or automated system were tricked into processing a
specially crafted ace archive, an attacker could cause a denial of
service (application crash) or, possibly, execute arbitrary code.

For the stable distribution (wheezy), this problem has been fixed in
version 1.2b-10+deb7u1.

For the upcoming stable distribution (jessie), this problem has been
fixed in version 1.2b-12.

For the unstable distribution (sid), this problem has been fixed in
version 1.2b-12.

We recommend that you upgrade your unace packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=MznR
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: https://lists.debian.org/E1YSXFF-0005Ew-SE@master.debian.org

Diese E-Mail ist ein Service von sipgate Adminteam. Bereitgestellt von Zendesk.
Message-Id:67N3S4V3_54f5bcc638cf5_6b4f3fbe5a0cd32c9522e5_sprut

Reply to: