|               Debian-security                            2. März, 21:53                 -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512
     - -------------------------------------------------------------------------Debian Security Advisory DSA-3178-1                   security@debian.org
 http://www.debian.org/security/                      Salvatore Bonaccorso
 March 02, 2015                         http://www.debian.org/security/faq
 - -------------------------------------------------------------------------
     Package        : unaceCVE ID         : CVE-2015-2063
 Debian Bug     : 775003
     Jakub Wilk discovered that unace, an utility to extract, test and view.ace archives, contained an integer overflow leading to a buffer
 overflow. If a user or automated system were tricked into processing a
 specially crafted ace archive, an attacker could cause a denial of
 service (application crash) or, possibly, execute arbitrary code.
     For the stable distribution (wheezy), this problem has been fixed inversion 1.2b-10+deb7u1.
     For the upcoming stable distribution (jessie), this problem has beenfixed in version 1.2b-12.
     For the unstable distribution (sid), this problem has been fixed inversion 1.2b-12.
     We recommend that you upgrade your unace packages.       Further information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can be
 found at: https://www.debian.org/security/
     Mailing list: debian-security-announce@lists.debian.org-----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1
     iQIcBAEBCgAGBQJU9Mw0AAoJEAVMuPMTQ89EIMkP/1QVDTGcBl37MhPpON76e0ikjLipT0szpX9/14wdZZzumZa673rlNXi9fC9YHlGVxolsT24hETJo9EIyrspksQiW
 eSp9hqXr6l5qsfdEmY8JChR3/UOPM9dQ0giRSefjjvgwpHGDeC1Laqa1Oa0V3AOf
 U9DjmFg50YK64CAKX2aDdhKOtbaVS2FyVqpEzH844hCqTm8QwiSp1pBSo4o/i87w
 FzB57NKIih1qmDpGRaCKKsehg1CGzic6CnNRnie4L89gVT1fvHd7lalHQF/HuTaq
 RSO7DiuF3czU+LVwQt/KxlqyUhCiT5XG9v/W6fl3uBOoy5sWuuuRDBWHHPciR9ns
 Jzw17jw5asL4OcHsq5GL3H4Ax228eU2GtWwzJyFErW5w9SHfnts2HUP7r+7qEWf8
 YJIyaqsczKIWep7BrX37BWd9x+fc1ei1XzgychgaQNgJrrGORjpuBd+ow1qhXHC1
 GmplBwTzHYmZKeYsRczb3E0Mm5n9kP/tsnLD0spNXK8DclhpxsWOw5EC+GRc+QDu
 aOpVDZi3K9/fpRky+vZJlMg+vMnqxG8KKwoSbXWq/uuwgYUaZUQUKiKRTUlrYRl2
 RAVsjA93cx4yq5gcYX715p923I991YflVkvz38RhbrmRzaQPN153NMnx6XLO+fpR
 fT88TocQH3F2YdgqjaLV
 =MznR
 -----END PGP SIGNATURE-----
     --
 To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
 with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
 Archive: https://lists.debian.org/E1YSXFF-0005Ew-SE@master.debian.org
 |