Login-Name Passwort


Sicherheit: Ausführen beliebiger Kommandos in picocom
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in picocom
ID: FEDORA-2017-ac7fc2fd8c
Distribution: Fedora
Plattformen: Fedora 25
Datum: Mo, 12. Juni 2017, 07:30
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9059
Applikationen: picocom


Fedora Update Notification
2017-06-11 16:12:43.870326

Name : picocom
Product : Fedora 25
Version : 2.2
Release : 2.fc25
URL : https://github.com/npat-efault/picocom
Summary : Minimal serial communications program
Description :
As its name suggests, [picocom] is a minimal dumb-terminal emulation
program. It is, in principle, very much like minicom, only it's
instead of "mini"! It was designed to serve as a simple, manual, modem
configuration, testing, and debugging tool. It has also served (quite
well) as a low-tech "terminal-window" to allow operator intervention
in PPP connection scripts (something like the ms-windows "open
terminal window before / after dialing" feature). It could also prove
useful in many other similar tasks. It is ideal for embedded systems
since its memory footprint is minimal (less than 20K, when

Update Information:

Upgrade to 2.2, fixing CVE-2015-9059

[ 1 ] Bug #1456399 - CVE-2015-9059 picocom: Command injection in the
"send and receive file" command [fedora-all]

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade picocom' at the command line.
For more information, refer to the dnf documentation available at

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Unterstützer werden
Neue Nachrichten