drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in lsyncd
Name: |
Ausführen beliebiger Kommandos in lsyncd |
|
ID: |
DSA-3130-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian wheezy |
|
Datum: |
Sa, 17. Januar 2015, 00:17 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8990 |
|
Applikationen: |
lsyncd |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3130-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff January 16, 2015 http://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : lsyncd CVE ID : CVE-2014-8990
It was discovered that lsyncd, a daemon to synchronize local directories using rsync, performed insufficient sanitising of filenames which might result in the execution of arbitrary commands.
For the stable distribution (wheezy), this problem has been fixed in version 2.0.7-3+deb7u1.
For the upcoming stable distribution (jessie), this problem has been fixed in version 2.1.5-2.
For the unstable distribution (sid), this problem has been fixed in version 2.1.5-2.
We recommend that you upgrade your lsyncd packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBAgAGBQJUuYrnAAoJEBDCk7bDfE42nqoP/26lx6Gs3jXfpzE4hLmBTTQK K+nXfAoGkWhdtfvLRiPsobltyazUINc+dCrEArIlP1P4AI2gorrvUWcydB6PMify zRdnz6fAewusYxloCmQ0C95TjGp6kvIb07YvtN8FHOFY2AGyRl+V3SzSWs/c2WKm 8SE9u7qnvNilmwZFtuYUSqD5AbuZqR4Y+KOTEXzIdRuBqkflQ+cVeOQQMc0wwGWB ZfhwMtqVZEmkAfymJAN/zSJSD7Y1MfouTtpIncIalJbnQEwoCTTDCLx2FKY1bktF ALTqMyM0ZA19uiOg0+S+wipPQB55zIBtNJGrsNb40Fxbq3iEecze+LU08v4QyAS/ CamYAMnoRUyry+m4HL/To8XOtQThKjavF6dryf750zGLr4aKgw3yJs6Fkb8SkbdR kysAQX1UdN/R+mwsr/W6a0WhSld7mnOhT4/b4c8DUv1QDpudrgoiv0x0a9eSUwQi 6K4hoEfG3Zz0xSiJXcAHcR0JbLawZNAFJ2kltw1fpIYz0X+Bs6PhVRGnslLuMGPq eGChZAmmZKPSmLOedBygDemOg/To2FU6DWpg+LQrGsph46M67g8z2x/7ewhUFLht yUASRoK+WgQk7GtWkM4rzSO51qisHABby2EVt3gCxIlovA4vQOYRqIbYMXqWaDbH PjddbGhMsXiTHpZbawSy =U2py -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: https://lists.debian.org/20150116220505.GA11350@pisco.westfalen.local
|
|
|
|