drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in PolarSSL
Name: |
Ausführen beliebiger Kommandos in PolarSSL |
|
ID: |
DSA-3136-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian wheezy |
|
Datum: |
Sa, 24. Januar 2015, 23:06 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1182 |
|
Applikationen: |
mbed TLS |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3136-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso January 24, 2015 http://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : polarssl CVE ID : CVE-2015-1182 Debian Bug : 775776
A vulnerability was discovered in PolarSSL, a lightweight crypto and SSL/TLS library. A remote attacker could exploit this flaw using specially crafted certificates to mount a denial of service against an application linked against the library (application crash), or potentially, to execute arbitrary code.
For the stable distribution (wheezy), this problem has been fixed in version 1.2.9-1~deb7u5.
For the upcoming stable distribution (jessie) and the unstable distribution (sid), this problem will be fixed soon.
We recommend that you upgrade your polarssl packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJUw2PLAAoJEAVMuPMTQ89EMgkP/RBYOQxUvhv8v3WB7o+eOPdn uHyc+Yv4t3Yk6WFUShDG4Ig9peWIvUEKjwF4K+8Y9BtPpRiU2CqkAlB4cw3KoZsG Y7LRHxyVHG/Ptk/HzgPMGlsptdIcK0wNYbNm4U4ecNEUtfT5Y2ZOnPHDnkUz09sP 9GTl67YB2mvUd/QJC1RQhlHss/07NAivR7FTPJCT5L/ORt20JTkGBESRZVQJEYiA IA2zPnH26S8zf9C2mq+f5pBJzqZQZ7yf80knhqI04lFIKEXsPi1Wo44qUce41AtR MkQO31q+LJ8ZVH5bfDAnpeJT659jkVKD2rySkiWKa98xUAf+2lKilu9zuuG/5rN6 yRdg/gaBusenXuuNo7XsCgbck6S1wv3ftJeeHUkL1At4hbqS0/IP66MGR9E55IYY RKgkVwVTopUG4QYaRMlCGil2f3ISgJi9INViNXq0DDCdH6uE8GIMinc9lxEeYZGX xAE1yJolrQGI8E+n6ZGBgHKBQSJsi2qdcLY8T5j78wHlZ05Sb6iCe9I4ymOLhuhn lh0ttG56cpDLYyl1FEBGPl6f+mQvZiGScCITjvP59NUvNSbxuje059F51DdMCV+/ nrMkhJmgd37fOvGT5WiKsm/Vi2P3kpAeYG+Sx/aGRJ9t8fnWFquAczU6tMZ55aEG IsYGGjZsIjwcXh/RXfqb =Y5wD -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: https://lists.debian.org/E1YEwv0-00032d-BW@master.debian.org
|
|
|
|