Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in xdelta3
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in xdelta3
ID: USN-2901-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 15.10
Datum: Mi, 17. Februar 2016, 18:31
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9765
Applikationen: XDelta

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============0525696718389135533==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="dFGq0XA0567UxaXaITgEBpEUubEHH5iCf"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--dFGq0XA0567UxaXaITgEBpEUubEHH5iCf
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2901-1
February 17, 2016

xdelta3 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.10
- Ubuntu 14.04 LTS

Summary:

xdelta3 could be made to crash or run programs if it opened a specially
crafted file.

Software Description:
- xdelta3: Diff utility which works with binary files

Details:

It was discovered that xdelta3 incorrectly handled certain files. If a user
or automated system were tricked into processing a specially-crafted file,
a remote attacker could use this issue to cause xdelta3 to crash, resulting
in a denial of service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
xdelta3 3.0.8-dfsg-1ubuntu0.15.10.2

Ubuntu 14.04 LTS:
xdelta3 3.0.7-dfsg-2ubuntu0.2

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2901-1
CVE-2014-9765

Package Information:
https://launchpad.net/ubuntu/+source/xdelta3/3.0.8-dfsg-1ubuntu0.15.10.2
https://launchpad.net/ubuntu/+source/xdelta3/3.0.7-dfsg-2ubuntu0.2



--dFGq0XA0567UxaXaITgEBpEUubEHH5iCf
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=aL2j
-----END PGP SIGNATURE-----

--dFGq0XA0567UxaXaITgEBpEUubEHH5iCf--


--===============0525696718389135533==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============0525696718389135533==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung