Login
Newsletter
Werbung

Sicherheit: Zahlenüberlauf in unace
Aktuelle Meldungen Distributionen
Name: Zahlenüberlauf in unace
ID: DSA-3178-1
Distribution: Debian
Plattformen: Debian sid, Debian wheezy
Datum: Di, 3. März 2015, 07:24
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2063
Applikationen: unace

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3178-1 security@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
March 02, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : unace
CVE ID : CVE-2015-2063
Debian Bug : 775003

Jakub Wilk discovered that unace, an utility to extract, test and view
.ace archives, contained an integer overflow leading to a buffer
overflow. If a user or automated system were tricked into processing a
specially crafted ace archive, an attacker could cause a denial of
service (application crash) or, possibly, execute arbitrary code.

For the stable distribution (wheezy), this problem has been fixed in
version 1.2b-10+deb7u1.

For the upcoming stable distribution (jessie), this problem has been
fixed in version 1.2b-12.

For the unstable distribution (sid), this problem has been fixed in
version 1.2b-12.

We recommend that you upgrade your unace packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=MznR
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact
listmaster@lists.debian.org
Archive: https://lists.debian.org/E1YSXFF-0005Ew-SE@master.debian.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung