Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in dpkg
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in dpkg
ID: DSA-3407-1
Distribution: Debian
Plattformen: Debian wheezy, Debian jessie
Datum: Do, 26. November 2015, 20:44
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0860
Applikationen: dpkg

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3407-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
November 26, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : dpkg
CVE ID : CVE-2015-0860

Hanno Boeck discovered a stack-based buffer overflow in the dpkg-deb
component of dpkg, the Debian package management system. This flaw could
potentially lead to arbitrary code execution if a user or an automated
system were tricked into processing a specially crafted Debian binary
package (.deb) in the old style Debian binary package format.

This update also includes updated translations and additional bug fixes.

For the oldstable distribution (wheezy), this problem has been fixed
in version 1.16.17.

For the stable distribution (jessie), this problem has been fixed in
version 1.17.26.

We recommend that you upgrade your dpkg packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=IMnl
-----END PGP SIGNATURE-----
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung