drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Überschreiben von Dateien in ruby-mixlib-archive
Name: |
Überschreiben von Dateien in ruby-mixlib-archive |
|
ID: |
DSA-3915-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian stretch |
|
Datum: |
Do, 20. Juli 2017, 21:38 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000026 |
|
Applikationen: |
ruby-mixlib-archive |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3915-1 security@debian.org https://www.debian.org/security/ Sebastien Delafond July 20, 2017 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : ruby-mixlib-archive CVE ID : CVE-2017-1000026 Debian Bug : 868572
It was discovered that ruby-mixlib-archive, a Chef Software's library used to handle various archive formats, was vulnerable to a directory traversal attack. This allowed attackers to overwrite arbitrary files by using a malicious tar archive containing ".." in its entries.
For the stable distribution (stretch), this problem has been fixed in version 0.2.0-1+deb9u1.
We recommend that you upgrade your ruby-mixlib-archive packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAllwxaAACgkQEL6Jg/PV nWSQTAf/UK9Q1jyNQ22DT+Fb0UTbQsapPyBNaDbELLHnYeBL4cAr1xQ26NukBKKU EVlmmDCO2O+WZXCysyuUfZvq45QImHQPfb07GGzscBbapMkvwKkhINI8Q4YPleAY JmFA614+H3H4GqhkIMiC7ZZ5kPP0JaK2gVeuYNz1io1WsG/0WYY9Tf/lWWTnLtnS dCs0YEG4DfNEwahVrCwrtIfNioVehDTQvH++vAWjTsoGqQj1wEk7ZuQQs7kS7xX2 LCe7qP1Lzv3i5dOWbuVs6ewBf2Ad/pH3DHKJit6keXFbECtinC52X/IcsOkeDMY4 qhCwriMsvQ1F1ac/LEG1p5uMLsqWHA== =FL/h -----END PGP SIGNATURE-----
|
|
|
|