drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in gdm3
Name: |
Ausführen beliebiger Kommandos in gdm3 |
|
ID: |
DSA-4270-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian stretch |
|
Datum: |
Mo, 13. August 2018, 23:14 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14424 |
|
Applikationen: |
Gnome Display Manager |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4270-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso August 13, 2018 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : gdm3 CVE ID : CVE-2018-14424
Chris Coulson discovered a use-after-free flaw in the GNOME Display Manager, triggerable by an unprivileged user via a specially crafted sequence of D-Bus method calls, leading to denial of service or potentially the execution of arbitrary code.
For the stable distribution (stretch), this problem has been fixed in version 3.22.3-3+deb9u2.
We recommend that you upgrade your gdm3 packages.
For the detailed security status of gdm3 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/gdm3
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAltx5gVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0SqoBAAkbHA4RtFAq4vWFZy4jV5jDMOtuXwCSErwL8DbSlTB0Wsa0aZiqVDMDYi Qatg8vKbTVeWOsbcFvYDOhHlL3rfaHLnu7EjPBEu0Lcw7pW5D2FRbwxVKyDpbdQL CvkyfP3qwepXv8OxYoaEgUpTljYPktPZfiF4dRvQ3PjJcnWfWq3ZgAFFqqkX12Ak GiDQshY51sIKfgJDilWtysrpKp18DEn0D2qCbd7RF+x5PwUD7w+/Lh2akxmHe2p+ u6V6izBxkhEQY6XI/2tCc6810rVhMNqYuBKmJpZdIZroGgfypHgc1BnGlIsddvvM m0mCNM2Npdw3pVPJaNJVqX/QLA50Hp7YQntT/3n3PLLmeh6VvytBk6i+2nnhcIZm vGx+E1AVScRTkpHYos77njzoPPSl/WtezsIFYRi6FrRgde+G4dMQkCMVAf96IaCu snJ3kEmxfXxR4sA6FkoOA8D+4V9MClSQedjxJ8DU3yJcWEPxK1YTY/4iW8lLz/4Z GhDhySaPQ3XtPhdnzu88rwFDtSgfQiEunh7ZlY2ai897EVguElUSLuCpSGvxzqh1 5XkYUepPUG4f/jNzXADtJ8UR5qT5S5484W8pUZtH6c8JzFZuVg5APdOOR1yjpREL BWDR2F5or8OudTVaMeF9XzcPw8i9DWcxdeZFKBYS03sUPMakNIA= =/0Be -----END PGP SIGNATURE-----
|
|
|
|