exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3129-1

Debian Security Advisory 3129-1
Posted Jan 16, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3129-1 - Two vulnerabilities have been discovered in the RPM package manager.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2013-6435, CVE-2014-8118
SHA-256 | 77424e485f26ee7c5f94bde26c163e06105007157e64c8ced2bb3db148881a5d

Debian Security Advisory 3129-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3129-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
January 15, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : rpm
CVE ID : CVE-2013-6435 CVE-2014-8118

Two vulnerabilities have been discovered in the RPM package manager.

CVE-2013-6435

Florian Weimer discovered a race condition in package signature
validation.

CVE-2014-8118

Florian Weimer discovered an integer overflow in parsing CPIO headers
which might result in the execution of arbitrary code.

For the stable distribution (wheezy), these problems have been fixed in
version 4.10.0-5+deb7u2.

For the upcoming stable distribution (jessie), these problems have been
fixed in version 4.11.3-1.1.

For the unstable distribution (sid), these problems have been fixed in
version 4.11.3-1.1.

We recommend that you upgrade your rpm packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=brg4
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close