exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3129-1

Debian Security Advisory 3129-1
Posted Jan 16, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3129-1 - Two vulnerabilities have been discovered in the RPM package manager.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2013-6435, CVE-2014-8118
SHA-256 | 77424e485f26ee7c5f94bde26c163e06105007157e64c8ced2bb3db148881a5d

Debian Security Advisory 3129-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3129-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
January 15, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : rpm
CVE ID : CVE-2013-6435 CVE-2014-8118

Two vulnerabilities have been discovered in the RPM package manager.

CVE-2013-6435

Florian Weimer discovered a race condition in package signature
validation.

CVE-2014-8118

Florian Weimer discovered an integer overflow in parsing CPIO headers
which might result in the execution of arbitrary code.

For the stable distribution (wheezy), these problems have been fixed in
version 4.10.0-5+deb7u2.

For the upcoming stable distribution (jessie), these problems have been
fixed in version 4.11.3-1.1.

For the unstable distribution (sid), these problems have been fixed in
version 4.11.3-1.1.

We recommend that you upgrade your rpm packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=brg4
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close