-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2413-1 security@debian.org http://www.debian.org/security/ Luk Claes February 20, 2012 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libarchive Vulnerability : buffer overflows Problem type : remote/local Debian-specific: no CVE ID : CVE-2011-1777 CVE-2011-1778 Two buffer overflows have been discovered in libarchive, a library providing a flexible interface for reading and writing archives in various formats. The possible buffer overflows while reading is9660 or tar streams allow remote attackers to execute arbitrary code depending on the application that makes use of this functionality. For the stable distribution (squeeze), this problem has been fixed in version 2.8.4-1+squeeze1. For the testing (wheezy) and unstable (sid) distributions, this problem has been fixed in version 2.8.5-5. We recommend that you upgrade your libarchive packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iEYEARECAAYFAk9CsnIACgkQHYflSXNkfP/wVACgogXQorcMosdliVws+7N5SlQT 53oAn3NShFAVTAPNS591WrJYz93WHpXs =ND6a -----END PGP SIGNATURE-----