lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 16 Jul 2014 20:08:25 +0200 (CEST) From: Thijs Kinkhorst <thijs@...ian.org> To: bugtraq@...urityfocus.com Subject: [SECURITY] [DSA 2765-2] davfs regression update -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2765-2 security@...ian.org http://www.debian.org/security/ Thijs Kinkhorst July 16, 2014 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : davfs2 Vulnerability : privilege escalation Problem type : remote Debian-specific: no CVE ID : CVE-2013-4362 Debian Bug : 723034 The update released for davfs2 in DSA 2765 had a version number for Debian 7 "wheezy" that sorts lower than the version in Debian 6 "squeeze", causing problems on upgrades. This update makes a package of davfs2 in wheezy available which corrects only the version number. For reference, the original advisory follows. Davfs2, a filesystem client for WebDAV, calls the function system() insecurely while is setuid root. This might allow a privilege escalation. For the stable distribution (wheezy), this problem has been fixed in version 1.4.6-1.1+wheezy1. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@...ts.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJTxr8ZAAoJEFb2GnlAHawE2sMH/1tVo2wh656rwVYruEEDhsYm 0Nn7r+q0nRr/Rd1N7GtlodJSaAQyBDnLwiC4hMqtiJ8fVTG83MBKG15671ADLwCJ 3ok6OQb9qz0W2kLvgkf3l8MjH7keeZ1kMhUxk9PWh2EynwVEYG2Lv6qPPQT7BqPh 52vsaaKV+zae1wo5HIAtm03+/LOF0L8zCDKb1jHvJLKupISPOBo+9DuzX6ZQtuei PdZ2Ay0z9VzzV3DQ6hnv/dcEhfwllMDrdgb7i9Cfl41GGGH0wwfHFbUY/Y0fQWlH KgEBnuJQx8IXgTPDT7e0RLtnR1IRFtL8ZIyRBDpkP9SnVU0moUTOYcq/Ow5A4us= =adJD -----END PGP SIGNATURE-----
Powered by blists - more mailing lists