[<prev] [next>] [day] [month] [year] [list]
Message-ID: <87mwapohic.fsf@mid.deneb.enyo.de>
Date: Wed, 27 Aug 2014 21:32:43 +0200
From: Florian Weimer <fw@...eb.enyo.de>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3013-1] s3ql security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3013-1 security@...ian.org
http://www.debian.org/security/ Florian Weiemr
August 27, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : s3ql
CVE ID : CVE-2014-0485
Nikolaus Rath discovered that s3ql, a file system for online data
storage, used the pickle functionality of the Python programming
language in an unsafe way. As a result, a malicious storage backend
or man-in-the-middle attacker was able execute arbitrary code.
For the stable distribution (wheezy), this problem has been fixed in
version 1.11.1-3+deb7u1.
We recommend that you upgrade your s3ql packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iQEcBAEBAgAGBQJT/jqRAAoJEL97/wQC1SS+DAEH/iFRJmp5zYsGtv3uK5kSQNxz
pT4rMsDJnQTulgeo4xGQBSE0C7/mE4cSHkBvx/y8hrwvq41HZcrUcyiAjSnVUXXF
LM8nJDj4n53KtXFgmRMDc8HVyiLVM/CPLJFJeJeNPeaKVk26unxvPE7A+Ou4dttH
q9ObY+bF1KY27a76gw0lCHo40g3sw6y4Ov2FRgjZkyup/QCCwstnlECkmEFb7Mh/
B8M2l2+XRYBRuzBuUt/yR6O22N7m87DPo5Z7KqhldyaGa9D+psIzU/jhbdVSA+sB
TSvW7Z41GQujCzaYR68743gvNv4nvCs328KPlo2PUSVHXiAGzGw5HHmj50A4thE=
=Gh9d
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists