it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Sebastien Delafond <seb AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 3949-1] augeas security update
- Date: Mon, 21 Aug 2017 09:25:14 +0000
- List-archive: https://lists.debian.org/msgid-search/E1djixO-0003Sv-2X AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-return-path: <seb AT seger.debian.org>
- Priority: urgent
- Resent-date: Mon, 21 Aug 2017 09:25:34 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <AmxVAaoJsyF.A.sxB.OcqmZB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3949-1 security AT debian.org
https://www.debian.org/security/ Sebastien Delafond
August 21, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : augeas
CVE ID : CVE-2017-7555
Debian Bug : 872400
Han Han of Red Hat discovered that augeas, a configuration editing
tool, improperly handled some escaped strings. A remote attacker could
leverage this flaw by sending maliciously crafted strings, thus
causing an augeas-enabled application to crash or potentially execute
arbitrary code.
For the oldstable distribution (jessie), this problem has been fixed
in version 1.2.0-0.2+deb8u2.
For the stable distribution (stretch), this problem has been fixed in
version 1.8.0-1+deb9u1.
We recommend that you upgrade your augeas packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlmaoi0ACgkQEL6Jg/PV
nWQa6AgAuDE/urqDtUlXt53PL3b9pZsUSdKQ+74l64hhKMV0+kQ8SSitBdcjXR/8
1nsdd7Qi36lOCwYv7EEcCqz98puB+ef31LwVZiYbVLAG6YT54Zl7XSSIpXx94Ef+
JCAJ8NGOCLoqHjTNtsQVnPMtLUbV42aDqlNeDgMEXzvoDb/k8R4CmrSMremz8xn9
0bPuziBV73NfQAf3hnrj+Q+whEHg9rCie/wsH1m6QcpibJEJpLlTC1gV8PZehGMM
g3h+H2XV/YrMR1swecIH5VxIEeLCL0mgeLJ4azfIxyWH0adVFRCRp8ZiZ3c2KyQS
ejEgj24vgFvrvdQWGAeeh0dl2e/LWw==
=502b
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 3949-1] augeas security update, Sebastien Delafond, 21.08.2017
Archiv bereitgestellt durch MHonArc 2.6.19.