Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:31233
HistoryOct 15, 2014 - 12:00 a.m.

[SECURITY] [DSA 3013-1] s3ql security update

2014-10-1500:00:00
vulners.com
32

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Debian Security Advisory DSA-3013-1 [email protected]
http://www.debian.org/security/ Florian Weiemr
August 27, 2014 http://www.debian.org/security/faq


Package : s3ql
CVE ID : CVE-2014-0485

Nikolaus Rath discovered that s3ql, a file system for online data
storage, used the pickle functionality of the Python programming
language in an unsafe way. As a result, a malicious storage backend
or man-in-the-middle attacker was able execute arbitrary code.

For the stable distribution (wheezy), this problem has been fixed in
version 1.11.1-3+deb7u1.

We recommend that you upgrade your s3ql packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJT/jqRAAoJEL97/wQC1SS+DAEH/iFRJmp5zYsGtv3uK5kSQNxz
pT4rMsDJnQTulgeo4xGQBSE0C7/mE4cSHkBvx/y8hrwvq41HZcrUcyiAjSnVUXXF
LM8nJDj4n53KtXFgmRMDc8HVyiLVM/CPLJFJeJeNPeaKVk26unxvPE7A+Ou4dttH
q9ObY+bF1KY27a76gw0lCHo40g3sw6y4Ov2FRgjZkyup/QCCwstnlECkmEFb7Mh/
B8M2l2+XRYBRuzBuUt/yR6O22N7m87DPo5Z7KqhldyaGa9D+psIzU/jhbdVSA+sB
TSvW7Z41GQujCzaYR68743gvNv4nvCs328KPlo2PUSVHXiAGzGw5HHmj50A4thE=
=Gh9d
-----END PGP SIGNATURE-----

Related for SECURITYVULNS:DOC:31233