[USN-2479-1] RPM vulnerabilities
Marc Deslauriers
marc.deslauriers at canonical.com
Mon Jan 19 15:47:22 UTC 2015
==========================================================================
Ubuntu Security Notice USN-2479-1
January 19, 2015
rpm vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in RPM.
Software Description:
- rpm: package manager for RPM
Details:
Florian Weimer discovered that RPM incorrectly handled temporary files. A
local attacker could use this issue to execute arbitrary code.
(CVE-2013-6435)
Florian Weimer discovered that RPM incorrectly handled certain CPIO
headers. If a user or automated system were tricked into installing a
malicious package file, a remote attacker could use this issue to cause RPM
to crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2014-8118)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.10:
rpm 4.11.2-3ubuntu0.1
Ubuntu 14.04 LTS:
rpm 4.11.1-3ubuntu0.1
Ubuntu 12.04 LTS:
rpm 4.9.1.1-1ubuntu0.3
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2479-1
CVE-2013-6435, CVE-2014-8118
Package Information:
https://launchpad.net/ubuntu/+source/rpm/4.11.2-3ubuntu0.1
https://launchpad.net/ubuntu/+source/rpm/4.11.1-3ubuntu0.1
https://launchpad.net/ubuntu/+source/rpm/4.9.1.1-1ubuntu0.3
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20150119/5bbac957/attachment.sig>
More information about the ubuntu-security-announce
mailing list