[SECURITY] [DSA 3013-1] s3ql security update

2014-10-15T00:00:00
ID SECURITYVULNS:DOC:31233
Type securityvulns
Reporter Securityvulns
Modified 2014-10-15T00:00:00

Description

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1


Debian Security Advisory DSA-3013-1 security@debian.org http://www.debian.org/security/ Florian Weiemr August 27, 2014 http://www.debian.org/security/faq


Package : s3ql CVE ID : CVE-2014-0485

Nikolaus Rath discovered that s3ql, a file system for online data storage, used the pickle functionality of the Python programming language in an unsafe way. As a result, a malicious storage backend or man-in-the-middle attacker was able execute arbitrary code.

For the stable distribution (wheezy), this problem has been fixed in version 1.11.1-3+deb7u1.

We recommend that you upgrade your s3ql packages.

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJT/jqRAAoJEL97/wQC1SS+DAEH/iFRJmp5zYsGtv3uK5kSQNxz pT4rMsDJnQTulgeo4xGQBSE0C7/mE4cSHkBvx/y8hrwvq41HZcrUcyiAjSnVUXXF LM8nJDj4n53KtXFgmRMDc8HVyiLVM/CPLJFJeJeNPeaKVk26unxvPE7A+Ou4dttH q9ObY+bF1KY27a76gw0lCHo40g3sw6y4Ov2FRgjZkyup/QCCwstnlECkmEFb7Mh/ B8M2l2+XRYBRuzBuUt/yR6O22N7m87DPo5Z7KqhldyaGa9D+psIzU/jhbdVSA+sB TSvW7Z41GQujCzaYR68743gvNv4nvCs328KPlo2PUSVHXiAGzGw5HHmj50A4thE= =Gh9d -----END PGP SIGNATURE-----