-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.0109
                            rpm security update
                              16 January 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           rpm
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-8118 CVE-2013-6435 

Reference:         ESB-2014.2344

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-3129

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3129-1                   security@debian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
January 15, 2015                       http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : rpm
CVE ID         : CVE-2013-6435 CVE-2014-8118

Two vulnerabilities have been discovered in the RPM package manager.

CVE-2013-6435

    Florian Weimer discovered a race condition in package signature
    validation.

CVE-2014-8118

    Florian Weimer discovered an integer overflow in parsing CPIO headers
    which might result in the execution of arbitrary code.

For the stable distribution (wheezy), these problems have been fixed in
version 4.10.0-5+deb7u2.

For the upcoming stable distribution (jessie), these problems have been
fixed in version 4.11.3-1.1.

For the unstable distribution (sid), these problems have been fixed in
version 4.11.3-1.1.

We recommend that you upgrade your rpm packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=brg4
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=l28E
-----END PGP SIGNATURE-----