Debian alert DLA-3762-1 (unadf)
From: | Adrian Bunk <bunk@debian.org> | |
To: | debian-lts-announce@lists.debian.org | |
Subject: | [SECURITY] [DLA 3762-1] unadf security update | |
Date: | Fri, 15 Mar 2024 19:48:33 +0200 | |
Message-ID: | <ZfSJ8bsOhrqgmBXB@localhost> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3762-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Adrian Bunk March 15, 2024 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : unadf Version : 0.7.11a-4+deb11u1~deb10u1 CVE ID : CVE-2016-1243 CVE-2016-1244 Debian Bug : 838248 Two vulnerabilities have been fixed in unADF, a tool to extract files from an Amiga Disk File dump. CVE-2016-1243 arbitrary code execution via long pathname CVE-2016-1244 arbitrary code execution via shell metacharacters in directory names For Debian 10 buster, these problems have been fixed in version 0.7.11a-4+deb11u1~deb10u1. We recommend that you upgrade your unadf packages. For the detailed security status of unadf please refer to its security tracker page at: https://security-tracker.debian.org/tracker/unadf Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmX0iesACgkQiNJCh6LY mLEa5A//dCcRQ/F3RSGxGnTYA+jEBts+ScHNFoQ7vypF48L8j2lehek8bnlonCIj Wx9otRF+HCnWOWxriGw/h9E1vfIizU2mNZF9eGqjy5nGeAcRmziiX64mzCViuQyp 79YoWwNVqe0CfZDnsCJh7Pajmv9RPAAhwiOzYZ2neZzEBNrsawejA7s8pE4pw3Yw QrSV12ZWh/XhiFVy1k/UHXhXRhiarz5z8ViBPY17gsfB3M4tDMNofOV/sVajt7NS awKLemJMIevWt8a4+cIDder0UhXJRcElUy69DYL9X9XxFdaOWl4nTwpC6X1iyEd/ avnDJK22P9KsMPqGGOBpQX6WJunVfw2N3ygfmEXcxITqdYCSMRQECK011Atu7ceC bka0CurZSeDa8rGRebjqLEfyWPaukj/xRyJzQk/8VYq8PADQix2Hn/3/1q0GyP6F yfZCbYT7Wr+kOKHD7uQMeI9b6OrpNZ7ZxHcFq1kP9Nuhsjz9DQgo6RPkEAo5vbJo AdhW0dMBWqZ8rKXt0dXYZUUTV9O1zzoP4slKeDXstNHHqZTIm0aiBcqGDp6SsLZi Vq6hb9L8u1qhfsPK/VgiPef58QvjCYUVEFAc1/pcXw4MCQBc7bcmaVgsHNR32rSO ZFY6fHkNND5weYuktNK5wjWRsA6I2PKMX9/zaAQM0qaKYB3BYnY= =3U3n -----END PGP SIGNATURE-----