USN-2479-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-2479-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-2479-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-2479-1
Related
  • CVE-2013-6435
  • CVE-2014-8118
Published
2015-01-19T15:04:21.948041Z
Modified
2015-01-19T15:04:21.948041Z
Summary
rpm vulnerabilities
Details

Florian Weimer discovered that RPM incorrectly handled temporary files. A local attacker could use this issue to execute arbitrary code. (CVE-2013-6435)

Florian Weimer discovered that RPM incorrectly handled certain CPIO headers. If a user or automated system were tricked into installing a malicious package file, a remote attacker could use this issue to cause RPM to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2014-8118)

References

Affected packages

Ubuntu:14.04:LTS / rpm

Package

Name
rpm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.11.1-3ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "librpm-dev": "4.11.1-3ubuntu0.1",
            "python-rpm": "4.11.1-3ubuntu0.1",
            "librpm3": "4.11.1-3ubuntu0.1",
            "librpmbuild3": "4.11.1-3ubuntu0.1",
            "librpmio3": "4.11.1-3ubuntu0.1",
            "librpmsign1": "4.11.1-3ubuntu0.1",
            "debugedit": "4.11.1-3ubuntu0.1",
            "rpm": "4.11.1-3ubuntu0.1",
            "rpm-i18n": "4.11.1-3ubuntu0.1",
            "rpm-common": "4.11.1-3ubuntu0.1",
            "rpm2cpio": "4.11.1-3ubuntu0.1"
        }
    ]
}