You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa snapd

Sigurnosni nedostaci programskog paketa snapd

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2020-ccb155ea2c
2020-07-16 01:24:02.496184
——————————————————————————–

Name : snapd
Product : Fedora 31
Version : 2.45.2
Release : 1.fc31
URL : https://github.com/snapcore/snapd
Summary : A transactional software package manager
Description :
Snappy is a modern, cross-distribution, transactional package manager
designed for working with self-contained, immutable packages.

——————————————————————————–
Update Information:

Update to v2.45.2 to fix CVE-2020-11933 and CVE-2020-11934
——————————————————————————–
ChangeLog:

* Wed Jul 15 2020 Maciek Borzecki <maciek.borzecki@gmail.com> – 2.45.2-1
– release 2.45.2 to Fedora
* Fri Jul 10 2020 Michael Vogt <mvo@ubuntu.com>
– New upstream release 2.45.2
– SECURITY UPDATE: sandbox escape vulnerability on snapctl xdg-open
implementation
– usersession/userd/launcher.go: remove XDG_DATA_DIRS environment
variable modification when calling the system xdg-open. Patch
thanks to James Henstridge
– packaging/ubuntu-16.04/snapd.postinst: ensure “snap userd” is
restarted. Patch thanks to Michael Vogt
– CVE-2020-11934
– SECURITY UPDATE: arbitrary code execution vulnerability on core
devices with access to physical removable media
– devicestate: Disable/restrict cloud-init after seeding.
– CVE-2020-11933
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-ccb155ea2c’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2020-7685deba9b
2020-07-16 01:13:06.320375
——————————————————————————–

Name : snapd
Product : Fedora 32
Version : 2.45.2
Release : 1.fc32
URL : https://github.com/snapcore/snapd
Summary : A transactional software package manager
Description :
Snappy is a modern, cross-distribution, transactional package manager
designed for working with self-contained, immutable packages.

——————————————————————————–
Update Information:

Update to v2.45.2 to fix CVE-2020-11933 and CVE-2020-11934
——————————————————————————–
ChangeLog:

* Wed Jul 15 2020 Maciek Borzecki <maciek.borzecki@gmail.com> – 2.45.2-1
– release 2.45.2 to Fedora
* Fri Jul 10 2020 Michael Vogt <mvo@ubuntu.com>
– New upstream release 2.45.2
– SECURITY UPDATE: sandbox escape vulnerability on snapctl xdg-open
implementation
– usersession/userd/launcher.go: remove XDG_DATA_DIRS environment
variable modification when calling the system xdg-open. Patch
thanks to James Henstridge
– packaging/ubuntu-16.04/snapd.postinst: ensure “snap userd” is
restarted. Patch thanks to Michael Vogt
– CVE-2020-11934
– SECURITY UPDATE: arbitrary code execution vulnerability on core
devices with access to physical removable media
– devicestate: Disable/restrict cloud-init after seeding.
– CVE-2020-11933
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-7685deba9b’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorFilip Omazic
Cert idNCERT-REF-2020-07-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa .NET Core

Otkriven je sigurnosni nedostatak u programskom paketu .NET Core za operacijski sustav Redhat. Otkriveni nedostatak potencijalnim napadačima omogućuje izvršavanje proizvoljnog...

Close