You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa apt

Sigurnosni nedostaci programskog paketa apt

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2348-1
September 16, 2014

apt vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
– Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in APT.

Software Description:
– apt: Advanced front-end for dpkg

Details:

It was discovered that APT did not re-verify downloaded files when the
If-Modified-Since wasn’t met. (CVE-2014-0487)

It was discovered that APT did not invalidate repository data when it
switched from an unauthenticated to an authenticated state. (CVE-2014-0488)

It was discovered that the APT Acquire::GzipIndexes option caused APT to
skip checksum validation. This issue only applied to Ubuntu 12.04 LTS and
Ubuntu 14.04 LTS, and was not enabled by default. (CVE-2014-0489)

It was discovered that APT did not correctly validate signatures when
downloading source packages using the download command. This issue only
applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-0490)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
apt 1.0.1ubuntu2.3

Ubuntu 12.04 LTS:
apt 0.8.16~exp12ubuntu10.19

Ubuntu 10.04 LTS:
apt 0.7.25.3ubuntu9.16

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2348-1
CVE-2014-0487, CVE-2014-0488, CVE-2014-0489, CVE-2014-0490

Package Information:
https://launchpad.net/ubuntu/+source/apt/1.0.1ubuntu2.3
https://launchpad.net/ubuntu/+source/apt/0.8.16~exp12ubuntu10.19
https://launchpad.net/ubuntu/+source/apt/0.7.25.3ubuntu9.16

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIcBAEBCgAGBQJUGGbeAAoJEGVp2FWnRL6Tom8P/28/Xp1jPcuvjg0yUnq9H+sF
DTI3UWTXYM2bDXVruLyVwoP4s2MJGzh8LgDNbXCS9a2EOfFamPji91eRkYFtvhRi
oxolj/aBsMCSU6QPcb0FudhkUZmQaGJqsDmpjZNbUK+vxJ5m7C1D8n6EJJDnIqh2
dfl9h6X2mYk5XxfYPD8JypsL3RpQU3GJNwDhKnWWmZ0DreuzEvy1PTEGXz+aoAcn
bD0XM7soHyozQxTF06WO7umiMAfwPI6/q99EiB7y0HlAjY/VD7zeM/lIsMdKjKxo
1CFwnRSGFYL9pRbg3co15hWmTQISJD82w4TcD/8FJrgnQfOv5hlLFmwsOZxl/OSD
J7u39pcQ5lytz2a3l0GkUF98m3+Ndw1a43HdKgrWJQgIgB8jzxHIpsIFnuHLc6tv
FpUpHoc9cKJcjQYt7C1Xl4vL3IZgpApa0hRiHRe0FPDog1lgAGaN57n0kZXbgDde
hfgwZsJt9oRUYrGKSa0yiaRdl74bn1/nIdK/2piJY52uea9B0qA82CwdWbgdc8k0
6uORlrqAXVEZShJgvQrOvbZTus5eroPUyEiglHxev3KkyHjDJzQQ0DR/g7E3fT31
jQjP53E1552yONZmCeKWRPaD91ItXMnc157DpVv5C/ap6+OdcNPmDj+LidyrMV3o
Pzhyyt6o9Cv4dgTOMQy1
=wcWS
—–END PGP SIGNATURE—–

AutorMarijo Plepelic
Cert idNCERT-REF-2014-09-0008-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa python-django

Otkriveni su sigurnosni nedostaci u programskom paketu django. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje phishing napada, izvođenje napada uskraćivanja usluge,...

Close