You are here
Home > Preporuke > Ranjivost programskog paketa devscripts

Ranjivost programskog paketa devscripts

  • Detalji os-a: LUB
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2649-1
June 16, 2015

devscripts vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

devscripts could be made to overwrite files.

Software Description:
– devscripts: scripts to make the life of a Debian Package maintainer easier

Details:

It was discovered that the uupdate tool incorrectly handled symlinks.
If a user or automated system were tricked into processing specially
crafted files, a remote attacker could possibly replace arbitrary files,
leading to a privilege escalation.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.10:
devscripts 2.14.6ubuntu0.1

Ubuntu 14.04 LTS:
devscripts 2.14.1ubuntu0.1

Ubuntu 12.04 LTS:
devscripts 2.11.6ubuntu1.7

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2649-1
CVE-2014-1833

Package Information:
https://launchpad.net/ubuntu/+source/devscripts/2.14.6ubuntu0.1
https://launchpad.net/ubuntu/+source/devscripts/2.14.1ubuntu0.1
https://launchpad.net/ubuntu/+source/devscripts/2.11.6ubuntu1.7

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=hIC1
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2015-06-0004-ADV
CveCVE-2014-1833
ID izvornikaUSN-2649-1
Proizvoddevscripts
Izvorhttp://www.ubuntu.com
Top
More in Preporuke
Ranjivost jezgre operacijskog sustava

Otkrivena je ranjivost u funkcijama pipe_write() i pipe_read() unutar jezgre operacijskog sustava RHEL 5.9 Advanced Update Support. Uspješno iskorištavanje ranjivosti...

Close