You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa apport

Sigurnosni nedostatak programskog paketa apport

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2744-1
September 24, 2015

apport vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 15.04
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

Apport could be made to crash or overwrite files as an administrator.

Software Description:
– apport: automatically generate crash reports for debugging

Details:

Halfdog discovered that Apport incorrectly handled kernel crash dump files.
A local attacker could use this issue to cause a denial of service, or
possibly elevate privileges. The default symlink protections for affected
releases should reduce the vulnerability to a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
apport 2.17.2-0ubuntu1.5

Ubuntu 14.04 LTS:
apport 2.14.1-0ubuntu3.15

Ubuntu 12.04 LTS:
apport 2.0.1-0ubuntu17.10

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2744-1
CVE-2015-1338

Package Information:
https://launchpad.net/ubuntu/+source/apport/2.17.2-0ubuntu1.5
https://launchpad.net/ubuntu/+source/apport/2.14.1-0ubuntu3.15
https://launchpad.net/ubuntu/+source/apport/2.0.1-0ubuntu17.10

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=3MEP
—–END PGP SIGNATURE—–

AutorMarijo Plepelic
Cert idNCERT-REF-2015-09-0025-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskih paketa qemu i qemu-kvm

Otkriveni su sigurnosni nedostaci u programskim paketima qemu i qemu-kvm. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada uskraćivanjem usluge i...

Close