You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa sosreport

Sigurnosni nedostaci programskog paketa sosreport

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2845-1
December 18, 2015

sosreport vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 15.10
– Ubuntu 15.04
– Ubuntu 14.04 LTS

Summary:

sosreport could be made to expose sensitive information or overwrite files
as the administrator.

Software Description:
– sosreport: Set of tools to gather troubleshooting data from a system

Details:

Dolev Farhi discovered an information disclosure issue in SoS. If the
/etc/fstab file contained passwords, the passwords were included in the
SoS report. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-3925)

Mateusz Guzik discovered that SoS incorrectly handled temporary files. A
local attacker could possibly use this issue to overwrite arbitrary files
or gain access to temporary file contents containing sensitive system
information. (CVE-2015-7529)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
sosreport 3.2-2ubuntu1.1

Ubuntu 15.04:
sosreport 3.2-2ubuntu0.1

Ubuntu 14.04 LTS:
sosreport 3.1-1ubuntu2.2

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2845-1
CVE-2014-3925, CVE-2015-7529

Package Information:
https://launchpad.net/ubuntu/+source/sosreport/3.2-2ubuntu1.1
https://launchpad.net/ubuntu/+source/sosreport/3.2-2ubuntu0.1
https://launchpad.net/ubuntu/+source/sosreport/3.1-1ubuntu2.2

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=Giy9
—–END PGP SIGNATURE—–

AutorMarijo Plepelic
Cert idNCERT-REF-2015-12-0027-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost programskog paketa ipython

Otkrivena je ranjivost u editoru web aplikacije IPython Notebook za Gentoo. Ranjivost potencijalnim udaljenim napadačima omogućuje izvršavanje proizvoljnog JavaScript koda...

Close