You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa eject

Sigurnosni nedostatak programskog paketa eject

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3246-1
March 27, 2017

eject vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

Eject could be made to run programs as an administrator.

Software Description:
– eject: ejects CDs and operates CD-Changers under Linux

Details:

Ilja Van Sprundel discovered that dmcrypt-get-device incorrectly checked setuid
and setgid return values. A local attacker could use this issue to execute code
as an administrator.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.10:
eject 2.1.5+deb1+cvs20081104-13.1ubuntu0.16.10.1

Ubuntu 16.04 LTS:
eject 2.1.5+deb1+cvs20081104-13.1ubuntu0.16.04.1

Ubuntu 14.04 LTS:
eject 2.1.5+deb1+cvs20081104-13.1ubuntu0.14.04.1

Ubuntu 12.04 LTS:
eject 2.1.5+deb1+cvs20081104-9ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-3246-1
CVE-2017-6964

Package Information:
https://launchpad.net/ubuntu/+source/eject/2.1.5+deb1+cvs20081104-13.1ubuntu0.16.10.1
https://launchpad.net/ubuntu/+source/eject/2.1.5+deb1+cvs20081104-13.1ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/eject/2.1.5+deb1+cvs20081104-13.1ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/eject/2.1.5+deb1+cvs20081104-9ubuntu0.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=JRBA
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2017-03-0212-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci GStreamer dodataka

Otkriveni su sigurnosni nedostaci u GStreamer Base i GStreamer Good dodacima za Ubuntu uzrokovani neispravnim upravljanjem posebno oblikovanim medijskim datotekama....

Close