You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa whoopsie

Sigurnosni nedostatak programskog paketa whoopsie

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-4052-1
July 09, 2019

whoopsie vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 19.04
– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

Whoopsie could be made to crash or expose sensitive information if it
processed a specially crafted crash report.

Software Description:
– whoopsie: Ubuntu error tracker submission

Details:

Kevin Backhouse discovered Whoopsie incorrectly handled very large crash
reports. A local attacker could possibly use this issue to cause a denial of
service or expose sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.04:
libwhoopsie0 0.2.64ubuntu0.1
whoopsie 0.2.64ubuntu0.1

Ubuntu 18.10:
libwhoopsie0 0.2.62ubuntu1
whoopsie 0.2.62ubuntu1

Ubuntu 18.04 LTS:
libwhoopsie0 0.2.62ubuntu0.1
whoopsie 0.2.62ubuntu0.1

Ubuntu 16.04 LTS:
libwhoopsie0 0.2.52.5ubuntu0.1
whoopsie 0.2.52.5ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4052-1
CVE-2019-11476

Package Information:
https://launchpad.net/ubuntu/+source/whoopsie/0.2.64ubuntu0.1
https://launchpad.net/ubuntu/+source/whoopsie/0.2.62ubuntu1
https://launchpad.net/ubuntu/+source/whoopsie/0.2.62ubuntu0.1
https://launchpad.net/ubuntu/+source/whoopsie/0.2.52.5ubuntu0.1
—–BEGIN PGP SIGNATURE—–

iQEzBAEBCgAdFiEEiOlTC8vdwgBRe16w9JjS2d59rZwFAl0j7MgACgkQ9JjS2d59
rZxpdwf/ZT7hyJj24dCLj+gR315kwsouKbx2vA2bvVfCbbsv6mh1uBSLUL9UCuR1
UzqVCl9Eu9wJwg6WRJA8EQthJ7EHAntpCCkwtaG5goFmzZyyFcToHw9rfroyu3sj
QxA7cNxusC1DzOpb4AEiNIN5mvIzGO5juYSdWMUBmPs8GxUN4GhClm3++lAbWsEx
/95jdIIfAQwzJ6sX3bNM0HXKrRWb+nRRRn8iR/hXXUvR7mCK0OZIdBzU0rXGNo/b
Hv90eIOUtfAWHouP/k8e8XgVy2KVHZFqO67T/D/cZ0USaD3GxRw2IGk/RX5Dk+EI
htmHEMwfEpqXVNdcA6gWzydgGZ3QxQ==
=3qpq
—–END PGP SIGNATURE——-

AutorZvonimir Bosnjak
Cert idNCERT-REF-2019-07-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Ranjivost Cisco Jabber softvera

Otkrivena je ranjivost u mehanizmu učitavanja specifičnih dinamično povezanih biblioteka kod Cisco Jabber softvera za operacijski sustav Windows. Ranjivost je...

Close