Login


 
Newsletter
Werbung
Sicherheit: Mangelnde Prüfung von Schlüsseln in APT
Aktuelle Meldungen Distributionen
Name: Mangelnde Prüfung von Schlüsseln in APT
ID: USN-1477-1
Distribution: Ubuntu
Plattformen: Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 11.04, Ubuntu 11.10, Ubuntu 12.04 LTS
Datum: Sa, 16. Juni 2012, 01:23
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0954

Originalnachricht


--===============8958890454622126222==
Content-Type: multipart/signed; micalg="pgp-sha512";
protocol="application/pgp-signature";
boundary="=-yhN5DL1piBPj0OJ5u/db"


--=-yhN5DL1piBPj0OJ5u/db
Content-Type: text/plain; charset="UTF-8
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1477-1
June 15, 2012

apt vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS

Summary:

An attacker could trick APT into installing altered packages.

Software Description:
- apt: Advanced front-end for dpkg

Details:

Georgi Guninski discovered that APT did not properly validate imported
keyrings via apt-key net-update. USN-1475-1 added additional verification
for imported keyrings, but it was insufficient. If a remote attacker were
able to perform a man-in-the-middle attack, this flaw could potentially be
used to install altered packages. This update corrects the issue by
disabling the net-update option completely. A future update will re-enable
the option with corrected verification.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
apt 0.8.16~exp12ubuntu10.2

Ubuntu 11.10:
apt 0.8.16~exp5ubuntu13.5

Ubuntu 11.04:
apt 0.8.13.2ubuntu4.6

Ubuntu 10.04 LTS:
apt 0.7.25.3ubuntu9.13

Ubuntu 8.04 LTS:
apt 0.7.9ubuntu17.6

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1477-1
CVE-2012-0954

Package Information:
https://launchpad.net/ubuntu/+source/apt/0.8.16~exp12ubuntu10.2
https://launchpad.net/ubuntu/+source/apt/0.8.16~exp5ubuntu13.5
https://launchpad.net/ubuntu/+source/apt/0.8.13.2ubuntu4.6
https://launchpad.net/ubuntu/+source/apt/0.7.25.3ubuntu9.13
https://launchpad.net/ubuntu/+source/apt/0.7.9ubuntu17.6



--ÒhN5DL1piBPj0OJ5u/db
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=0IxN
-----END PGP SIGNATURE-----

--=-yhN5DL1piBPj0OJ5u/db--



--===============8958890454622126222==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============8958890454622126222==--
Pro-Linux
Forum
Neue Nachrichten
Werbung