Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in devscripts
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in devscripts
ID: USN-1593-1
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS, Ubuntu 11.04, Ubuntu 11.10, Ubuntu 12.04 LTS
Datum: Mi, 3. Oktober 2012, 08:35
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0212
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2240
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2241
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2242
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3500
Applikationen: devscripts

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============0050566106911545495==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enigFE2EF1A6B1FFEDD74C565278"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigFE2EF1A6B1FFEDD74C565278
Content-Type: text/plain; charset=ISO-8859-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1593-1
October 02, 2012

devscripts vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in devscripts.

Software Description:
- devscripts: scripts to make the life of a Debian Package maintainer easier

Details:

Raphael Geissert discovered that the debdiff.pl tool incorrectly handled
shell metacharacters. If a user or automated system were tricked into
processing a specially crafted filename, a remote attacher could possibly
execute arbitrary code. (CVE-2012-0212)

Raphael Geissert discovered that the dscverify tool incorrectly escaped
arguments to external commands. If a user or automated system were tricked
into processing specially crafted files, a remote attacher could possibly
execute arbitrary code. (CVE-2012-2240)

Raphael Geissert discovered that the dget tool incorrectly performed input
validation. If a user or automated system were tricked into processing
specially crafted files, a remote attacher could delete arbitrary files.
(CVE-2012-2241)

Raphael Geissert discovered that the dget tool incorrectly escaped
arguments to external commands. If a user or automated system were tricked
into processing specially crafted files, a remote attacher could possibly
execute arbitrary code. This issue only affected Ubuntu 10.04 LTS and
Ubuntu 11.04. (CVE-2012-2242)

Jim Meyering discovered that the annotate-output tool incorrectly handled
temporary files. A local attacker could use this flaw to alter files being
processed by the annotate-output tool. On Ubuntu 11.04 and later, this
issue was mitigated by the Yama kernel symlink restrictions.
(CVE-2012-3500)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
devscripts 2.11.6ubuntu1.4

Ubuntu 11.10:
devscripts 2.11.1ubuntu3.2

Ubuntu 11.04:
devscripts 2.10.69ubuntu2.2

Ubuntu 10.04 LTS:
devscripts 2.10.61ubuntu5.3

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1593-1
CVE-2012-0212, CVE-2012-2240, CVE-2012-2241, CVE-2012-2242,
CVE-2012-3500

Package Information:
https://launchpad.net/ubuntu/+source/devscripts/2.11.6ubuntu1.4
https://launchpad.net/ubuntu/+source/devscripts/2.11.1ubuntu3.2
https://launchpad.net/ubuntu/+source/devscripts/2.10.69ubuntu2.2
https://launchpad.net/ubuntu/+source/devscripts/2.10.61ubuntu5.3



--------------enigFE2EF1A6B1FFEDD74C565278
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=nYy8
-----END PGP SIGNATURE-----

--------------enigFE2EF1A6B1FFEDD74C565278--


--===============0050566106911545495==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============0050566106911545495==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung