drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Rechteprüfung in APT
Name: |
Mangelnde Rechteprüfung in APT |
|
ID: |
USN-2246-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 13.10, Ubuntu 14.04 LTS |
|
Datum: |
Mi, 18. Juni 2014, 07:05 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0478 |
|
Applikationen: |
APT |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============0398640786810447864== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="kEGte5tfOLRvBBP29BK6IKJSSliPCnHIF"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --kEGte5tfOLRvBBP29BK6IKJSSliPCnHIF Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2246-1 June 17, 2014
apt vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS - Ubuntu 13.10 - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS
Summary:
An attacker could trick APT into installing altered source packages.
Software Description: - apt: Advanced front-end for dpkg
Details:
Jakub Wilk discovered that APT did not correctly validate signatures when downloading source packages. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially be used to install altered source packages.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 LTS: apt 1.0.1ubuntu2.1
Ubuntu 13.10: apt 0.9.9.1~ubuntu3.2
Ubuntu 12.04 LTS: apt 0.8.16~exp12ubuntu10.17
Ubuntu 10.04 LTS: apt 0.7.25.3ubuntu9.15
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2246-1 CVE-2014-0478
Package Information: https://launchpad.net/ubuntu/+source/apt/1.0.1ubuntu2.1 https://launchpad.net/ubuntu/+source/apt/0.9.9.1~ubuntu3.2 https://launchpad.net/ubuntu/+source/apt/0.8.16~exp12ubuntu10.17 https://launchpad.net/ubuntu/+source/apt/0.7.25.3ubuntu9.15
--kEGte5tfOLRvBBP29BK6IKJSSliPCnHIF Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iQIcBAEBCgAGBQJToITyAAoJEGVp2FWnRL6T6pUP/j69qA0cPUbaoKiWrQjz48A2 5hm9ZtEg4dsv8NYtL8ZRRKt1kyLPigJr3hev01w/wx4wQ+LcE6F55woq6plozBLi K9PXyzfh2+yZY7hrRrXV8mwkRL7n5NW8HgvPk4g5TvdWLCtIcdAojzX/C2oTQF+N X1m9iQfXcznZ8HabxBihCEWww/fmyK6dbOQ0Yp2cHhpTtvzw6/qvOCaKp9VrXdpg 84fcxtHHkOBrbNi3magUUtVWR9Snd2LABTkaUQ7WrgXtzSndlZLhTY8TMuUTALI+ y4CHDpyWHLsiQWzN5WYY+HzwgBQZOhqoh46JeHBI4l+AzS1KYvTas9QwjQI0jWoG maK6c/GQ4CtPllOscd7O6+4UR5oYyl8iwWBHFe1hRIsdyAftuqgOYGBHHWwp6nxg RwU32Ld4av4naUFcaYe3y8otdTKJpMQHKAMDnZS5sXQMZrWweaDvsBgqAOnOz+Fx MBXcLbHk6poARqbAFOyKo45CclVaQUJZo6RkXtClp6F8zBNCrbLMA7lvfKR+1/Rg 6MxHUss6M9YiZ1J9ai3FGXu0vsVyqGyhrYpxc4iW6xczt17mjCxCrYKt+hwRUEmG +umsAMu8DQ/G0qCN2YzdHpBErdyLJl2cvoyddHogIgSPmRefhA+6EapKkGJo8G66 5SB5Lw1HAgU+ZhIctHfh =Cjkq -----END PGP SIGNATURE-----
--kEGte5tfOLRvBBP29BK6IKJSSliPCnHIF--
--===============0398640786810447864== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============0398640786810447864==--
|
|
|
|