drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in dpkg
Name: |
Pufferüberlauf in dpkg |
|
ID: |
USN-2820-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.04, Ubuntu 15.10 |
|
Datum: |
Do, 26. November 2015, 20:45 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0860 |
|
Applikationen: |
dpkg |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============3372351942015785901== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="twq08nA6BCBvjmxGJEFhvuns3caU020Wq"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --twq08nA6BCBvjmxGJEFhvuns3caU020Wq Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2820-1 November 26, 2015
dpkg vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.10 - Ubuntu 15.04 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS
Summary:
dpkg-deb could be made to crash or run programs as your login if it opened a specially crafted file.
Software Description: - dpkg: Debian package management system
Details:
Hanno Boeck discovered that the dpkg-deb tool incorrectly handled certain old style Debian binary packages. If a user or an automated system were tricked into unpacking a specially crafted binary package, a remote attacker could possibly use this issue to execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.10: dpkg 1.18.2ubuntu5.1
Ubuntu 15.04: dpkg 1.17.25ubuntu1.1
Ubuntu 14.04 LTS: dpkg 1.17.5ubuntu5.5
Ubuntu 12.04 LTS: dpkg 1.16.1.2ubuntu7.7
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2820-1 CVE-2015-0860
Package Information: https://launchpad.net/ubuntu/+source/dpkg/1.18.2ubuntu5.1 https://launchpad.net/ubuntu/+source/dpkg/1.17.25ubuntu1.1 https://launchpad.net/ubuntu/+source/dpkg/1.17.5ubuntu5.5 https://launchpad.net/ubuntu/+source/dpkg/1.16.1.2ubuntu7.7
--twq08nA6BCBvjmxGJEFhvuns3caU020Wq Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIcBAEBCgAGBQJWV1Q/AAoJEGVp2FWnRL6TLfUP/3l3rxGwaednsZjIcO6knJ/6 6BCBez8Uj5UKpGSXRp0xzFYXvPCwlW8lXvVaT8sVk71spzBVo92UU9/CPG/JzMJd fvZa/SBney6h1tiiGXQRlMTnm5douV+jdaV96UTGBSQebk9QacCyIau2DBk8dNA2 /ZOjPZkAcY7qjPNeFKqRxaOLtKE01EhXPkiQrODmi+rMH+5e9SFs/fpzL0qopGXv RXAEjlEgrd9cXyXyQfML6TydvqXS6NP1bFARJqbty1uYKwI9cLLPBI7DPaXGcqLe 01TdwAOQRhxQpfVatvs/l/YU4HWhEa+K7Cp6XeRku1jGf7kh1JW4GSqo6Pt+WdvS Y02v6OyW/XtJgoSm6Khn8Er8gq/sTgNo7vEMfk7aMxRjfpdi9ZjQZYnBisCzQP6q GwqAcJc8K0tY2O/29LuKZORKhLGe13jjCPlbX7YcauLsfUtq7UE6vPLu1JjMhbLM Tt21y3LuRCocMcRGqouK+R0Hfudj34PfBuTxttVJkWrUW+iXfNtp4fSjpKiT56AA xuo2jaDp8WNrZFRirpgFbocvxaE2htmX/GoZwKxluHeGoITJbUMK88KLm1vNA5n/ hEIdkWgUmycEw300U1bLhXvR1VmGHThcoPlCTxQiaXm8NVaODpnpVcZsD5ajWexA Dz48Y7JNzvb27HZMAmWe =/Ovi -----END PGP SIGNATURE-----
--twq08nA6BCBvjmxGJEFhvuns3caU020Wq--
--===============3372351942015785901== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============3372351942015785901==--
|
|
|
|