drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Prüfung von Schlüsseln in APT
Name: |
Mangelnde Prüfung von Schlüsseln in APT |
|
ID: |
USN-1477-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 11.04, Ubuntu 11.10, Ubuntu 12.04 LTS |
|
Datum: |
Sa, 16. Juni 2012, 01:23 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0954 |
|
Applikationen: |
APT |
|
Originalnachricht |
--===============8958890454622126222== Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="=-yhN5DL1piBPj0OJ5u/db"
--=-yhN5DL1piBPj0OJ5u/db Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1477-1 June 15, 2012
apt vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS - Ubuntu 11.10 - Ubuntu 11.04 - Ubuntu 10.04 LTS - Ubuntu 8.04 LTS
Summary:
An attacker could trick APT into installing altered packages.
Software Description: - apt: Advanced front-end for dpkg
Details:
Georgi Guninski discovered that APT did not properly validate imported keyrings via apt-key net-update. USN-1475-1 added additional verification for imported keyrings, but it was insufficient. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially be used to install altered packages. This update corrects the issue by disabling the net-update option completely. A future update will re-enable the option with corrected verification.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 LTS: apt 0.8.16~exp12ubuntu10.2
Ubuntu 11.10: apt 0.8.16~exp5ubuntu13.5
Ubuntu 11.04: apt 0.8.13.2ubuntu4.6
Ubuntu 10.04 LTS: apt 0.7.25.3ubuntu9.13
Ubuntu 8.04 LTS: apt 0.7.9ubuntu17.6
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1477-1 CVE-2012-0954
Package Information: https://launchpad.net/ubuntu/+source/apt/0.8.16~exp12ubuntu10.2 https://launchpad.net/ubuntu/+source/apt/0.8.16~exp5ubuntu13.5 https://launchpad.net/ubuntu/+source/apt/0.8.13.2ubuntu4.6 https://launchpad.net/ubuntu/+source/apt/0.7.25.3ubuntu9.13 https://launchpad.net/ubuntu/+source/apt/0.7.9ubuntu17.6
--ÒhN5DL1piBPj0OJ5u/db Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)
iQIcBAABCgAGBQJP26rUAAoJEFHb3FjMVZVzz7gP+wd0O71eJOQB+eTQ0zun0jyH vRkFcsqpC5qO6VTmBrO61IQ3G+LEYyqz7kIuNVeS0+Lt2l86Ykn6P6S5Lte42akE x2I2FzVh4S6q/xKuIHWkAZn1XvlwkuJi5Gp5RWr4htU8fqsrb+cwa6pRQCo4oOi7 bUwWF+mWHTN8f+fK7PrulczxgYoLojLNJJVTgX0r/B3CNIFV0yqopRM1Nq6y/ZB9 tkTo8L2lAdKVzNmSfOQHPEaXb6pAtFGvOW7nKHuk/BXemXsbvMD44pbZNts26bPY xk1pR2iMZsHXV25bb1SVqkD1MTrQBob8YBiMYMCGyN4tXTysMH07jMqH7en+CU/M YGMhO7+tbUw6lHOpmk+dEIIS+D5pErNKpqhYED80ibckaYDFQXMe7RRCxxQ1ZVZs v5NEmYBF7Dxy8E1iB+Q4vYn1Wq6t45Aszi/UdoACM1pbEtXlOM8UOhDx/0wPUnQM jmi8eIdbKB5aCD6q78e8KGFtcySvLXzJ/N2yi1JMdKXnN0pcPOUVSjC8thppvx7C dPeEDgN7K+O6CflomT+RZMfluQHa03o6wZW6n9BmHjm3arTZVN4YGoATk7BXt+Dc v6A5hE96irfWYOk951nIo0Q5HLGkPPGfClQCRNvVfNtjmh9VPEguTWfdQNY8W5u0 q4A3Rg59aKGYxC/GqV04 =0IxN -----END PGP SIGNATURE-----
--=-yhN5DL1piBPj0OJ5u/db--
--===============8958890454622126222== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============8958890454622126222==--
|
|
|
|