Login
Newsletter
Werbung

Sicherheit: Ausführen von Code mit höheren Privilegien in Aptdaemon
Aktuelle Meldungen Distributionen
Name: Ausführen von Code mit höheren Privilegien in Aptdaemon
ID: USN-2648-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 14.10, Ubuntu 15.04
Datum: Di, 16. Juni 2015, 22:38
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1323
Applikationen: Aptdaemon

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============7055638730820098899==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="4ExREA0UpsbBJERRbRSxIsdk6E3VoOAPF"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--4ExREA0UpsbBJERRbRSxIsdk6E3VoOAPF
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2648-1
June 16, 2015

aptdaemon vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.04
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Aptdaemon could be made to expose sensitive information, or allow file
access as the administrator.

Software Description:
- aptdaemon: transaction based package management service

Details:

Tavis Ormandy discovered that Aptdeamon incorrectly handled the simulate
dbus method. A local attacker could use this issue to possibly expose
sensitive information, or perform other file access as the root user.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
aptdaemon 1.1.1+bzr982-0ubuntu3.1

Ubuntu 14.10:
aptdaemon 1.1.1+bzr980-0ubuntu1.1

Ubuntu 14.04 LTS:
aptdaemon 1.1.1-1ubuntu5.2

Ubuntu 12.04 LTS:
aptdaemon 0.43+bzr805-0ubuntu10

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2648-1
CVE-2015-1323

Package Information:
https://launchpad.net/ubuntu/+source/aptdaemon/1.1.1+bzr982-0ubuntu3.1
https://launchpad.net/ubuntu/+source/aptdaemon/1.1.1+bzr980-0ubuntu1.1
https://launchpad.net/ubuntu/+source/aptdaemon/1.1.1-1ubuntu5.2
https://launchpad.net/ubuntu/+source/aptdaemon/0.43+bzr805-0ubuntu10



--4ExREA0UpsbBJERRbRSxIsdk6E3VoOAPF
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Hu6U
-----END PGP SIGNATURE-----

--4ExREA0UpsbBJERRbRSxIsdk6E3VoOAPF--


--===============7055638730820098899==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============7055638730820098899==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung