drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen von Code mit höheren Privilegien in snapd
Name: |
Ausführen von Code mit höheren Privilegien in snapd |
|
ID: |
USN-3887-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 18.10 |
|
Datum: |
Di, 12. Februar 2019, 19:18 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7304 |
|
Applikationen: |
Snap |
|
Originalnachricht |
--===============3213099575711281777== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="XMCwj5IQnwKtuyBG" Content-Disposition: inline
--XMCwj5IQnwKtuyBG Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-3887-1 February 12, 2019
snapd vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.10 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS
Summary:
snapd could be made to run programs as an administrator.
Software Description: - snapd: Daemon and tooling that enable snap packages
Details:
Chris Moberly discovered that snapd versions 2.28 through 2.37 incorrectly validated and parsed the remote socket address when performing access controls on its UNIX socket. A local attacker could use this to access privileged socket APIs and obtain administrator privileges. On Ubuntu systems with snaps installed, snapd typically will have already automatically refreshed itself to snapd 2.37.1 which is unaffected.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.10: snapd 2.35.5+18.10.1
Ubuntu 18.04 LTS: snapd 2.34.2+18.04.1
Ubuntu 16.04 LTS: snapd 2.34.2ubuntu0.1
Ubuntu 14.04 LTS: snapd 2.34.2~14.04.1
In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/usn/usn-3887-1 CVE-2019-7304, https://launchpad.net/bugs/1813365
Package Information: https://launchpad.net/ubuntu/+source/snapd/2.35.5+18.10.1 https://launchpad.net/ubuntu/+source/snapd/2.34.2+18.04.1 https://launchpad.net/ubuntu/+source/snapd/2.34.2ubuntu0.1 https://launchpad.net/ubuntu/+source/snapd/2.34.2~14.04.1
--XMCwj5IQnwKtuyBG Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAABCgAdFiEETCDAa12L3miIVNKKUdvcWMxVlXMFAlxi/bQACgkQUdvcWMxV lXO0fRAAvGphltIqlPK6SZdH24KJaFpEv5wP8BkqMDI04G3rMyyNYONzS0oWnQ0e u/+epeKGE9IIc9T4erkXCjN0BGzp9VSAapF0gJAkBf6+OOn8ePjRdUy45YWfRpE5 Q7wh3KDhkkFaRPM0qziwUh1YLMlpqZOAyt7Y28u+jgnEhn0clISdUnrq3jLmEtER dqN2nSvlcys1ULdlWnDOsgnOKGO0Bxuhazt7ZXHCUPByajpsHAtUp/kFW43VaEFT AEhfljNZCbVhR7/RllDVJhmEQUxau8WGwVq5M7UhkwpaB1XN+JcKLVijZ1FDAAlV qaK36APUrt95LiJcM7+/f8uKxwkJmSdDOYAfoX0Cer/HzoXtx5ZNAM7oGqUl35Ps pZjGbU38xNmMEKCiK3F5XaYbxewimL5jrW3dXNOoPcAwz4O1R9vIqnnBp0aHQ9Gt L0tmd2CH8/qXd1vNoKwA6//sPY48yXIok3Kf7pE7cEsV2GFYItbmxUrsX432wIT/ CJRjdi3Ewj1DbwCpTyoyJWWlOAbDTuBWn3nXImajLc5pE63x0sThE4pMLuNC0wSU jZcKLVwSxfS+Lcve5T0k9LoYdcTTNVEOR18tQv8ZvIZD0yKXlEvoRXLsC6Og6SHN 2v30yiP9O/kYOA7ftum+UmEeQJuiIuH86KYr5SJuvgUz7+4wXMg= =cWoV -----END PGP SIGNATURE-----
--XMCwj5IQnwKtuyBG--
--===============3213099575711281777== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
|
|
|
|