Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in libbsd
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in libbsd
ID: USN-4243-1
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS, Ubuntu 12.04 ESM, Ubuntu 18.04 LTS, Ubuntu 19.04, Ubuntu 14.04 ESM
Datum: Mo, 20. Januar 2020, 18:17
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2090
Applikationen: libbsd

Originalnachricht


--===============8080847545075419701==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="7ZAtKRhVyVSsbBD2"
Content-Disposition: inline


--7ZAtKRhVyVSsbBD2
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-4243-1
January 20, 2020

libbsd vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.04
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 ESM
- Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in libbsd.

Software Description:
- libbsd: utility functions from BSD systems - development files

Details:

It was discovered that libbsd incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
This issue only affected Ubuntu 14.04 ESM. (CVE-2016-2090)

It was discovered that libbsd incorrectly handled certain strings.
An attacker could possibly use this issue to access sensitive information.
(CVE-2019-20367)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.04:
libbsd0 0.9.1-2ubuntu0.1

Ubuntu 18.04 LTS:
libbsd0 0.8.7-1ubuntu0.1

Ubuntu 16.04 LTS:
libbsd0 0.8.2-1ubuntu0.1

Ubuntu 14.04 ESM:
libbsd0 0.6.0-2ubuntu1+esm1

Ubuntu 12.04 ESM:
libbsd0 0.3.0-2ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4243-1
CVE-2016-2090, CVE-2019-20367

Package Information:
https://launchpad.net/ubuntu/+source/libbsd/0.9.1-2ubuntu0.1
https://launchpad.net/ubuntu/+source/libbsd/0.8.7-1ubuntu0.1
https://launchpad.net/ubuntu/+source/libbsd/0.8.2-1ubuntu0.1

--7ZAtKRhVyVSsbBD2
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQIzBAABCgAdFiEEf+ebRFcoyOoAQoOeRbznW4QLH2kFAl4l1lAACgkQRbznW4QL
H2kLSA/9EG0lvmc2Dc8BT19oX2YdvawPO3snzd92EHnx0DFaIDhCn0CiMdeOe6L8
Q1nybidffT2y7QVWi+o86qXvfpGWj7ENao5sw8PBh7Nyrg91oKt4gFPkKwk6AWdU
HEUW6YeoU1AWQ/enlJ+xlK2d9dx8XwACA9FT02T2bfrcMC8luXqO2hQAv1tifHwB
tRD+8i614Wl3jTMK58XYJLQPDAu/wCyJrqRj4cSCqxeF6wtvt0+Ro4ShDjHNEwHP
1HvCcjoXkRoe/s0OlTLBnw4iNvul7sTUMi7dTXGFmPx1JFPSe/hbZ/yaMaNvVOid
I0tlwCmKxZTQ1t/e80IrrO3W3RooO6gh7p7UJupbimXOi7XImcF2T3Np16QHApaN
ZXHZqYmzd0z88J3nIX3RFS/KF+rMf6RFrguKDjtjNg6mIZbqN5QlntIqwQJvUysj
lUB7BQQhQUjFxtBqtVcCWz3hF06Xoo1cBipjd3udoePSqAghxoXFophH1xTE1VVi
ifxdE5AhvJCA1Jyfv/vk7Uga2Z681TcP2SKZinZY7KG0CB0N6SsFe9ozmWoiKBpB
Jxzhg5l3ZBLOzIVgdgei2jvUBzld/snfpVAzLCcxa1hVb4dqWM7fbcwXO6aRlYtJ
k9SulJKz1T4vcCVgoKI0ThcrQnWRiF5MvJzzbBif7W4l4gYwzwM=
=QNC+
-----END PGP SIGNATURE-----

--7ZAtKRhVyVSsbBD2--


--===============8080847545075419701==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Pro-Linux
Pro-Linux @Twitter
Neue Nachrichten
Werbung