Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Whoopsie
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Whoopsie
ID: USN-4450-1
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS
Datum: Di, 4. August 2020, 23:33
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15570
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12135
Applikationen: Whoopsie

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============5186609480057962158==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="u6qF3XAtaW3XYS9vHujgAa4GUDxDT7scp"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--u6qF3XAtaW3XYS9vHujgAa4GUDxDT7scp
Content-Type: multipart/mixed;
boundary="oPLI8dfWwBduJa8ngoPQ86mUUI8ygsgrj"

--oPLI8dfWwBduJa8ngoPQ86mUUI8ygsgrj
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-4450-1
August 04, 2020

whoopsie vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in whoopsie.

Software Description:
- whoopsie: Ubuntu error tracker submission

Details:

Seong-Joong Kim discovered that Whoopsie incorrectly handled memory. A
local attacker could use this issue to cause Whoopsie to consume memory,
resulting in a denial of service. (CVE-2020-11937)

Seong-Joong Kim discovered that Whoopsie incorrectly handled parsing files.
A local attacker could use this issue to cause Whoopsie to crash, resulting
in a denial of service, or possibly execute arbitrary code.
(CVE-2020-12135)

Seong-Joong Kim discovered that Whoopsie incorrectly handled memory. A
local attacker could use this issue to cause Whoopsie to consume memory,
resulting in a denial of service. (CVE-2020-15570)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
libwhoopsie0 0.2.69ubuntu0.1
whoopsie 0.2.69ubuntu0.1

Ubuntu 18.04 LTS:
libwhoopsie0 0.2.62ubuntu0.5
whoopsie 0.2.62ubuntu0.5

Ubuntu 16.04 LTS:
libwhoopsie0 0.2.52.5ubuntu0.5
whoopsie 0.2.52.5ubuntu0.5

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4450-1
CVE-2020-11937, CVE-2020-12135, CVE-2020-15570

Package Information:
https://launchpad.net/ubuntu/+source/whoopsie/0.2.69ubuntu0.1
https://launchpad.net/ubuntu/+source/whoopsie/0.2.62ubuntu0.5
https://launchpad.net/ubuntu/+source/whoopsie/0.2.52.5ubuntu0.5


--oPLI8dfWwBduJa8ngoPQ86mUUI8ygsgrj--

--u6qF3XAtaW3XYS9vHujgAa4GUDxDT7scp
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=sSke
-----END PGP SIGNATURE-----

--u6qF3XAtaW3XYS9vHujgAa4GUDxDT7scp--


--===============5186609480057962158==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============5186609480057962158==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung