drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Whoopsie
Name: |
Mehrere Probleme in Whoopsie |
|
ID: |
USN-4450-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS |
|
Datum: |
Di, 4. August 2020, 23:33 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15570
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12135 |
|
Applikationen: |
Whoopsie |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============5186609480057962158== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="u6qF3XAtaW3XYS9vHujgAa4GUDxDT7scp"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --u6qF3XAtaW3XYS9vHujgAa4GUDxDT7scp Content-Type: multipart/mixed; boundary="oPLI8dfWwBduJa8ngoPQ86mUUI8ygsgrj"
--oPLI8dfWwBduJa8ngoPQ86mUUI8ygsgrj Content-Type: text/plain; charset=utf-8 Content-Language: en-C Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4450-1 August 04, 2020
whoopsie vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in whoopsie.
Software Description: - whoopsie: Ubuntu error tracker submission
Details:
Seong-Joong Kim discovered that Whoopsie incorrectly handled memory. A local attacker could use this issue to cause Whoopsie to consume memory, resulting in a denial of service. (CVE-2020-11937)
Seong-Joong Kim discovered that Whoopsie incorrectly handled parsing files. A local attacker could use this issue to cause Whoopsie to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-12135)
Seong-Joong Kim discovered that Whoopsie incorrectly handled memory. A local attacker could use this issue to cause Whoopsie to consume memory, resulting in a denial of service. (CVE-2020-15570)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04 LTS: libwhoopsie0 0.2.69ubuntu0.1 whoopsie 0.2.69ubuntu0.1
Ubuntu 18.04 LTS: libwhoopsie0 0.2.62ubuntu0.5 whoopsie 0.2.62ubuntu0.5
Ubuntu 16.04 LTS: libwhoopsie0 0.2.52.5ubuntu0.5 whoopsie 0.2.52.5ubuntu0.5
In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/4450-1 CVE-2020-11937, CVE-2020-12135, CVE-2020-15570
Package Information: https://launchpad.net/ubuntu/+source/whoopsie/0.2.69ubuntu0.1 https://launchpad.net/ubuntu/+source/whoopsie/0.2.62ubuntu0.5 https://launchpad.net/ubuntu/+source/whoopsie/0.2.52.5ubuntu0.5
--oPLI8dfWwBduJa8ngoPQ86mUUI8ygsgrj--
--u6qF3XAtaW3XYS9vHujgAa4GUDxDT7scp Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAl8pq8kACgkQZWnYVadE vpNT2Q//QpgmI/zkdnjsdR0SpIZmywIip0ZKKO8CbjQJrJ8/918bRFXY3h2VG+9Z EnsvkyPfO4bRLaA/AIbsw7/Oa0ezz80vkzxUe7qV8eg1M+ysn4WNOtOc+7b6NBuz IQxhU07b/1KUyufBNbNg1g1BCf6D2iwgbdCMfA3n0aV/JtnYNAJqcTx/NVQl+YUt H4XEdTEOoaD+awE/5KEKZZO6/CZxgsGa2MVFGoi9b5moLk8ePWxwPISgVPKgJx9x RY7HEHVpgof97X2aT40v6RvgUr9IZ16nvE1jQfQWfQ43ue5wD4zDSClPbmwJlqjM BJeePIixWFHeryUeq9kwkUtd9OYfnZIcSb8cSkC6OS17Hw/yj54+g6a129VsqoFP 0l3XNyv4yj9MqT9NGG54InsSTqkUNbIY0vnFHfsidyHZU2DUABRdqY7abOMDQCG1 b4MjWj5EaADkY+QVAVL0u2RRSTU5lhPE5O41k3UIjyk2iIiouu/fzbSVWmNhU6bK p/uEagv0HDQd2SXRgwMrAe5p6NvnCWWDrSQaRaOk+S9IfqG9jFmwT5c4lidaT36s HALxjmW0qshsdybYvVral+brAYB5TVhUqDTFhOeNOYgiPiNVG13sgUcXjdkXK0Xp nHZpQo9WfGdyVpgRVcIUg2mctlp/WGC33V+6tCn7CQXdizCS2is= =sSke -----END PGP SIGNATURE-----
--u6qF3XAtaW3XYS9vHujgAa4GUDxDT7scp--
--===============5186609480057962158== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============5186609480057962158==--
|
|
|
|