Login
Newsletter
Werbung

Sicherheit: Überschreiben von Dateien in GNOME (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Überschreiben von Dateien in GNOME (Aktualisierung)
ID: USN-4733-2
Distribution: Ubuntu
Plattformen: Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 20.10
Datum: Mo, 8. März 2021, 23:23
Referenzen: Keine Angabe
Applikationen: GNOME
Update von: Überschreiben von Dateien in GNOME

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============8718960457287510242==
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="p5DpOxeasf0pQQbTtjprbYpRkJijhfdkM"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--p5DpOxeasf0pQQbTtjprbYpRkJijhfdkM
Content-Type: multipart/mixed;
boundary="zarKwnxpFE7OmLQ7olIveH87s5QAQxGtJ";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: "ubuntu-security-announce@lists.ubuntu.com"
<ubuntu-security-announce@lists.ubuntu.com>
Message-ID: <5ada3557-91f5-4a0d-6415-865a55ed1309@canonical.com>
Subject: [USN-4733-2] GNOME Autoar regression

--zarKwnxpFE7OmLQ7olIveH87s5QAQxGtJ
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-4733-2
March 08, 2021

gnome-autoar regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

USN-4733-1 introduced a regression in GNOME Autoar.

Software Description:
- gnome-autoar: Archive integration support for GNOME

Details:

USN-4733-1 fixed a vulnerability in GNOME Autoar. The upstream fix
introduced a regression when extracting archives containing directories.
This update fixes the problem.

Original advisory details:

Yiğit Can Yılmaz discovered that GNOME Autoar could extract files outside
of the intended directory. If a user were tricked into extracting a
specially crafted archive, a remote attacker could create files in
arbitrary locations, possibly leading to code execution.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.10:
libgnome-autoar-0-0 0.2.4-2ubuntu0.2
libgnome-autoar-gtk-0-0 0.2.4-2ubuntu0.2

Ubuntu 20.04 LTS:
libgnome-autoar-0-0 0.2.3-2ubuntu0.2
libgnome-autoar-gtk-0-0 0.2.3-2ubuntu0.2

Ubuntu 18.04 LTS:
libgnome-autoar-0-0 0.2.3-1ubuntu0.2
libgnome-autoar-gtk-0-0 0.2.3-1ubuntu0.2

After a standard system update you need to restart your session to make
all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-4733-2
https://ubuntu.com/security/notices/USN-4733-1
https://launchpad.net/bugs/1917812

Package Information:
https://launchpad.net/ubuntu/+source/gnome-autoar/0.2.4-2ubuntu0.2
https://launchpad.net/ubuntu/+source/gnome-autoar/0.2.3-2ubuntu0.2
https://launchpad.net/ubuntu/+source/gnome-autoar/0.2.3-1ubuntu0.2


--zarKwnxpFE7OmLQ7olIveH87s5QAQxGtJ--

--p5DpOxeasf0pQQbTtjprbYpRkJijhfdkM
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----
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=ZA7O
-----END PGP SIGNATURE-----

--p5DpOxeasf0pQQbTtjprbYpRkJijhfdkM--


--===============8718960457287510242==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============8718960457287510242==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung