Uočen je sigurnosni propust grafičkog sučelja system-config-firewall koji omogućuje lokalnim korisnicima dobivanje većih privilegija.
Paket:
system-config-firewall 1.x
Operacijski sustavi:
Fedora 15
Kritičnost:
6
Problem:
neodgovarajuće rukovanje datotekama
Iskorištavanje:
lokalno
Posljedica:
dobivanje većih privilegija
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-2520
Izvorni ID preporuke:
FEDORA-2011-9652
Izvor:
Fedora
Problem:
Ranjivost je vezana uz datoteku "fw_dbus.py" koja na nesiguran način koristi "pickle Python" modul prilikom komunikacije između grafičkog sučelja i pozadinskog programskog koda.
Posljedica:
Lokalni korisnik pomoću uočene ranjivosti može povećati ovlasti putem posebno oblikovanog serijaliziranog objekta.
Rješenje:
Svim korisnicima savjetuje se nadogradnja na najnoviju inačicu programskog paketa.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-9652
2011-07-23 01:34:32
--------------------------------------------------------------------------------
Name : system-config-firewall
Product : Fedora 15
Version : 1.2.29
Release : 4.fc15
URL : http://fedorahosted.org/system-config-firewall
Summary : A graphical interface for basic firewall setup
Description :
system-config-firewall is a graphical user interface for basic firewall setup.
--------------------------------------------------------------------------------
Update Information:
- fixed possible privilege escalation flaw via use of python pickle
(CVE-2011-2520), replaced pickle by json (rhbz#717985) and (rhbz#722991)
- stop D-BUS firewall mechanism on update, because D-BUS interface will not
be compatible to old pickle version
- system-config-printer needs to get updated, too
--------------------------------------------------------------------------------
ChangeLog:
* Fri Jul 22 2011 Thomas Woerner <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.2.29-4
- fixed possible privilege escalation flaw via use of python pickle
(CVE-2011-2520), replaced pickle by json (rhbz#717985) and (rhbz#722991)
- stop D-BUS firewall mechanism on update
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #717985 - CVE-2011-2520 system-config-firewall: privilege
escalation flaw via use of python pickle
https://bugzilla.redhat.com/show_bug.cgi?id=717985
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update system-config-firewall' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke