-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
iQIcBAEBCgAGBQJRR0ylAAoJEGVp2FWnRL6Tw08QALwcH5kw3kO6q1I/CNuhJ0cp
9++PF0psukLyUgkQGVkIKUUEisOLqztd6v7dxQ0Vl+zaUBvXCVMMaHTJGqMv+EMM
C/abfH7j6QeZuxc38kIN6mUDdBG4uGDLhE7N1tMZY1JgXgcYgMrKJJK8Et3AIjSD
Lqr6EaIHkFp+Ir2FCR51/LBn7a0FsAidqs4o+txJUC6t08K/udvId+s2fUIkHDyr
Qyni9qakPdiciEyF2qNT7GUZ2sj+qBBZGntw4wBIXE6URhMlJpz1uZ5ZackirGhb
vjlYTi6jmrZmyEVnxS7Y7zbYf56/S/1DwrHS8o1ziQ8sk1HzOoLmgbna6v1HGMyf
7GnzTMdtFifeCevmMpLHiPJRbkttMz5o3H93tNHsysecNnBzA+PY9DUMyD+z3LJz
XfMpfuBqmLevlzU+qctQJg2/IH6tFcEp2/wQ16DYGXiTyn7/rowPsve4r9CZ/kke
gkYqrBIi1n6ZugMQypdAQsWH0t63vyiBrKhrvx2sKpr4UyNlSnbx0rrblt7n12xH
Vm2rrkh4XZNhYOILeC5teTIgVF63q2CuvAFStMht4nhmgBze/JbAzOMThx86DEfa
peocl2xoM9UniVSew3+JQ+iuq4iySKwYwLX6UuqEP2WV6bvjj6F/9ZakE0Iv+qXS
bulWSAVDQvGXqUKou9+8
=K5Vk
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1766-1
March 18, 2013
pam-xdg-support vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
Summary:
pam-xdg-support could be made to run programs as an administrator.
Software Description:
- pam-xdg-support: PAM module for XDG_RUNTIME_DIR support
Details:
Zbigniew Tenerowicz and Sebastian Krzyszkowiak discovered that
pam-xdg-support incorrectly handled the PATH environment variable. A local
attacker could use this issue in combination with sudo to possibly escalate
privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
libpam-xdg-support 0.2-0ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1766-1
CVE-2013-1052
Package Information:
https://launchpad.net/ubuntu/+source/pam-xdg-support/0.2-0ubuntu1.1
No comments:
Post a Comment