Wednesday, September 18, 2013

[USN-1961-1] systemd vulnerability

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=8vj/
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1961-1
September 18, 2013

systemd vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.04

Summary:

systemd could be tricked into bypassing polkit authorizations.

Software Description:
- systemd: system and service manager

Details:

It was discovered that systemd was using polkit in an unsafe manner. A
local attacker could possibly use this issue to bypass intended polkit
authorizations.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.04:
systemd-services 198-0ubuntu11.2

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1961-1
CVE-2013-4327

Package Information:
https://launchpad.net/ubuntu/+source/systemd/198-0ubuntu11.2

No comments:

Post a Comment