First published: Thu Jun 07 2012(Updated: )
DistUpgrade/DistUpgradeMain.py in Update Manager, as used by Ubuntu 12.04 LTS, 11.10, and 11.04, uses weak permissions for (1) apt-clone_system_state.tar.gz and (2) system_state.tar.gz, which allows local users to obtain repository credentials.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME Update Manager Core | =0.150.5.2 | |
GNOME Update Manager Core | =0.152.25.10 | |
GNOME Update Manager Core | =0.156.14.3 | |
Ubuntu | =11.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0948 has a medium severity level due to the potential exposure of repository credentials to local users.
To fix CVE-2012-0948, apply the latest updates to the Update Manager or modify permissions on the affected files accordingly.
CVE-2012-0948 affects Ubuntu versions 11.04, 11.10, and 12.04 LTS.
CVE-2012-0948 is a local privilege escalation vulnerability.
Yes, local users can exploit CVE-2012-0948 to obtain repository credentials through weak file permissions.