-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                   ESB-2009.0423 -- [UNIX/Linux][Ubuntu]
                      apport: Modify Arbitrary Files
                                1 May 2009

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              apport
Publisher:            Ubuntu
Operating System:     Ubuntu
                      UNIX variants (UNIX, Linux, OSX)
Impact:               Modify Arbitrary Files
Access:               Existing Account
CVE Names:            CVE-2009-1295

Original Bulletin:    http://www.ubuntu.com/usn/usn-768-1

Comment: This advisory references vulnerabilities in products which run on
         platforms other than Ubuntu. It is recommended that administrators
         running apport check for an updated version of the software for
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

===========================================================
Ubuntu Security Notice USN-768-1             April 29, 2009
Apport vulnerability
CVE-2009-1295
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 8.04 LTS
Ubuntu 8.10
Ubuntu 9.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.04 LTS:
  apport                          0.108.4

Ubuntu 8.10:
  apport                          0.119.2

Ubuntu 9.04:
  apport                          1.0-0ubuntu5.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Stephane Chazelas discovered that Apport did not safely remove files from
its crash report directory. If Apport had been enabled at some point, a
local attacker could remove arbitrary files from the system.


Updated packages for Ubuntu 8.04 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_0.108.4.dsc
      Size/MD5:      776 84645454e08c3f65d8c52dac74f905be
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_0.108.4.tar.gz
      Size/MD5:   188833 f61510a9319ad3fd3a7903d63f8e96d9

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-gtk_0.108.4_all.deb
      Size/MD5:    55292 4bc790aa6618eecfa27e5b8222e5766f
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-qt_0.108.4_all.deb
      Size/MD5:    54048 d1ac561fe9a5c980cc4150a9939cb722
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-retrace_0.108.4_all.deb
      Size/MD5:    63690 a6b693e4cd22e222a052c0818e43eb2b
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_0.108.4_all.deb
      Size/MD5:   104590 2a61c23a4fcd822dc148151e8b68c447
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/python-apport_0.108.4_all.deb
      Size/MD5:    56970 875f5505b1e258eee1c455cfc270c7f9
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/python-problem-report_0.108.4_all.deb
      Size/MD5:    58658 9f8dc7432955def5e5476d7332ffb725

Updated packages for Ubuntu 8.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_0.119.2.dsc
      Size/MD5:      979 6c0cd091b3970e2761751e54aabed459
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_0.119.2.tar.gz
      Size/MD5:   198567 8a3f6a81452f815b6755da1d024298e9

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-gtk_0.119.2_all.deb
      Size/MD5:    57796 dd4bd02f893e04497f418840d437402c
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-qt_0.119.2_all.deb
      Size/MD5:    56518 8ec6f3cdf154cd94fd93e77186beb50e
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-retrace_0.119.2_all.deb
      Size/MD5:    67036 651104a20557b07edc065157e2539b79
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_0.119.2_all.deb
      Size/MD5:   107536 acaa7af80a1df3c4a87df65fbd772860
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/python-apport_0.119.2_all.deb
      Size/MD5:    61332 9adc2a89f2ddfa53020a43db0646f713
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/python-problem-report_0.119.2_all.deb
      Size/MD5:    61382 8db396b5045a9f5fd365572223377e57

Updated packages for Ubuntu 9.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_1.0-0ubuntu5.2.diff.gz
      Size/MD5:    73978 1036e1541554d50a6b201cf3b9ed2e81
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_1.0-0ubuntu5.2.dsc
      Size/MD5:     1236 a8f08f5b1c8e3970e65cfb705bf72de2
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_1.0.orig.tar.gz
      Size/MD5:   217793 f9932601045b109fbc487b8fdca0c9fa

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-gtk_1.0-0ubuntu5.2_all.deb
      Size/MD5:    67744 3504cedc5be46644d0174438b9613aeb
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-qt_1.0-0ubuntu5.2_all.deb
      Size/MD5:    66374 f799fa04509e8cdcad100a7ca766bd32
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-retrace_1.0-0ubuntu5.2_all.deb
      Size/MD5:    74134 ea67d398ccf8f7070cbe8a2e2326ba97
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_1.0-0ubuntu5.2_all.deb
      Size/MD5:   112574 da9a0460879aee9e8ed7a229a87275db
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/python-apport_1.0-0ubuntu5.2_all.deb
      Size/MD5:    74006 490ed42d9d5f209d5d344ffed151eb5e
    http://security.ubuntu.com/ubuntu/pool/main/a/apport/python-problem-report_1.0-0ubuntu5.2_all.deb
      Size/MD5:    71878 17406c34e7d0467609e22410f70864ab

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFJ+kkGNVH5XJJInbgRAtTlAJ0ZnRyj3RwGI69LccUczUbV+L8ilQCeP7ei
/C06jSGPfYFQy778F2hHLUk=
=1Z9z
-----END PGP SIGNATURE-----