Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2009.0423 -- [UNIX/Linux][Ubuntu] apport: Modify Arbitrary Files 1 May 2009 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: apport Publisher: Ubuntu Operating System: Ubuntu UNIX variants (UNIX, Linux, OSX) Impact: Modify Arbitrary Files Access: Existing Account CVE Names: CVE-2009-1295 Original Bulletin: http://www.ubuntu.com/usn/usn-768-1 Comment: This advisory references vulnerabilities in products which run on platforms other than Ubuntu. It is recommended that administrators running apport check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- =========================================================== Ubuntu Security Notice USN-768-1 April 29, 2009 Apport vulnerability CVE-2009-1295 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 8.04 LTS: apport 0.108.4 Ubuntu 8.10: apport 0.119.2 Ubuntu 9.04: apport 1.0-0ubuntu5.2 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Stephane Chazelas discovered that Apport did not safely remove files from its crash report directory. If Apport had been enabled at some point, a local attacker could remove arbitrary files from the system. Updated packages for Ubuntu 8.04 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_0.108.4.dsc Size/MD5: 776 84645454e08c3f65d8c52dac74f905be http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_0.108.4.tar.gz Size/MD5: 188833 f61510a9319ad3fd3a7903d63f8e96d9 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-gtk_0.108.4_all.deb Size/MD5: 55292 4bc790aa6618eecfa27e5b8222e5766f http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-qt_0.108.4_all.deb Size/MD5: 54048 d1ac561fe9a5c980cc4150a9939cb722 http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-retrace_0.108.4_all.deb Size/MD5: 63690 a6b693e4cd22e222a052c0818e43eb2b http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_0.108.4_all.deb Size/MD5: 104590 2a61c23a4fcd822dc148151e8b68c447 http://security.ubuntu.com/ubuntu/pool/main/a/apport/python-apport_0.108.4_all.deb Size/MD5: 56970 875f5505b1e258eee1c455cfc270c7f9 http://security.ubuntu.com/ubuntu/pool/main/a/apport/python-problem-report_0.108.4_all.deb Size/MD5: 58658 9f8dc7432955def5e5476d7332ffb725 Updated packages for Ubuntu 8.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_0.119.2.dsc Size/MD5: 979 6c0cd091b3970e2761751e54aabed459 http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_0.119.2.tar.gz Size/MD5: 198567 8a3f6a81452f815b6755da1d024298e9 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-gtk_0.119.2_all.deb Size/MD5: 57796 dd4bd02f893e04497f418840d437402c http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-qt_0.119.2_all.deb Size/MD5: 56518 8ec6f3cdf154cd94fd93e77186beb50e http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-retrace_0.119.2_all.deb Size/MD5: 67036 651104a20557b07edc065157e2539b79 http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_0.119.2_all.deb Size/MD5: 107536 acaa7af80a1df3c4a87df65fbd772860 http://security.ubuntu.com/ubuntu/pool/main/a/apport/python-apport_0.119.2_all.deb Size/MD5: 61332 9adc2a89f2ddfa53020a43db0646f713 http://security.ubuntu.com/ubuntu/pool/main/a/apport/python-problem-report_0.119.2_all.deb Size/MD5: 61382 8db396b5045a9f5fd365572223377e57 Updated packages for Ubuntu 9.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_1.0-0ubuntu5.2.diff.gz Size/MD5: 73978 1036e1541554d50a6b201cf3b9ed2e81 http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_1.0-0ubuntu5.2.dsc Size/MD5: 1236 a8f08f5b1c8e3970e65cfb705bf72de2 http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_1.0.orig.tar.gz Size/MD5: 217793 f9932601045b109fbc487b8fdca0c9fa Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-gtk_1.0-0ubuntu5.2_all.deb Size/MD5: 67744 3504cedc5be46644d0174438b9613aeb http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-qt_1.0-0ubuntu5.2_all.deb Size/MD5: 66374 f799fa04509e8cdcad100a7ca766bd32 http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport-retrace_1.0-0ubuntu5.2_all.deb Size/MD5: 74134 ea67d398ccf8f7070cbe8a2e2326ba97 http://security.ubuntu.com/ubuntu/pool/main/a/apport/apport_1.0-0ubuntu5.2_all.deb Size/MD5: 112574 da9a0460879aee9e8ed7a229a87275db http://security.ubuntu.com/ubuntu/pool/main/a/apport/python-apport_1.0-0ubuntu5.2_all.deb Size/MD5: 74006 490ed42d9d5f209d5d344ffed151eb5e http://security.ubuntu.com/ubuntu/pool/main/a/apport/python-problem-report_1.0-0ubuntu5.2_all.deb Size/MD5: 71878 17406c34e7d0467609e22410f70864ab - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFJ+kkGNVH5XJJInbgRAtTlAJ0ZnRyj3RwGI69LccUczUbV+L8ilQCeP7ei /C06jSGPfYFQy778F2hHLUk= =1Z9z -----END PGP SIGNATURE-----