Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2010.0229 gnome-screensaver vulnerabilities 9 March 2010 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: gnome-screensaver Publisher: Ubuntu Operating System: Ubuntu UNIX variants (UNIX, Linux, OSX) Impact/Access: Unauthorised Access -- Console/Physical Resolution: Patch/Upgrade CVE Names: CVE-2010-0422 CVE-2010-0285 Original Bulletin: http://www.ubuntu.com/usn/usn-907-1 Comment: This advisory references vulnerabilities in products which run on platforms other than Ubuntu. It is recommended that administrators running gnome-screensaver check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- =========================================================== Ubuntu Security Notice USN-907-1 March 08, 2010 gnome-screensaver vulnerabilities CVE-2010-0285, CVE-2010-0422 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 8.10 Ubuntu 9.04 Ubuntu 9.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 8.10: gnome-screensaver 2.24.0-0ubuntu2.1 Ubuntu 9.04: gnome-screensaver 2.24.0-0ubuntu6.1 Ubuntu 9.10: gnome-screensaver 2.28.0-0ubuntu3.5 After a standard system upgrade you need to restart your session to effect the necessary changes. Details follow: It was discovered that gnome-screensaver did not correctly lock all screens when monitors get hotplugged. An attacker with physical access could use this flaw to gain access to a locked session. (CVE-2010-0285) It was discovered that gnome-screensaver did not correctly handle keyboard grab when monitors get hotplugged. An attacker with physical access could use this flaw to gain access to a locked session. This issue only affected Ubuntu 9.10. (CVE-2010-0422) Updated packages for Ubuntu 8.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s= creensaver_2.24.0-0ubuntu2.1.diff.gz Size/MD5: 9612 6be699dcee9fece9c466a64e792cce73 http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s= creensaver_2.24.0-0ubuntu2.1.dsc Size/MD5: 1876 a01ab7300a5da151236e9a21916923e6 http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s= creensaver_2.24.0.orig.tar.gz Size/MD5: 2351712 bc9a89cc8a146b88dd844a212f1d7b7c amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s= creensaver_2.24.0-0ubuntu2.1_amd64.deb Size/MD5: 1555572 7a7f89ace5e54f72090b7fcedb086db3 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s= creensaver_2.24.0-0ubuntu2.1_i386.deb Size/MD5: 1538164 fa835001734e052ce9a11564efe56e03 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver= _2.24.0-0ubuntu2.1_lpia.deb Size/MD5: 1537264 a726d038c71545341afdb2a224c24905 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver= _2.24.0-0ubuntu2.1_powerpc.deb Size/MD5: 1563500 f8b0c692c4fc204599a727eb2c9624e6 sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver= _2.24.0-0ubuntu2.1_sparc.deb Size/MD5: 1547504 91dd1e6cd5f574bda3cda18af09f3d49 Updated packages for Ubuntu 9.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s= creensaver_2.24.0-0ubuntu6.1.diff.gz Size/MD5: 11343 c73c5f68b94850272966c41dc2597353 http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s= creensaver_2.24.0-0ubuntu6.1.dsc Size/MD5: 1879 07c2b16b0109989db32c0334be335914 http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s= creensaver_2.24.0.orig.tar.gz Size/MD5: 2351712 bc9a89cc8a146b88dd844a212f1d7b7c amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s= creensaver_2.24.0-0ubuntu6.1_amd64.deb Size/MD5: 1448284 8c6d47094ae8cb9c08a07cbfec8e4816 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s= creensaver_2.24.0-0ubuntu6.1_i386.deb Size/MD5: 1431876 484dad84cabe56534c4b71ef41efd588 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver= _2.24.0-0ubuntu6.1_lpia.deb Size/MD5: 1431312 f8094316f1272daea3e3c1efd92902d4 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver= _2.24.0-0ubuntu6.1_powerpc.deb Size/MD5: 1457084 7182af1a4f434a7105b3e5b82a4dfa6f sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver= _2.24.0-0ubuntu6.1_sparc.deb Size/MD5: 1441116 0cb7171c755238f3e916594c664d3621 Updated packages for Ubuntu 9.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s= creensaver_2.28.0-0ubuntu3.5.diff.gz Size/MD5: 15733 83ebe53647460755684705710e36e896 http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s= creensaver_2.28.0-0ubuntu3.5.dsc Size/MD5: 1757 6009f51f8967671d5e19cfc31d6394e5 http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s= creensaver_2.28.0.orig.tar.gz Size/MD5: 5069053 cdf328a0443a3cc30b4b2b36d9a99236 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s= creensaver_2.28.0-0ubuntu3.5_amd64.deb Size/MD5: 4186276 0de4fd7dbe92652da6abb4a0da360ca7 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s= creensaver_2.28.0-0ubuntu3.5_i386.deb Size/MD5: 4169778 806e2cea1aec193ce6eb8dd6b3f0b463 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver= _2.28.0-0ubuntu3.5_lpia.deb Size/MD5: 4170634 dda9049c711b0344a92e8e0862fccbb1 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver= _2.28.0-0ubuntu3.5_powerpc.deb Size/MD5: 4180178 ec0f991d3cebdf2d3d89a369acfa9536 sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver= _2.28.0-0ubuntu3.5_sparc.deb Size/MD5: 4178644 a2c8b28772363b5cbda5c14865b8ed49 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFLlYQ0/iFOrG6YcBERAjWUAKDSjZtqaV2v1eHsM0gpBFIn03n7pQCeIDHV 4hzpVTbk6+BWyu9QLzZ2ZTY= =bNgX -----END PGP SIGNATURE-----