-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2010.0229
                     gnome-screensaver vulnerabilities
                               9 March 2010

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           gnome-screensaver
Publisher:         Ubuntu
Operating System:  Ubuntu
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Unauthorised Access -- Console/Physical
Resolution:        Patch/Upgrade
CVE Names:         CVE-2010-0422 CVE-2010-0285 

Original Bulletin: 
   http://www.ubuntu.com/usn/usn-907-1

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Ubuntu. It is recommended that administrators 
         running gnome-screensaver check for an updated version of the 
         software for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

===========================================================
Ubuntu Security Notice USN-907-1             March 08, 2010
gnome-screensaver vulnerabilities
CVE-2010-0285, CVE-2010-0422
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 8.10
Ubuntu 9.04
Ubuntu 9.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.10:
  gnome-screensaver               2.24.0-0ubuntu2.1

Ubuntu 9.04:
  gnome-screensaver               2.24.0-0ubuntu6.1

Ubuntu 9.10:
  gnome-screensaver               2.28.0-0ubuntu3.5

After a standard system upgrade you need to restart your session to effect
the necessary changes.

Details follow:

It was discovered that gnome-screensaver did not correctly lock all screens
when monitors get hotplugged. An attacker with physical access could use
this flaw to gain access to a locked session. (CVE-2010-0285)

It was discovered that gnome-screensaver did not correctly handle keyboard
grab when monitors get hotplugged. An attacker with physical access could
use this flaw to gain access to a locked session. This issue only affected
Ubuntu 9.10. (CVE-2010-0422)


Updated packages for Ubuntu 8.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s=
creensaver_2.24.0-0ubuntu2.1.diff.gz
      Size/MD5:     9612 6be699dcee9fece9c466a64e792cce73
    http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s=
creensaver_2.24.0-0ubuntu2.1.dsc
      Size/MD5:     1876 a01ab7300a5da151236e9a21916923e6
    http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s=
creensaver_2.24.0.orig.tar.gz
      Size/MD5:  2351712 bc9a89cc8a146b88dd844a212f1d7b7c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s=
creensaver_2.24.0-0ubuntu2.1_amd64.deb
      Size/MD5:  1555572 7a7f89ace5e54f72090b7fcedb086db3

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s=
creensaver_2.24.0-0ubuntu2.1_i386.deb
      Size/MD5:  1538164 fa835001734e052ce9a11564efe56e03

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver=
_2.24.0-0ubuntu2.1_lpia.deb
      Size/MD5:  1537264 a726d038c71545341afdb2a224c24905

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver=
_2.24.0-0ubuntu2.1_powerpc.deb
      Size/MD5:  1563500 f8b0c692c4fc204599a727eb2c9624e6

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver=
_2.24.0-0ubuntu2.1_sparc.deb
      Size/MD5:  1547504 91dd1e6cd5f574bda3cda18af09f3d49

Updated packages for Ubuntu 9.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s=
creensaver_2.24.0-0ubuntu6.1.diff.gz
      Size/MD5:    11343 c73c5f68b94850272966c41dc2597353
    http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s=
creensaver_2.24.0-0ubuntu6.1.dsc
      Size/MD5:     1879 07c2b16b0109989db32c0334be335914
    http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s=
creensaver_2.24.0.orig.tar.gz
      Size/MD5:  2351712 bc9a89cc8a146b88dd844a212f1d7b7c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s=
creensaver_2.24.0-0ubuntu6.1_amd64.deb
      Size/MD5:  1448284 8c6d47094ae8cb9c08a07cbfec8e4816

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s=
creensaver_2.24.0-0ubuntu6.1_i386.deb
      Size/MD5:  1431876 484dad84cabe56534c4b71ef41efd588

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver=
_2.24.0-0ubuntu6.1_lpia.deb
      Size/MD5:  1431312 f8094316f1272daea3e3c1efd92902d4

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver=
_2.24.0-0ubuntu6.1_powerpc.deb
      Size/MD5:  1457084 7182af1a4f434a7105b3e5b82a4dfa6f

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver=
_2.24.0-0ubuntu6.1_sparc.deb
      Size/MD5:  1441116 0cb7171c755238f3e916594c664d3621

Updated packages for Ubuntu 9.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s=
creensaver_2.28.0-0ubuntu3.5.diff.gz
      Size/MD5:    15733 83ebe53647460755684705710e36e896
    http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s=
creensaver_2.28.0-0ubuntu3.5.dsc
      Size/MD5:     1757 6009f51f8967671d5e19cfc31d6394e5
    http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s=
creensaver_2.28.0.orig.tar.gz
      Size/MD5:  5069053 cdf328a0443a3cc30b4b2b36d9a99236

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s=
creensaver_2.28.0-0ubuntu3.5_amd64.deb
      Size/MD5:  4186276 0de4fd7dbe92652da6abb4a0da360ca7

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-s=
creensaver_2.28.0-0ubuntu3.5_i386.deb
      Size/MD5:  4169778 806e2cea1aec193ce6eb8dd6b3f0b463

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver=
_2.28.0-0ubuntu3.5_lpia.deb
      Size/MD5:  4170634 dda9049c711b0344a92e8e0862fccbb1

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver=
_2.28.0-0ubuntu3.5_powerpc.deb
      Size/MD5:  4180178 ec0f991d3cebdf2d3d89a369acfa9536

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver=
_2.28.0-0ubuntu3.5_sparc.deb
      Size/MD5:  4178644 a2c8b28772363b5cbda5c14865b8ed49

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFLlYQ0/iFOrG6YcBERAjWUAKDSjZtqaV2v1eHsM0gpBFIn03n7pQCeIDHV
4hzpVTbk6+BWyu9QLzZ2ZTY=
=bNgX
-----END PGP SIGNATURE-----