lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20091009143142.GE3892@severus.strandboge.com>
Date: Fri, 9 Oct 2009 09:31:42 -0500
From: Jamie Strandboge <jamie@...onical.com>
To: ubuntu-security-announce@...ts.ubuntu.com
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: [USN-847-2] devscripts vulnerability

===========================================================
Ubuntu Security Notice USN-847-2           October 09, 2009
devscripts vulnerability
CVE-2009-2946
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  devscripts                      2.9.10-0ubuntu0.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

USN-847-1 fixed vulnerabilities in devscripts. This update provides the
corresponding updates for Ubuntu 6.06 LTS.

Original advisory details:

 Raphael Geissert discovered that uscan, a part of devscripts, did not
 properly sanitize its input when processing pathnames. If uscan processed a
 crafted filename for a file on a remote server, an attacker could execute
 arbitrary code with the privileges of the user invoking the program.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/d/devscripts/devscripts_2.9.10-0ubuntu0.1.dsc
      Size/MD5:      715 46fa68657534c79a7742a7561d149764
    http://security.ubuntu.com/ubuntu/pool/main/d/devscripts/devscripts_2.9.10-0ubuntu0.1.tar.gz
      Size/MD5:   341732 84e4aacdd4495ad4df1e5ec2742bbc7e

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/d/devscripts/devscripts_2.9.10-0ubuntu0.1_amd64.deb
      Size/MD5:   296176 c136944ba913bad8591d288ad78ac856

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/d/devscripts/devscripts_2.9.10-0ubuntu0.1_i386.deb
      Size/MD5:   295818 44d8620d6604b9ac51f52e4d4cd0c7dc

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/d/devscripts/devscripts_2.9.10-0ubuntu0.1_powerpc.deb
      Size/MD5:   298350 a0bdd4a041737e983350b94cae6273d3

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/d/devscripts/devscripts_2.9.10-0ubuntu0.1_sparc.deb
      Size/MD5:   296218 613ed8459d8ac5ad221d71ec24c08464



Download attachment "signature.asc" of type "application/pgp-signature" (198 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ