|
--=-I1l8wUk9XoIOYh8r+Mdq
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
==========================================================Ubuntu Security Notice USN-955-2 June 21, 2010
libpam-opie vulnerability
CVE-2010-1938
==========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 9.04
Ubuntu 9.10
Ubuntu 10.04 LTS
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 9.04:
libpam-opie 0.21-8build1.9.04.1
Ubuntu 9.10:
libpam-opie 0.21-8build2.1
Ubuntu 10.04 LTS:
libpam-opie 0.21-8build3.1
In general, a standard system update will make all the necessary changes.
Details follow:
USN-955-1 fixed vulnerabilities in OPIE. This update provides rebuilt
libpam-opie packages against the updated libopie library.
Original advisory details:
Maksymilian Arciemowicz and Adam Zabrocki discovered that OPIE incorrectly
handled long usernames. A remote attacker could exploit this with a crafted
username and make applications linked against libopie crash, leading to a
denial of service.
Updated packages for Ubuntu 9.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build1.9.04.1.diff.gz
Size/MD5: 5955 68d77e8427fd1e4e6fc542bdbdecdcb8
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build1.9.04.1.dsc
Size/MD5: 1052 a6621de8231000b1cd722de1889442df
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21.orig.tar.gz
Size/MD5: 41624 8dffef43ddbd14512171cca5c4570207
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build1.9.04.1_amd64.deb
Size/MD5: 24330 f7a795c4f3662f08d14110782384ea59
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build1.9.04.1_i386.deb
Size/MD5: 23494 09dc94d2c3d571a4fbaa710aed7dbf1e
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/libp/libpam-opie/libpam-opie_0.21-8build1.9.04.1_lpia.deb
Size/MD5: 23220 c695dc2d85b0f93d6a1fc03afdc8b627
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/libp/libpam-opie/libpam-opie_0.21-8build1.9.04.1_powerpc.deb
Size/MD5: 27188 fca2d90bf1877341d4fe871292798005
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/libp/libpam-opie/libpam-opie_0.21-8build1.9.04.1_sparc.deb
Size/MD5: 24280 dc93f7554de0791124cb9c853cb3bf32
Updated packages for Ubuntu 9.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build2.1.diff.gz
Size/MD5: 5985 a9a21c66edf5da6f3efd983d9c6f8f14
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build2.1.dsc
Size/MD5: 1032 20f0a833495a08445485b8513f6f1034
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21.orig.tar.gz
Size/MD5: 41624 8dffef43ddbd14512171cca5c4570207
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build2.1_amd64.deb
Size/MD5: 25310 3bbc38e74436df6976f3c046713a1c4a
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build2.1_i386.deb
Size/MD5: 24056 a8fed25799038ff959d22abab4c441bb
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/libp/libpam-opie/libpam-opie_0.21-8build2.1_lpia.deb
Size/MD5: 23894 c427d754c78b149a2177363e8913644e
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/libp/libpam-opie/libpam-opie_0.21-8build2.1_powerpc.deb
Size/MD5: 25358 38a5a2e4c10ceab01ac39422e58be4bc
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/libp/libpam-opie/libpam-opie_0.21-8build2.1_sparc.deb
Size/MD5: 24646 fa87c02f217c29deb3c2d1022d0874ed
Updated packages for Ubuntu 10.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build3.1.diff.gz
Size/MD5: 6083 23785c595192d3614e0336d24052288e
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build3.1.dsc
Size/MD5: 1032 a19a8b3b2b4a9be41bd5cc05e720bd53
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21.orig.tar.gz
Size/MD5: 41624 8dffef43ddbd14512171cca5c4570207
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build3.1_amd64.deb
Size/MD5: 25290 88dfc0489c3b39abb4fb4a76069abd55
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build3.1_i386.deb
Size/MD5: 23974 ca0173f16362e88e1fdd35e49abe37f0
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/libp/libpam-opie/libpam-opie_0.21-8build3.1_powerpc.deb
Size/MD5: 25376 e601a2b8d8f106b5568b492698e0558e
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/libp/libpam-opie/libpam-opie_0.21-8build3.1_sparc.deb
Size/MD5: 25710 31bb892e98f301cdf8e5bbfdf6c027fa
--=-I1l8wUk9XoIOYh8r+Mdq
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEABECAAYFAkwftFgACgkQLMAs/0C4zNqVSACeKd51rR2snUIhoThPbjUUt7Al
NWYAnjbtdlLVta3F2kMG33wYj5uuB27a
=BefC
-----END PGP SIGNATURE-----
--=-I1l8wUk9XoIOYh8r+Mdq--