===========================================================
Ubuntu Security Notice USN-968-1            August 05, 2010
base-files vulnerability
CVE-2010-0834
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 9.10
Ubuntu 10.04 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 9.10:
  base-files                      5.0.0ubuntu7.1

Ubuntu 10.04 LTS:
  base-files                      5.0.0ubuntu20.10.04.2

In general, a standard system update will make all the necessary changes.

Details follow:

It was discovered that the Ubuntu image shipped on some Dell Latitude
2110 systems was accidentally configured to allow unauthenticated package
installations. A remote attacker intercepting network communications or
a malicious archive mirror server could exploit this to trick the user
into installing unsigned packages, resulting in arbitrary code execution
with root privileges.


Updated packages for Ubuntu 9.10:

  Source archives:

    
http://security.ubuntu.com/ubuntu/pool/main/b/base-files/base-files_5.0.0ubuntu7.1.dsc
      Size/MD5:      853 a699f7de48cd09591785129b4840ef56
    
http://security.ubuntu.com/ubuntu/pool/main/b/base-files/base-files_5.0.0ubuntu7.1.tar.gz
      Size/MD5:    74901 d802a9135ce2e49e065926b69e16e646

  Architecture independent packages:

    
http://security.ubuntu.com/ubuntu/pool/main/b/base-files/lsb-release-udeb_5.0.0ubuntu7.1_all.udeb
      Size/MD5:      788 558c290ae2250679a3836da80fa3ebc0

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    
http://security.ubuntu.com/ubuntu/pool/main/b/base-files/base-files_5.0.0ubuntu7.1_amd64.deb
      Size/MD5:    68358 67faf1b12530db1c708ba12994d88f60

  i386 architecture (x86 compatible Intel/AMD):

    
http://security.ubuntu.com/ubuntu/pool/main/b/base-files/base-files_5.0.0ubuntu7.1_i386.deb
      Size/MD5:    68354 ec91c2c47ba30e2a3f2c5ee3ef73d812

  lpia architecture (Low Power Intel Architecture):

    
http://ports.ubuntu.com/pool/main/b/base-files/base-files_5.0.0ubuntu7.1_lpia.deb
      Size/MD5:    68360 1feaa5345fd288eca0fdd180ee12e140

  powerpc architecture (Apple Macintosh G3/G4/G5):

    
http://ports.ubuntu.com/pool/main/b/base-files/base-files_5.0.0ubuntu7.1_powerpc.deb
      Size/MD5:    68364 4543aabd986eced6a2dadd78ab93daf9

  sparc architecture (Sun SPARC/UltraSPARC):

    
http://ports.ubuntu.com/pool/main/b/base-files/base-files_5.0.0ubuntu7.1_sparc.deb
      Size/MD5:    68366 2ccfbeddb349e6999d93d2505ed40a10

Updated packages for Ubuntu 10.04:

  Source archives:

    
http://security.ubuntu.com/ubuntu/pool/main/b/base-files/base-files_5.0.0ubuntu20.10.04.2.dsc
      Size/MD5:      876 9afddf09156582a48e57c76fab0cf4fa
    
http://security.ubuntu.com/ubuntu/pool/main/b/base-files/base-files_5.0.0ubuntu20.10.04.2.tar.gz
      Size/MD5:    76356 d57362eab34a8e9f6cf27b595143c332

  Architecture independent packages:

    
http://security.ubuntu.com/ubuntu/pool/main/b/base-files/lsb-release-udeb_5.0.0ubuntu20.10.04.2_all.udeb
      Size/MD5:      788 3e937b94118602fc84aab4adbe3f9e97

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    
http://security.ubuntu.com/ubuntu/pool/main/b/base-files/base-files_5.0.0ubuntu20.10.04.2_amd64.deb
      Size/MD5:    70240 2ecf9c810ef2f2315f63881068d8b839

  i386 architecture (x86 compatible Intel/AMD):

    
http://security.ubuntu.com/ubuntu/pool/main/b/base-files/base-files_5.0.0ubuntu20.10.04.2_i386.deb
      Size/MD5:    70236 d780378cf42209eeb90ed2f68940b837

  powerpc architecture (Apple Macintosh G3/G4/G5):

    
http://ports.ubuntu.com/pool/main/b/base-files/base-files_5.0.0ubuntu20.10.04.2_powerpc.deb
      Size/MD5:    70230 3a5889ee074ddf43e7be7e6cbbc81c16

  sparc architecture (Sun SPARC/UltraSPARC):

    
http://ports.ubuntu.com/pool/main/b/base-files/base-files_5.0.0ubuntu20.10.04.2_sparc.deb
      Size/MD5:    70236 c1fdeedbea2bcb8423ea745406ec3a05

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to