--p2kqVDKq5asng8Dg
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

================================================== =========
Ubuntu Security Notice USN-695-1 December 18, 2008
shadow vulnerability
https://launchpad.net/bugs/306082
================================================== =========

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 7.10
Ubuntu 8.04 LTS
Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
login 1:4.0.13-7ubuntu3.4

Ubuntu 7.10:
login 1:4.0.18.1-9ubuntu0.2

Ubuntu 8.04 LTS:
login 1:4.0.18.2-1ubuntu2.2

Ubuntu 8.10:
login 1:4.1.1-1ubuntu1.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Paul Szabo discovered a race condition in login. While setting up
tty permissions, login did not correctly handle symlinks. If a local
attacker were able to gain control of the system utmp file, they could
cause login to change the ownership and permissions on arbitrary files,
leading to a root privilege escalation.


Updated packages for Ubuntu 6.06 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/po...ntu3.4.diff.gz
Size/MD5: 205508 177620b33b720ce87d522259acbdbe0c
http://security.ubuntu.com/ubuntu/po...7ubuntu3.4.dsc
Size/MD5: 931 673a51cff0b63fd347c79c9545ea0fe4
http://security.ubuntu.com/ubuntu/po...13.orig.tar.gz
Size/MD5: 1622557 034fab52e187e63cb52f153bb7f304c8

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/po...u3.4_amd64.deb
Size/MD5: 249668 c5c19a139a5fe912d19076866078c6e0
http://security.ubuntu.com/ubuntu/po...u3.4_amd64.deb
Size/MD5: 683786 f2ef6413b8c60d9b6a586599fe2e8b1e

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/po...tu3.4_i386.deb
Size/MD5: 241052 31d9c29d22a4a01a8de1a629d4797165
http://security.ubuntu.com/ubuntu/po...tu3.4_i386.deb
Size/MD5: 616702 e2237b8c7b6f8ec8d685caa31a2f58ab

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/po....4_powerpc.deb
Size/MD5: 251530 f8d7a2e2ba0ac5eeaae53d37a9d99049
http://security.ubuntu.com/ubuntu/po....4_powerpc.deb
Size/MD5: 665414 4d377d684bc618ca3c7e20521ea03a4e

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/po...u3.4_sparc.deb
Size/MD5: 240128 8a61b5741da03dbf64f97796461a7c5e
http://security.ubuntu.com/ubuntu/po...u3.4_sparc.deb
Size/MD5: 620410 b3c418caa6b787c682df86bc965613db

Updated packages for Ubuntu 7.10:

Source archives:

http://security.ubuntu.com/ubuntu/po...ntu0.2.diff.gz
Size/MD5: 147849 23e5cd2a20460c6083d4e99afd93bb1b
http://security.ubuntu.com/ubuntu/po...9ubuntu0.2.dsc
Size/MD5: 1199 c86a0638f6f64d4214f212ff0381a86d
http://security.ubuntu.com/ubuntu/po....1.orig.tar.gz
Size/MD5: 2354234 3f54eaa3a35e7c559f4def92e9957581

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/po...u0.2_amd64.deb
Size/MD5: 327468 c80b850497e00c01d8ad3817e8e7c9ad
http://security.ubuntu.com/ubuntu/po...u0.2_amd64.deb
Size/MD5: 795952 e72d9d7ad5ca2f5f79085320d27881cd

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/po...tu0.2_i386.deb
Size/MD5: 320296 b1e64e3bd6f567babba9b0ffed18b023
http://security.ubuntu.com/ubuntu/po...tu0.2_i386.deb
Size/MD5: 716214 5d1ce7904c45af4807721bcccf89049c

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/s/...tu0.2_lpia.deb
Size/MD5: 317166 9de8c0a5c50fa7a2fda13391fc01a964
http://ports.ubuntu.com/pool/main/s/...tu0.2_lpia.deb
Size/MD5: 709846 09a444f189c84cc2a705150a2a19a315

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/po....2_powerpc.deb
Size/MD5: 328522 8b789214c1bad2adeb6d6cac6d144328
http://security.ubuntu.com/ubuntu/po....2_powerpc.deb
Size/MD5: 875102 b826c09b6c350f042d806d08d6938985

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/po...u0.2_sparc.deb
Size/MD5: 322280 3f261d57f53586f41dbf24ccb763e271
http://security.ubuntu.com/ubuntu/po...u0.2_sparc.deb
Size/MD5: 725368 1938c47ed00d6c61f7f894007913fb1d

Updated packages for Ubuntu 8.04 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/po...ntu2.2.diff.gz
Size/MD5: 92077 51723ec03a188d4555432ef40b5a268c
http://security.ubuntu.com/ubuntu/po...1ubuntu2.2.dsc
Size/MD5: 1198 14aabe595aa640566e039ce5d7b88609
http://security.ubuntu.com/ubuntu/po....2.orig.tar.gz
Size/MD5: 2501791 c3cf8814cc1323ecafd953b00efcba50

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/po...u2.2_amd64.deb
Size/MD5: 261606 38e45bdb1fde3a86340c9a59c784fca5
http://security.ubuntu.com/ubuntu/po...u2.2_amd64.deb
Size/MD5: 645358 62f105961813e116e39ed72598f14cce

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/po...tu2.2_i386.deb
Size/MD5: 254994 aa4ba870bfa429cdf0daa536cf812b48
http://security.ubuntu.com/ubuntu/po...tu2.2_i386.deb
Size/MD5: 566224 78cf449b34cdc469d6160744b0760580

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/s/...tu2.2_lpia.deb
Size/MD5: 253888 1361c82d9160b2363498b29970c3097c
http://ports.ubuntu.com/pool/main/s/...tu2.2_lpia.deb
Size/MD5: 565516 1b1eb3a66c5affac3aa2d3e8d05a1dca

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/s/....2_powerpc.deb
Size/MD5: 263192 72ffd5db9593977853411bae2d18a0de
http://ports.ubuntu.com/pool/main/s/....2_powerpc.deb
Size/MD5: 716834 cffc739a0973e3b3734230b54859df7e

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/s/...u2.2_sparc.deb
Size/MD5: 257810 bbdf85235702fadafa9b37f00b1efbc9
http://ports.ubuntu.com/pool/main/s/...u2.2_sparc.deb
Size/MD5: 576152 83b0c027aa795de013f6871eeff98e4a

Updated packages for Ubuntu 8.10:

Source archives:

http://security.ubuntu.com/ubuntu/po...ntu1.2.diff.gz
Size/MD5: 77622 dabd096ca5702a135a5acd3a0880c531
http://security.ubuntu.com/ubuntu/po...1ubuntu1.2.dsc
Size/MD5: 1702 9053a1d80e62094f26ec59faaca35b62
http://security.ubuntu.com/ubuntu/po....1.orig.tar.gz
Size/MD5: 2720267 ae893c18fdb0a89bc7991ba1098f1446

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/po...u1.2_amd64.deb
Size/MD5: 308248 711dcfbd810768ad4d79fb1e79ce5381
http://security.ubuntu.com/ubuntu/po...u1.2_amd64.deb
Size/MD5: 884738 5f5c5e103b3778fd71bc0bce34812f9c

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/po...tu1.2_i386.deb
Size/MD5: 300116 6054891c2fa6696a988c60afe210a6b7
http://security.ubuntu.com/ubuntu/po...tu1.2_i386.deb
Size/MD5: 786698 6c2388896a74626a1345fb8145ca435f

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/s/...tu1.2_lpia.deb
Size/MD5: 299906 5ccff11dc0ff9f9d81178f202825b21e
http://ports.ubuntu.com/pool/main/s/...tu1.2_lpia.deb
Size/MD5: 786080 936aaf3bfdeb2aa5f20bc5b3b7e61eb5

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/s/....2_powerpc.deb
Size/MD5: 305770 847b80b6b2c38b24f2063dcd18a27514
http://ports.ubuntu.com/pool/main/s/....2_powerpc.deb
Size/MD5: 901244 4723c45886c8b85e9a4c3ca0d7855642

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/s/...u1.2_sparc.deb
Size/MD5: 303600 1c344fe84a0ea1c02b1537bb9b80d069
http://ports.ubuntu.com/pool/main/s/...u1.2_sparc.deb
Size/MD5: 813906 072f654264098e9ca0058e3362e6f4ee


--p2kqVDKq5asng8Dg
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Kees Cook <kees@outflux.net>

iEYEARECAAYFAklJpcsACgkQH/9LqRcGPm3ckACfWr8ywG+yoEhLTQo0X5dO7/uk
YboAnj0XV6Z2eRXkE3KrO5bgcE03yNMA
=/mnT
-----END PGP SIGNATURE-----

--p2kqVDKq5asng8Dg--