Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Linux :: Ubuntu :: b1a-1334.htm

libpam-opie vulnerability



libpam-opie vulnerability
libpam-opie vulnerability




--=-I1l8wUk9XoIOYh8r+Mdq
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

==========================================================Ubuntu Security Notice USN-955-2              June 21, 2010
libpam-opie vulnerability
CVE-2010-1938
==========================================================
A security issue affects the following Ubuntu releases:

Ubuntu 9.04
Ubuntu 9.10
Ubuntu 10.04 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 9.04:
  libpam-opie                     0.21-8build1.9.04.1

Ubuntu 9.10:
  libpam-opie                     0.21-8build2.1

Ubuntu 10.04 LTS:
  libpam-opie                     0.21-8build3.1

In general, a standard system update will make all the necessary changes.

Details follow:

USN-955-1 fixed vulnerabilities in OPIE. This update provides rebuilt
libpam-opie packages against the updated libopie library.

Original advisory details:

 Maksymilian Arciemowicz and Adam Zabrocki discovered that OPIE incorrectly
 handled long usernames. A remote attacker could exploit this with a crafted
 username and make applications linked against libopie crash, leading to a
 denial of service.


Updated packages for Ubuntu 9.04:

  Source archives:

http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build1.9.04.1.diff.gz 
      Size/MD5:     5955 68d77e8427fd1e4e6fc542bdbdecdcb8
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build1.9.04.1.dsc 
      Size/MD5:     1052 a6621de8231000b1cd722de1889442df
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21.orig.tar.gz 
      Size/MD5:    41624 8dffef43ddbd14512171cca5c4570207

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build1.9.04.1_amd64.deb 
      Size/MD5:    24330 f7a795c4f3662f08d14110782384ea59

  i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build1.9.04.1_i386.deb 
      Size/MD5:    23494 09dc94d2c3d571a4fbaa710aed7dbf1e

  lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/libp/libpam-opie/libpam-opie_0.21-8build1.9.04.1_lpia.deb 
      Size/MD5:    23220 c695dc2d85b0f93d6a1fc03afdc8b627

  powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/libp/libpam-opie/libpam-opie_0.21-8build1.9.04.1_powerpc.deb 
      Size/MD5:    27188 fca2d90bf1877341d4fe871292798005

  sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/libp/libpam-opie/libpam-opie_0.21-8build1.9.04.1_sparc.deb 
      Size/MD5:    24280 dc93f7554de0791124cb9c853cb3bf32

Updated packages for Ubuntu 9.10:

  Source archives:

http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build2.1.diff.gz 
      Size/MD5:     5985 a9a21c66edf5da6f3efd983d9c6f8f14
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build2.1.dsc 
      Size/MD5:     1032 20f0a833495a08445485b8513f6f1034
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21.orig.tar.gz 
      Size/MD5:    41624 8dffef43ddbd14512171cca5c4570207

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build2.1_amd64.deb 
      Size/MD5:    25310 3bbc38e74436df6976f3c046713a1c4a

  i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build2.1_i386.deb 
      Size/MD5:    24056 a8fed25799038ff959d22abab4c441bb

  lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/libp/libpam-opie/libpam-opie_0.21-8build2.1_lpia.deb 
      Size/MD5:    23894 c427d754c78b149a2177363e8913644e

  powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/libp/libpam-opie/libpam-opie_0.21-8build2.1_powerpc.deb 
      Size/MD5:    25358 38a5a2e4c10ceab01ac39422e58be4bc

  sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/libp/libpam-opie/libpam-opie_0.21-8build2.1_sparc.deb 
      Size/MD5:    24646 fa87c02f217c29deb3c2d1022d0874ed

Updated packages for Ubuntu 10.04:

  Source archives:

http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build3.1.diff.gz 
      Size/MD5:     6083 23785c595192d3614e0336d24052288e
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build3.1.dsc 
      Size/MD5:     1032 a19a8b3b2b4a9be41bd5cc05e720bd53
http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21.orig.tar.gz 
      Size/MD5:    41624 8dffef43ddbd14512171cca5c4570207

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build3.1_amd64.deb 
      Size/MD5:    25290 88dfc0489c3b39abb4fb4a76069abd55

  i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/libp/libpam-opie/libpam-opie_0.21-8build3.1_i386.deb 
      Size/MD5:    23974 ca0173f16362e88e1fdd35e49abe37f0

  powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/libp/libpam-opie/libpam-opie_0.21-8build3.1_powerpc.deb 
      Size/MD5:    25376 e601a2b8d8f106b5568b492698e0558e

  sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/libp/libpam-opie/libpam-opie_0.21-8build3.1_sparc.deb 
      Size/MD5:    25710 31bb892e98f301cdf8e5bbfdf6c027fa




--=-I1l8wUk9XoIOYh8r+Mdq
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEABECAAYFAkwftFgACgkQLMAs/0C4zNqVSACeKd51rR2snUIhoThPbjUUt7Al
NWYAnjbtdlLVta3F2kMG33wYj5uuB27a
=BefC
-----END PGP SIGNATURE-----

--=-I1l8wUk9XoIOYh8r+Mdq--



TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH