USN-986-3: dpkg vulnerability

Ubuntu Security Notice USN-986-3

20th September, 2010

dpkg vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 10.04 LTS
  • Ubuntu 9.10
  • Ubuntu 9.04
  • Ubuntu 8.04 LTS
  • Ubuntu 6.06 LTS

Summary

dpkg could be made to run programs as your login if it opened a specially crafted file.

Software description

  • dpkg - package maintenance system for Debian

Details

USN-986-1 fixed vulnerabilities in bzip2. dpkg statically links against libbz2
and needed to be rebuilt to use the updated libbz2.

Original advisory details:

An integer overflow was discovered in bzip2. If a user or automated system
were tricked into decompressing a crafted bz2 file, an attacker could cause
bzip2 or any application linked against libbz2 to crash or possibly execute
code as the user running the program.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 10.04 LTS:
dpkg 1.15.5.6ubuntu4.3
Ubuntu 9.10:
dpkg 1.15.4ubuntu2.2
Ubuntu 9.04:
dpkg 1.14.24ubuntu1.2
Ubuntu 8.04 LTS:
dpkg 1.14.16.6ubuntu4.2
Ubuntu 6.06 LTS:
dpkg 1.13.11ubuntu7.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2010-0405