Secunia Security Advisory - Ubuntu has issued an update for gnome-screensaver. This fixes a weakness, which can be exploited by malicious people with physical access to bypass certain security restrictions.
8b93d2dbd17e8860aaae5fbbae9187e079919e430ce05c0b0be4528b3f301367
----------------------------------------------------------------------
Use WSUS to deploy 3rd party patches
Public BETA
http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/
----------------------------------------------------------------------
TITLE:
Ubuntu update for gnome-screensaver
SECUNIA ADVISORY ID:
SA38849
VERIFY ADVISORY:
http://secunia.com/advisories/38849/
DESCRIPTION:
Ubuntu has issued an update for gnome-screensaver. This fixes a
weakness, which can be exploited by malicious people with physical
access to bypass certain security restrictions.
For more information:
SA38565
SOLUTION:
Apply updated packages.
-- Ubuntu 8.10 --
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-screensaver_2.24.0-0ubuntu2.1.diff.gz
Size/MD5: 9612 6be699dcee9fece9c466a64e792cce73
http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-screensaver_2.24.0-0ubuntu2.1.dsc
Size/MD5: 1876 a01ab7300a5da151236e9a21916923e6
http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-screensaver_2.24.0.orig.tar.gz
Size/MD5: 2351712 bc9a89cc8a146b88dd844a212f1d7b7c
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-screensaver_2.24.0-0ubuntu2.1_amd64.deb
Size/MD5: 1555572 7a7f89ace5e54f72090b7fcedb086db3
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-screensaver_2.24.0-0ubuntu2.1_i386.deb
Size/MD5: 1538164 fa835001734e052ce9a11564efe56e03
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver_2.24.0-0ubuntu2.1_lpia.deb
Size/MD5: 1537264 a726d038c71545341afdb2a224c24905
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver_2.24.0-0ubuntu2.1_powerpc.deb
Size/MD5: 1563500 f8b0c692c4fc204599a727eb2c9624e6
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver_2.24.0-0ubuntu2.1_sparc.deb
Size/MD5: 1547504 91dd1e6cd5f574bda3cda18af09f3d49
-- Ubuntu 9.04 --
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-screensaver_2.24.0-0ubuntu6.1.diff.gz
Size/MD5: 11343 c73c5f68b94850272966c41dc2597353
http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-screensaver_2.24.0-0ubuntu6.1.dsc
Size/MD5: 1879 07c2b16b0109989db32c0334be335914
http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-screensaver_2.24.0.orig.tar.gz
Size/MD5: 2351712 bc9a89cc8a146b88dd844a212f1d7b7c
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-screensaver_2.24.0-0ubuntu6.1_amd64.deb
Size/MD5: 1448284 8c6d47094ae8cb9c08a07cbfec8e4816
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-screensaver_2.24.0-0ubuntu6.1_i386.deb
Size/MD5: 1431876 484dad84cabe56534c4b71ef41efd588
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver_2.24.0-0ubuntu6.1_lpia.deb
Size/MD5: 1431312 f8094316f1272daea3e3c1efd92902d4
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver_2.24.0-0ubuntu6.1_powerpc.deb
Size/MD5: 1457084 7182af1a4f434a7105b3e5b82a4dfa6f
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver_2.24.0-0ubuntu6.1_sparc.deb
Size/MD5: 1441116 0cb7171c755238f3e916594c664d3621
-- Ubuntu 9.10 --
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-screensaver_2.28.0-0ubuntu3.5.diff.gz
Size/MD5: 15733 83ebe53647460755684705710e36e896
http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-screensaver_2.28.0-0ubuntu3.5.dsc
Size/MD5: 1757 6009f51f8967671d5e19cfc31d6394e5
http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-screensaver_2.28.0.orig.tar.gz
Size/MD5: 5069053 cdf328a0443a3cc30b4b2b36d9a99236
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-screensaver_2.28.0-0ubuntu3.5_amd64.deb
Size/MD5: 4186276 0de4fd7dbe92652da6abb4a0da360ca7
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/g/gnome-screensaver/gnome-screensaver_2.28.0-0ubuntu3.5_i386.deb
Size/MD5: 4169778 806e2cea1aec193ce6eb8dd6b3f0b463
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver_2.28.0-0ubuntu3.5_lpia.deb
Size/MD5: 4170634 dda9049c711b0344a92e8e0862fccbb1
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver_2.28.0-0ubuntu3.5_powerpc.deb
Size/MD5: 4180178 ec0f991d3cebdf2d3d89a369acfa9536
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/g/gnome-screensaver/gnome-screensaver_2.28.0-0ubuntu3.5_sparc.deb
Size/MD5: 4178644 a2c8b28772363b5cbda5c14865b8ed49
ORIGINAL ADVISORY:
USN-907-1:
http://www.ubuntu.com/usn/USN-907-1
OTHER REFERENCES:
SA38565:
http://secunia.com/advisories/38565/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------