USN-986-3: dpkg vulnerability

20 September 2010

dpkg vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 10.04 LTS
  • Ubuntu 9.10
  • Ubuntu 9.04
  • Ubuntu 8.04 LTS
  • Ubuntu 6.06 LTS

Summary

dpkg could be made to run programs as your login if it opened a specially crafted file.

Software Description

  • dpkg - Debian package management system

Details

USN-986-1 fixed vulnerabilities in bzip2. dpkg statically links against libbz2 and needed to be rebuilt to use the updated libbz2.

Original advisory details:

An integer overflow was discovered in bzip2. If a user or automated system were tricked into decompressing a crafted bz2 file, an attacker could cause bzip2 or any application linked against libbz2 to crash or possibly execute code as the user running the program.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 10.04 LTS
dpkg - 1.15.5.6ubuntu4.3
Ubuntu 9.10
dpkg - 1.15.4ubuntu2.2
Ubuntu 9.04
dpkg - 1.14.24ubuntu1.2
Ubuntu 8.04 LTS
dpkg - 1.14.16.6ubuntu4.2
Ubuntu 6.06 LTS
dpkg - 1.13.11ubuntu7.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References