Debian: DSA-2362-1: acpid security update

    Date10 Dec 2011
    CategoryDebian
    47
    Posted ByLinuxSecurity Advisories
    Multiple vulnerabilities were found in the acpid, the Advanced Configuration and Power Interface event daemon: CVE-2011-1159
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2362-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                        Moritz Muehlenhoff
    December 10, 2011                      http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : acpid
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: partly
    CVE ID         : CVE-2011-1159 CVE-2011-2777 CVE-2011-4578 
    
    Multiple vulnerabilities were found in the acpid, the Advanced
    Configuration and Power Interface event daemon:
    
    CVE-2011-1159
    
        Vasiliy Kulikov of OpenWall discovered that the socket handling
        is vulnerable to denial of service.
    
    CVE-2011-2777
    
        Oliver-Tobias Ripka discovered that incorrect process handling in
        the Debian-specific powerbtn.sh script could lead to local
        privilege escalation. This issue doesn't affect oldstable. The
        script is only shipped as an example in /usr/share/doc/acpid/examples.
        See /usr/share/doc/acpid/README.Debian for details.
    
    CVE-2011-4578
    
        Helmut Grohne and Michael Biebl discovered that acpid sets a umask
        of 0 when executing scripts, which could result in local privilege
        escalation.
    
    For the oldstable distribution (lenny), this problem has been fixed in
    version 1.0.8-1lenny4.
    
    For the stable distribution (squeeze), this problem has been fixed in
    version 1:2.0.7-1squeeze3.
    
    For the unstable distribution (sid), this problem will be fixed soon.
    
    We recommend that you upgrade your acpid packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.