DSA-1465-2 apt-listchanges -- programming error

Related Vulnerabilities: CVE-2008-0302  

Felipe Sateler discovered that apt-listchanges, a package change history notification tool, used unsafe paths when importing its python libraries. This could allow the execution of arbitrary shell commands if the root user executed the command in a directory which other local users may write to. For the old stable distribution (sarge), this problem was not present. For the stable distribution (etch), this problem has been fixed in version 2.72.5etch1. For the unstable distribution (sid), this problem has been fixed in version 2.82. We recommend that you upgrade your apt-listchanges package.

Debian Security Advisory

DSA-1465-2 apt-listchanges -- programming error

Date Reported:
17 Jan 2008
Affected Packages:
apt-listchanges
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2008-0302.
More information:

Felipe Sateler discovered that apt-listchanges, a package change history notification tool, used unsafe paths when importing its python libraries. This could allow the execution of arbitrary shell commands if the root user executed the command in a directory which other local users may write to.

For the old stable distribution (sarge), this problem was not present.

For the stable distribution (etch), this problem has been fixed in version 2.72.5etch4.

For the unstable distribution (sid), this problem has been fixed in version 2.82.

We recommend that you upgrade your apt-listchanges package.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/a/apt-listchanges/apt-listchanges_2.72.5etch4.tar.gz
http://security.debian.org/pool/updates/main/a/apt-listchanges/apt-listchanges_2.72.5etch4.dsc
Architecture-independent component:
http://security.debian.org/pool/updates/main/a/apt-listchanges/apt-listchanges_2.72.5etch4_all.deb

MD5 checksums of the listed files are available in the original advisory.