DSA-1960-1 acpid -- programming error

Related Vulnerabilities: CVE-2009-4235  

It was discovered that acpid, the Advanced Configuration and Power Interface event daemon, on the oldstable distribution (etch) creates its log file with weak permissions, which might expose sensitive information or might be abused by a local user to consume all free disk space on the same partition of the file. For the oldstable distribution (etch), this problem has been fixed in version 1.0.4-5etch2. The stable distribution (lenny) in version 1.0.8-1lenny2 and the unstable distribution (sid) in version 1.0.10-5, have been updated to fix the weak file permissions of the log file created by older versions. We recommend that you upgrade your acpid packages.

Debian Security Advisory

DSA-1960-1 acpid -- programming error

Date Reported:
19 Dec 2009
Affected Packages:
acpid
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2009-4235.
More information:

It was discovered that acpid, the Advanced Configuration and Power Interface event daemon, on the oldstable distribution (etch) creates its log file with weak permissions, which might expose sensitive information or might be abused by a local user to consume all free disk space on the same partition of the file.

For the oldstable distribution (etch), this problem has been fixed in version 1.0.4-5etch4.

The stable distribution (lenny) in version 1.0.8-1lenny2 and the unstable distribution (sid) in version 1.0.10-5, have been updated to fix the weak file permissions of the log file created by older versions.

We recommend that you upgrade your acpid packages.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.4-5etch4.diff.gz
http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.4.orig.tar.gz
http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.4-5etch4.dsc
AMD64:
http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.4-5etch4_amd64.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.4-5etch4_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.4-5etch4_ia64.deb

Debian GNU/Linux 5.0 (lenny)

Source:
http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.8-1lenny2.diff.gz
http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.8-1lenny2.dsc
http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.8.orig.tar.gz
AMD64:
http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.8-1lenny2_amd64.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.8-1lenny2_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/a/acpid/acpid_1.0.8-1lenny2_ia64.deb

MD5 checksums of the listed files are available in the original advisory.