ESB-2017.1957 - [Linux][Ubuntu] shotwell: Access confidential data - Remote with user interaction 2017-08-08

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1957
                          Shotwell vulnerability
                               8 August 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           shotwell
Publisher:         Ubuntu
Operating System:  Ubuntu
                   Linux variants
Impact/Access:     Access Confidential Data -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-1000024  

Original Bulletin: 
   http://www.ubuntu.com/usn/usn-3379-1

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Ubuntu. It is recommended that administrators 
         running shotwell check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

==========================================================================
Ubuntu Security Notice USN-3379-1
August 07, 2017

shotwell vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- - Ubuntu 17.04
- - Ubuntu 16.04 LTS
- - Ubuntu 14.04 LTS

Summary:

Shotwell could be made to expose sensitive information over the
network.

Software Description:
- - shotwell: digital photo organizer

Details:

It was discovered that Shotwell is vulnerable to an information
disclosure in the web publishing plugins resulting in potential
password and oauth token plaintext transmission.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
   shotwell 0.22.0+git20160108.r1.f2fb1f7-0ubuntu3.1
   shotwell-common 0.22.0+git20160108.r1.f2fb1f7-0ubuntu3.1

Ubuntu 16.04 LTS:
   shotwell 0.22.0+git20160108.r1.f2fb1f7-0ubuntu1.1
   shotwell-common 0.22.0+git20160108.r1.f2fb1f7-0ubuntu1.1

Ubuntu 14.04 LTS:
   shotwell 0.18.0-0ubuntu4.5
   shotwell-common 0.18.0-0ubuntu4.5

In general, a standard system update will make all the necessary
changes.

References:
- -  https://www.ubuntu.com/usn/usn-3379-1
- -  CVE-2017-1000024

Package Information:
- -  https://launchpad.net/ubuntu/+source/shotwell/0.22.0+git20160108.r1.f2fb1f7-0ubuntu3.1
- -  https://launchpad.net/ubuntu/+source/shotwell/0.22.0+git20160108.r1.f2fb1f7-0ubuntu1.1
- -  https://launchpad.net/ubuntu/+source/shotwell/0.18.0-0ubuntu4.5

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=rE6x
-----END PGP SIGNATURE-----

« Back to bulletins