Articles / Ubuntu

All articles tagged with Ubuntu

May 31, 2010 14:48 Ubuntu: New ClamAV packages fix security issues

0

It was discovered that ClamAV did not properly reallocate memory when processing certain PDF files. A remote attacker could send a specially crafted PDF and crash ClamAV. An out of bounds memory access flaw was discovered in ClamAV. A remote attacker could send a specially crafted Portable Executable (PE) file and crash ClamAV. Updated packages are available from security.ubuntu.com.

May 31, 2010 14:44 Ubuntu: New GNU C Library packages fix security issues

0

Maksymilian Arciemowicz discovered that the GNU C library did not correctly handle integer overflows in the strfmon function. If a user or automated system were tricked into processing a specially crafted format string, a remote attacker could crash applications, leading to a denial of service. Jeff Layton and Dan Rosenberg discovered that the GNU C library did not correctly handle newlines in the mntent family of functions. If a local attacker were able to inject newlines into a mount entry through other vulnerable mount helpers, they could disrupt the system or possibly gain root privileges. Dan Rosenberg discovered that the GNU C library did not correctly validate certain ELF program headers. If a user or automated system were tricked into verifying a specially crafted ELF program, a remote attacker could execute arbitrary code with user privileges. Updated packages are available from security.ubuntu.com.

May 31, 2010 14:31 Ubuntu: New PostgreSQL packages fix security issues

0

It was discovered that the Safe.pm module as used by PostgreSQL did not properly restrict PL/perl procedures. If PostgreSQL was configured to use Perl stored procedures, a remote authenticated attacker could exploit this to execute arbitrary Perl code. It was discovered that PostgreSQL did not properly check permissions to restrict PL/Tcl procedures. If PostgreSQL was configured to use Tcl stored procedures, a remote authenticated attacker could exploit this to execute arbitrary Tcl code. Updated packages are available from security.ubuntu.com.

May 20, 2010 13:51 Ubuntu: New MoinMoin packages fix security issues

0

It was discovered that MoinMoin incorrectly handled hierarchical access control lists. Users could bypass intended access controls under certain circumstances. Updated packages are available from security.ubuntu.com.

May 20, 2010 13:49 Ubuntu: New Kerberos packages fix security issues

0

It was discovered that Kerberos did not correctly free memory in the GSSAPI and kdb libraries. If a remote attacker were able to manipulate an application using these libraries carefully, the service could crash, leading to a denial of service. It was discovered that Kerberos did not correctly verify certain packet structures. An unauthenticated remote attacker could send specially crafted traffic to cause the KDC or kadmind services to crash, leading to a denial of service. Updated packages are available from security.ubuntu.com.

May 20, 2010 13:32 Ubuntu: New X.org packages fix security issues

0

Loïc Minier discovered that xvfb-run did not correctly keep the X.org session cookie private. A local attacker could gain access to any local sessions started by xvfb-run. It was discovered that the X.org server did not correctly handle certain calculations. A remote attacker could exploit this to crash the X.org session or possibly run arbitrary code with root privileges. Updated packages are available from security.ubuntu.com.

May 20, 2010 13:28 Ubuntu: New KDENetwork packages fix security issues

0

It was discovered that KGet did not properly perform input validation when processing metalink files. If a user were tricked into opening a crafted metalink file, a remote attacker could overwrite files via directory traversal, which could eventually lead to arbitrary code execution. Updated packages are available from security.ubuntu.com.

May 20, 2010 12:35 Ubuntu: New TeX Live packages fix security issues

0

It was discovered that TeX Live incorrectly handled certain long .bib bibliography files, which could cause a denial of service via application crash. It was discovered that TeX Live incorrectly handled certain malformed dvi files, which could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. Updated packages are available from security.ubuntu.com.

May 20, 2010 12:24 Ubuntu: New dvipng packages fix security issues

0

Dan Rosenberg discovered that dvipng incorrectly handled certain malformed dvi files. If a user or automated system were tricked into processing a specially crafted dvi file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. Updated packages are available from security.ubuntu.com.

May 06, 2010 12:59 Ubuntu: New netpbm packages fix security issues

0

Marc Schoenefeld discovered a buffer overflow in Netpbm when loading certain images. If a user or automated system were tricked into opening a specially crafted XPM image, a remote attacker could crash Netpbm. The default compiler options for affected releases should reduce the vulnerability to a denial of service. Updated packages are available from security.ubuntu.com.

April 29, 2010 13:00 Ubuntu: New PostgreSQL packages fix security issues

0

It was discovered that PostgreSQL did not properly sanitize its input when using substring() with a SELECT statement. A remote authenticated attacker could exploit this to cause a denial of service via application crash. Updated packages are available from security.ubuntu.com.

April 22, 2010 08:18 Ubuntu: New KDM packages fix security issues

0

Sebastian Krahmer discovered a race condition in the KDE Display Manager (KDM). A local attacker could exploit this to change the permissions on arbitrary files, thus allowing privilege escalation. Updated packages are available from security.ubuntu.com.

April 22, 2010 08:17 Ubuntu: New FFmpeg packages fix security issues

0

It was discovered that FFmpeg contained multiple security issues when handling certain multimedia files. If a user were tricked into opening a crafted multimedia file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. Updated packages are available from security.ubuntu.com.

April 22, 2010 08:16 Ubuntu: New irssi packages fix security issues

0

It was discovered that irssi did not perform certificate host validation when using SSL connections. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. Aurelien Delaitre discovered that irssi could be made to dereference a NULL pointer when a user left the channel. A remote attacker could cause a denial of service via application crash. Updated packages are available from security.ubuntu.com.

April 22, 2010 08:14 Ubuntu: New sudo packages fix security issues

0

Valerio Costamagna discovered that sudo did not properly validate the path for the sudoedit pseudo-command when the PATH contained only a dot ('.'). If secure_path and ignore_dot were disabled, a local attacker could exploit this to execute arbitrary code as root if sudo was configured to allow the attacker to use sudoedit. Updated packages are available from security.ubuntu.com.

April 22, 2010 07:56 Ubuntu: New Firefox packages fix security issues

0

Flaws were discovered in the browser engine of Firefox, allowing a malicious website to cause a denial of service or possibly execute arbitrary code with the privileges of the user. Paul Stone discovered that Firefox could be made to change a mouse click into a drag and drop event, which could allow an attacker could execute arbitrary JavaScript with chrome privileges. It was discovered that the XMLHttpRequestSpy module as used by the Firebug add-on could be used to escalate privileges within the browser. Henry Sudhof discovered that an image tag could be used as a redirect to a mailto: URL to launch an external mail handler. Wladimir Palant discovered that Firefox did not always perform security checks on XML content, which could be exploited to bypass security policies to load certain resources. Updated packages are available from security.ubuntu.com.

April 22, 2010 07:51 Ubuntu: New NSS packages fix security issues

0

Marsh Ray and Steve Dispensa discovered a flaw in the TLS and SSLv3 protocols. If an attacker could perform a man in the middle attack at the start of a TLS connection, the attacker could inject arbitrary content at the beginning of the user’s session. This update adds support for the new new renegotiation extension and will use it when the server supports it. Updated packages are available from security.ubuntu.com.

April 22, 2010 07:50 Ubuntu: New ClamAV packages fix security issues

0

It was discovered that ClamAV did not properly verify its input when processing CAB files. A remote attacker could send a specially crafted CAB file to evade malware detection. It was discovered that ClamAV did not properly verify its input when processing CAB files. A remote attacker could send a specially crafted CAB file and cause a denial of service via application crash. Updated packages are available from security.ubuntu.com.

April 22, 2010 07:49 Ubuntu: New MoinMoin packages fix security issues

0

It was discovered that MoinMoin did not properly sanitize its input when processing Despam actions, resulting in cross-site scripting (XSS) vulnerabilities. If a privileged wiki user were tricked into performing the Despam action on a page with a crafted title, a remote attacker could exploit this to execute JavaScript code. It was discovered that the TextCha protection in MoinMoin could be bypassed by submitting a crafted form request. Updated packages are available from security.ubuntu.com.

April 08, 2010 13:35 Ubuntu: New Kerberos packages fix security issues

0

Sol Jerome discovered that the Kerberos kadmind service did not correctly free memory, leading to a denial of service. It was discovered that Kerberos did not correctly free memory in the GSSAPI and kdb libraries, leading to a denial of service. Updated packages are available from security.ubuntu.com.

April 08, 2010 13:30 Ubuntu: New OpenJDK packages fix security issues

0

Marsh Ray and Steve Dispensa discovered a flaw in the TLS and SSLv3 protocols, resulting in injection of arbitrary content at the beginning of the user’s session. It was discovered that Loader-constraint table, Policy/PolicyFile, Inflater/Deflater, drag/drop access, and deserialization did not correctly handle certain sensitive objects, resulting in private information being leaked to a remote attacker. It was discovered that AtomicReferenceArray, System.arraycopy, InetAddress, and HashAttributeSet did not correctly handle certain situations, leading to a denial of service. It was discovered that Pack200, CMM readMabCurveData, ImagingLib, and the AWT library did not correctly check buffer lengths, which could crash the Java application or possibly the gain of user privileges. It was discovered that applets did not correctly handle certain trust chains, resulting in running untrusted code with user privileges. Updated packages are available from security.ubuntu.com.

April 01, 2010 15:45 Ubuntu: New libnss-db packages fix security issues

0

Stephane Chazelas discovered that libnss-db did not correctly set up a database environment. A local attacker could exploit this to read the first line of arbitrary files, leading to a loss of privacy and possibly privilege escalation. Updated packages are available from security.ubuntu.com.

April 01, 2010 14:50 Ubuntu: New Emacs packages fix security issues

0

Dan Rosenberg discovered that the email helper in Emacs did not correctly check file permissions. A local attacker could perform a symlink race to read or append to another user’s mailbox if it was stored under a group-writable group-“mail” directory. Updated packages are available from security.ubuntu.com.

April 01, 2010 14:28 Ubuntu: New samba packages fix security issues

0

It was discovered the Samba handled symlinks in an unexpected way when both “wide links” and “UNIX extensions” were enabled, which is the default. A remote attacker could create symlinks and access arbitrary files from the server. Updated packages are available from security.ubuntu.com.

April 01, 2010 14:15 Ubuntu: New Puppet packages fix security issues

0

It was discovered that Puppet did not drop supplementary groups when being run as a different user. A local user may be able to use this flaw to bypass security restrictions and gain access to restricted files. It was discovered that Puppet did not correctly handle temporary files. A local user can exploit this flaw to bypass security restrictions and overwrite arbitrary files. Updated packages are available from security.ubuntu.com.

March 24, 2010 09:06 Ubuntu: New krb5 packages fix various security issues

0

Emmanuel Bouillon discovered that Kerberos did not correctly handle certain message types. An unauthenticated remote attacker could send specially crafted traffic to cause the KDC to crash, leading to a denial of service. It was discovered that Kerberos did not correctly handle certain GSS packets. An unauthenticated remote attacker could send specially crafted traffic that would cause services using GSS-API to crash, leading to a denial of service. Updated packages are available from security.ubuntu.com.

March 24, 2010 08:53 Ubuntu: New thunderbird packages fix various security issues

0

Several flaws were discovered in the JavaScript engine of Thunderbird, which could cause a denial of service or possibly execute arbitrary code. It was discovered that the BinHex decoder used in Thunderbird contained a flaw, which could cause a denial of service or possibly the execution of arbitrary code. It was discovered that Thunderbird did not properly manage memory when using XUL tree elements, which could cause a denial of service or possibly execution of arbitrary code. It was discovered that Thunderbird did not properly display filenames containing right-to-left (RTL) override characters, which could trick the user into opening a different file than the user expected. Flaws were discovered in the NTLM implementation, which could be used to send requests to other applications. A flaw was discovered in the way Thunderbird indexed certain messages with attachments, leading to a denial of service or possibly execution of arbitrary code. Updated packages are available from security.ubuntu.com.

March 24, 2010 08:13 Ubuntu: New linux packages fix various security issues

0

Mathias Krause discovered that the Linux kernel did not correctly handle missing ELF interpreters. A local attacker could exploit this to cause the system to crash, leading to a denial of service. Marcelo Tosatti discovered that the Linux kernel’s hardware virtualization did not correctly handle reading the /dev/port special device. A local attacker in a guest operating system could issue a specific read that would cause the host system to crash, leading to a denial of service. Sebastian Krahmer discovered that the Linux kernel did not correctly handle netlink connector messages. A local attacker could exploit this to consume kernel memory, leading to a denial of service. Ramon de Carvalho Valle discovered that the Linux kernel did not correctly validate certain memory migration calls. A local attacker could exploit this to read arbitrary kernel memory or cause a system crash, leading to a denial of service. Jermome Marchand and Mikael Pettersson discovered that the Linux kernel did not correctly handle certain futex operations. A local attacker could exploit this to cause a system crash, leading to a denial of service. Updated packages are available from security.ubuntu.com.

March 24, 2010 08:12 Ubuntu: New audiofile packages fix various security issues

0

It was discovered that Audio File Library contained a heap-based buffer overflow. If a user or automated system processed a crafted WAV file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. The default compiler options for Ubuntu should reduce this vulnerability to a denial of service. Updated packages are available from security.ubuntu.com.

March 15, 2010 10:20 Ubuntu: New MoinMoin packages fix various security issues

0

It was discovered that several wiki actions and preference settings in MoinMoin were not protected from cross-site request forgery (CSRF). If an authenticated user were tricked into visiting a malicious website while logged into MoinMoin, a remote attacker could change the user’s configuration or wiki content. It was discovered that MoinMoin did not properly sanitize its input when processing user preferences. An attacker could enter malicious content which when viewed by a user, could render in unexpected ways. Updated packages are available from security.ubuntu.com.

Screenshot

Project Spotlight

JFreeSVG

A fast, lightweight SVG generator for Java.

Screenshot

Project Spotlight

PHP MIME Mail decoder class

A PHP class to decode email messages.