Ubuntu Essential and Critical Security Patch Updates - Page 365
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
It was discovered that Gaim did not properly handle certain malformed messages when sending a file using the XMPP protocol handler. If a user were tricked into sending a file, a remote attacker could send a specially crafted response and cause Gaim to crash, or possibly execute arbitrary code with user privileges. (CVE-2009-1373) [More...]
Anibal Sacco discovered that CUPS did not properly handle certain network operations. A remote attacker could exploit this flaw and cause the CUPS server to crash, resulting in a denial of service.
It was discovered that cron did not properly check the return code ofthe setgid() and initgroups() system calls. A local attacker could usethis to escalate group privileges. Please note that cron versions 3.0pl1-64and later were already patched to address the more serious setuid() checkreferred to by CVE-2006-2607. [More...]
A stack-based buffer overflow was discovered in ntpq. If a user weretricked into connecting to a malicious ntp server, a remote attacker couldcause a denial of service in ntpq, or possibly execute arbitrary code withthe privileges of the user invoking the program. (CVE-2009-0159) [More...]
USN-776-1 fixed vulnerabilities in KVM. Due to an incorrect fix, a regression was introduced in Ubuntu 8.04 LTS that caused KVM to fail to boot virtual machines started via libvirt. This update fixes the problem. We apologize for the inconvenience. [More...]
It was discovered that the BGP service in Quagga did not correctlyhandle certain AS paths containing 4-byte ASNs. An authenticated remoteattacker could exploit this flaw to cause bgpd to abort, leading to adenial of service. [More...]
Avi Kivity discovered that KVM did not correctly handle certain diskformats. A local attacker could attach a malicious partition thatwould allow the guest VM to read files on the VM host. (CVE-2008-1945,CVE-2008-2004) [More...]
It was discovered that MoinMoin did not properly sanitize its input when attaching files, resulting in cross-site scripting (XSS) vulnerabilities. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, [More...]
It was discovered that MPFR improperly handled string lengths in its print routines. If a user or automated system were tricked into processing specially crafted data with applications linked against MPFR, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. [More...]
Will Drewry discovered that Pango incorrectly handled rendering text with long glyphstrings. If a user were tricked into displaying specially crafted data with applications linked against Pango, such as Firefox, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. [More...]
It was discovered that libmodplug did not correctly handle certain parameters when parsing MED media files. If a user or automated system were tricked into opening a crafted MED file, an attacker could execute arbitrary code with privileges of the user invoking the program. (CVE-2009-1438) [More...]
A flaw was discovered in the clamav-milter initscript which caused theownership of the current working directory to be changed to the 'clamav'user. This update attempts to repair the incorrect ownership for standardsystem directories, but it is recommended that the following command beperformed to report any other directories that may be affected: [More...]
Tavis Ormandy discovered that libwmf incorrectly used memory after it had been freed when using its embedded GD library. If a user or automated system were tricked into opening a crafted WMF file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. [More...]
Stephane Chazelas discovered that Apport did not safely remove files fromits crash report directory. If Apport had been enabled at some point, alocal attacker could remove arbitrary files from the system. [More...]
It was discovered that the upstream security fixes in USN-764-1 introduceda regression which could cause the browser to crash. If a user were trickedinto viewing a malicious website, a remote attacker could cause a denial ofservice or possibly execute arbitrary code with the privileges of the userinvoking the program. [More...]
Tavis Ormandy discovered that FreeType did not correctly handle certain large values in font files. If a user were tricked into using a specially crafted font file, a remote attacker could execute arbitrary code with user privileges. [More...]
It was discovered that acpid did not properly handle a large number of connections. A local user could exploit this and monopolize CPU resources, leading to a denial of service.
USN-761-1 fixed vulnerabilities in PHP. This update provides the corresponding updates for Ubuntu 9.04.
Several flaws were discovered in the browser engine. If a user were trickedinto viewing a malicious website, a remote attacker could cause a denial ofservice or possibly execute arbitrary code with the privileges of the userinvoking the program. (CVE-2009-1302, CVE-2009-1303, CVE-2009-1304,CVE-2009-1305) [More...]
Alexandre Martani discovered that the APT daily cron script did not checkthe return code of the date command. If a machine is configured forautomatic updates and is in a time zone where DST occurs at midnight, undercertain circumstances automatic updates might not be applied and couldbecome permanently disabled. (CVE-2009-1300) [More...]