No Image

USN-5974-1: GraphicsMagick vulnerabilities

2023-03-28 KENNETH 0

USN-5974-1: GraphicsMagick vulnerabilities It was discovered that GraphicsMagick was not properly performing bounds checks when processing TGA image files, which could lead to a heap buffer overflow. If a user or automated system were tricked into processing a specially crafted TGA image file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2018-20184) It was discovered that GraphicsMagick was not properly validating bits per pixel data when processing DIB image files. If a user or automated system were tricked into processing a specially crafted DIB image file, an attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2018-20189) It was discovered that GraphicsMagick was not properly processing [ more… ]

No Image

USN-5973-1: url-parse vulnerabilities

2023-03-27 KENNETH 0

USN-5973-1: url-parse vulnerabilities It was discovered that url-parse incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service, or to perform a server-side request forgery attack or open redirect attack. (CVE-2018-3774) It was discovered that url-parse incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to bypass input validation. This issue was only fixed in Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-8124) Yaniv Nizry discovered that url-parse incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to [ more… ]

No Image

USN-5964-2: curl vulnerabilities

2023-03-27 KENNETH 0

USN-5964-2: curl vulnerabilities USN-5964-1 fixed several vulnerabilities in curl. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Original advisory details: Harry Sintonen discovered that curl incorrectly handled certain TELNET connection options. Due to lack of proper input scrubbing, curl could pass on user name and telnet options to the server as provided, contrary to expectations. (CVE-2023-27533) Harry Sintonen discovered that curl incorrectly reused certain FTP connections. This could lead to the wrong credentials being reused, contrary to expectations. (CVE-2023-27535) Harry Sintonen discovered that curl incorrectly reused connections when the GSS delegation option had been changed. This could lead to the option being reused, contrary to expectations. (CVE-2023-27536) Source: USN-5964-2: curl vulnerabilities

No Image

WP Briefing: Episode 52: Workflows and Phase Three Visioning with Special Guest Héctor Prieto

2023-03-27 KENNETH 0

WP Briefing: Episode 52: Workflows and Phase Three Visioning with Special Guest Héctor Prieto On Episode fifty-two of the WordPress Briefing podcast, join WordPress Executive Director Josepha Haden Chomphosy and special guest Héctor Prieto as they discuss phase three and why it’s more than just collaborative editing! Have a question you’d like answered? You can submit them to [email protected], either written or as a voice recording. Credits Editor: Dustin HartzlerLogo: Javier ArceProduction: Santana InnissSong: Fearless First by Kevin MacLeod Have a question you’d like answered? You can submit them to [email protected], either written or as a voice recording. Show Notes Write as Blocks in an Encrypted Collaborative Environment by Riad Benguella Riad Benguella’s collaborative editing GitHub repository Riad Benguella’s WordPress.org Profile Block Collab: New package, a framework for collaborative editing GitHub PR Phase 3: Collaboration Matías Ventura Quick Search GH Issue Matías Ventura [ more… ]

No Image

LSN-0093-1: Kernel Live Patch Security Notice

2023-03-27 KENNETH 0

LSN-0093-1: Kernel Live Patch Security Notice Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-0179) It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-0461) Source: LSN-0093-1: Kernel Live Patch Security Notice