No Image

USN-4001-1: libseccomp vulnerability

2019-05-31 KENNETH 0

USN-4001-1: libseccomp vulnerability libseccomp vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.04 Ubuntu 18.10 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Summary libseccomp could allow unintended access to system calls. Software Description libseccomp – library for working with the Linux seccomp filter Details Jann Horn discovered that libseccomp did not correctly generate 64-bit syscall argument comparisons with arithmetic operators (LT, GT, LE, GE). An attacker could use this to bypass intended access restrictions for argument-filtered system calls. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 19.04 libseccomp2 – 2.4.1-0ubuntu0.19.04.3 Ubuntu 18.10 libseccomp2 – 2.4.1-0ubuntu0.18.10.3 Ubuntu 18.04 LTS libseccomp2 – 2.4.1-0ubuntu0.18.04.2 Ubuntu 16.04 LTS libseccomp2 – 2.4.1-0ubuntu0.16.04.2 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. This update uses a new upstream release which includes additional bug [ more… ]

[도서] 오브젝트

2019-05-31 KENNETH 0

[도서] 오브젝트 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]오브젝트 조영호 저 | 위키북스 | 2019년 06월 판매가 34,200원 (10%할인) | YES포인트 1,900원(5%지급) 이벤트 : IT모바일 예약판매 이벤트 역할, 책임, 협력을 향해 객체지향적으로 프로그래밍하라! 객체지향으로 향하는 첫걸음은 클래스가 아니라 객체를 바라보는 것에서부터 시작한다. 객체지향으로 향하는 두번째 걸음은 객체를 독립적인 존재가 아 Source: [도서] 오브젝트

No Image

USN-4000-1: Corosync vulnerability

2019-05-31 KENNETH 0

USN-4000-1: Corosync vulnerability corosync vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 18.04 LTS Ubuntu 16.04 LTS Summary Corosync could be made to crash or execute arbitrary code if it received a specially crafted request. Software Description corosync – cluster engine daemon and utilities Details It was discovered that Corosync incorrectly handled certain requests. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS corosync – 2.4.3-0ubuntu1.1 libtotem-pg5 – 2.4.3-0ubuntu1.1 Ubuntu 16.04 LTS corosync – 2.3.5-3ubuntu2.3 libtotem-pg5 – 2.3.5-3ubuntu2.3 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to restart Corosync to make all the necessary changes. References CVE-2018-1084 Source: USN-4000-1: Corosync [ more… ]

No Image

USN-3999-1: GnuTLS vulnerabilities

2019-05-30 KENNETH 0

USN-3999-1: GnuTLS vulnerabilities gnutls28 vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.04 Ubuntu 18.10 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Summary Several security issues were fixed in GnuTLS. Software Description gnutls28 – GNU TLS library Details Eyal Ronen, Kenneth G. Paterson, and Adi Shamir discovered that GnuTLS was vulnerable to a timing side-channel attack known as the "Lucky Thirteen" issue. A remote attacker could possibly use this issue to perform plaintext-recovery attacks via analysis of timing data. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-10844, CVE-2018-10845, CVE-2018-10846) Tavis Ormandy discovered that GnuTLS incorrectly handled memory when verifying certain X.509 certificates. A remote attacker could use this issue to cause GnuTLS to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, [ more… ]

No Image

USN-3998-1: Evolution Data Server vulnerability

2019-05-30 KENNETH 0

USN-3998-1: Evolution Data Server vulnerability evolution-data-server vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 18.04 LTS Ubuntu 16.04 LTS Summary Evolution Data Server would sometimes display email content as encrypted when it was not. Software Description evolution-data-server – Evolution suite data server Details Marcus Brinkmann discovered that Evolution Data Server did not correctly interpret the output from GPG when decrypting encrypted messages. Under certain circumstances, this could result in displaying clear-text portions of encrypted messages as though they were encrypted. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS evolution-data-server – 3.28.5-0ubuntu0.18.04.2 evolution-data-server-common – 3.28.5-0ubuntu0.18.04.2 libcamel-1.2-61 – 3.28.5-0ubuntu0.18.04.2 libebackend-1.2-10 – 3.28.5-0ubuntu0.18.04.2 libedataserver-1.2-23 – 3.28.5-0ubuntu0.18.04.2 Ubuntu 16.04 LTS evolution-data-server – 3.18.5-1ubuntu1.2 evolution-data-server-common – 3.18.5-1ubuntu1.2 libcamel-1.2-54 – 3.18.5-1ubuntu1.2 libebackend-1.2-10 – 3.18.5-1ubuntu1.2 libedataserver-1.2-21 – 3.18.5-1ubuntu1.2 To update your [ more… ]