No Image

USN-5243-2: AIDE vulnerability

2022-01-21 KENNETH 0

USN-5243-2: AIDE vulnerability USN-5243-1 fixed a vulnerability in aide. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Original advisory details: David Bouman discovered that AIDE incorrectly handled base64 operations. A local attacker could use this issue to cause AIDE to crash, resulting in a denial of service, or possibly execute arbitrary code. Source: USN-5243-2: AIDE vulnerability

No Image

USN-5243-1: AIDE vulnerability

2022-01-20 KENNETH 0

USN-5243-1: AIDE vulnerability David Bouman discovered that AIDE incorrectly handled base64 operations. A local attacker could use this issue to cause AIDE to crash, resulting in a denial of service, or possibly execute arbitrary code. Source: USN-5243-1: AIDE vulnerability

No Image

USN-5242-1: Open vSwitch vulnerability

2022-01-20 KENNETH 0

USN-5242-1: Open vSwitch vulnerability It was discovered that Open vSwitch incorrectly handled certain fragmented packets. A remote attacker could possibly use this issue to cause Open vSwitch to consume resources, leading to a denial of service. Source: USN-5242-1: Open vSwitch vulnerability

No Image

USN-5021-2: curl vulnerability

2022-01-20 KENNETH 0

USN-5021-2: curl vulnerability USN-5021-1 fixed vulnerabilities in curl. This update provides the corresponding updates for Ubuntu 16.04 ESM. Original advisory details: Harry Sintonen and Tomas Hoger discovered that curl incorrectly handled TELNET connections when the -t option was used on the command line. Uninitialized data possibly containing sensitive information could be sent to the remote server, contrary to expectations. (CVE-2021-22898, CVE-2021-22925) Source: USN-5021-2: curl vulnerability

No Image

LSN-0084-1: Kernel Live Patch Security Notice

2022-01-20 KENNETH 0

LSN-0084-1: Kernel Live Patch Security Notice William Liu and Jamie Hill-Daniel discovered that the file system context functionality in the Linux kernel contained an integer underflow vulnerability, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.(CVE-2022-0185) Source: LSN-0084-1: Kernel Live Patch Security Notice