No Image

USN-3957-1: MySQL vulnerabilities

2019-04-29 KENNETH 0

USN-3957-1: MySQL vulnerabilities mysql-5.7 vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.04 Ubuntu 18.10 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Summary Several security issues were fixed in MySQL. Software Description mysql-5.7 – MySQL database Details Multiple security issues were discovered in MySQL and this update includes a new upstream MySQL version to fix these issues. Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 18.10, and Ubuntu 19.04 have been updated to MySQL 5.7.26. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information: https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-26.html https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 19.04 mysql-server-5.7 – 5.7.26-0ubuntu0.19.04.1 Ubuntu 18.10 mysql-server-5.7 – 5.7.26-0ubuntu0.18.10.1 Ubuntu 18.04 LTS mysql-server-5.7 – 5.7.26-0ubuntu0.18.04.1 Ubuntu 16.04 LTS mysql-server-5.7 [ more… ]

No Image

USN-3956-1: Bind vulnerability

2019-04-25 KENNETH 0

USN-3956-1: Bind vulnerability bind9 vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.04 Ubuntu 18.10 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Summary Bind could be made to consume resources if it received specially crafted network traffic. Software Description bind9 – Internet Domain Name Server Details It was discovered that Bind incorrectly handled limiting the number of simultaneous TCP clients. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 19.04 bind9 – 1:9.11.5.P1+dfsg-1ubuntu2.3 Ubuntu 18.10 bind9 – 1:9.11.4+dfsg-3ubuntu5.3 Ubuntu 18.04 LTS bind9 – 1:9.11.3+dfsg-1ubuntu1.7 Ubuntu 16.04 LTS bind9 – 1:9.10.3.dfsg.P4-8ubuntu1.14 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. In general, a standard system update will make all [ more… ]

No Image

USN-3922-3: PHP vulnerabilities

2019-04-25 KENNETH 0

USN-3922-3: PHP vulnerabilities php5 vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.04 ESM Summary Several security issues were fixed in PHP. Software Description php5 – HTML-embedded scripting language interpreter Details USN-3922-1 fixed several vulnerabilities in PHP. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that PHP incorrectly handled certain files. An attacker could possibly use this issue to access sensitive information. (CVE-2019-9022) It was discovered that PHP incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-9675) Original advisory details: It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to expose sensitive information. (CVE-2019-9637, CVE-2019-9638, CVE-2019-9639, CVE-2019-9640, CVE-2019-9641) Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 [ more… ]

No Image

USN-3955-1: tcpflow vulnerabilities

2019-04-25 KENNETH 0

USN-3955-1: tcpflow vulnerabilities tcpflow vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 18.10 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Summary tcpflow could be made to crash or expose sensitive information over the network if it opened a specially crafted file or received specially crafted network traffic. Software Description tcpflow – TCP flow recorder Details It was discovered that tcpflow incorrectly handled certain malformed network packets. A remote attacker could send these packets to a target system, causing tcpflow to crash or possibly disclose sensitive information. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 18.10 tcpflow – 1.4.5+repack1-4ubuntu0.18.10.1 tcpflow-nox – 1.4.5+repack1-4ubuntu0.18.10.1 Ubuntu 18.04 LTS tcpflow – 1.4.5+repack1-4ubuntu0.18.04.1 tcpflow-nox – 1.4.5+repack1-4ubuntu0.18.04.1 Ubuntu 16.04 LTS tcpflow – 1.4.5+repack1-1ubuntu0.1 tcpflow-nox – 1.4.5+repack1-1ubuntu0.1 To update your system, please follow these instructions: [ more… ]

No Image

USN-3954-1: FreeRADIUS vulnerabilities

2019-04-24 KENNETH 0

USN-3954-1: FreeRADIUS vulnerabilities freeradius vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.04 Ubuntu 18.10 Ubuntu 18.04 LTS Summary FreeRADIUS could be made to bypass authentication if it received a specially crafted input. Software Description freeradius – high-performance and highly configurable RADIUS server Details It was discovered that FreeRADIUS incorrectly handled certain inputs. An attacker could possibly use this issue to bypass authentication. (CVE-2019-11234, CVE-2019-11235) Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 19.04 freeradius – 3.0.17+dfsg-1ubuntu2.1 Ubuntu 18.10 freeradius – 3.0.16+dfsg-3ubuntu1.1 Ubuntu 18.04 LTS freeradius – 3.0.16+dfsg-1ubuntu3.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. In general, a standard system update will make all the necessary changes. References CVE-2019-11234 CVE-2019-11235 Source: USN-3954-1: FreeRADIUS vulnerabilities