These are the Ubuntu security notices that affect the current supported releases of Ubuntu. These notices are also posted to the ubuntu-security-announce mailing list (list archive). To report a security vulnerability in an Ubuntu package, please contact the Ubuntu Security Team. You may also be interested in learning about Ubuntu security policies. For more details on a specific CVE or source package, please see the Ubuntu CVE Tracker.

You can also view the latest notices by subscribing to the RSS or the Atom feeds.

Latest notices

USN-343-1: bind9 vulnerabilities

bind did not sufficiently verify particular requests and responses from other name servers and users. By sending a specially crafted packet, a remote attacker could exploit this to crash the name server.

8 September 2006 | ubuntu-6.06-lts, ubuntu-5.10, ubuntu-5.04

USN-342-1: PHP vulnerabilities

The sscanf() function did not properly check array boundaries. In applications which use sscanf() with argument swapping, a remote attacker could potentially exploit this to crash the affected web application or even execute arbitrary code with the application’s privileges. (CVE-2006-4020) The file_exists() and imap_reopen() functions did not…

7 September 2006 | ubuntu-6.06-lts, ubuntu-5.10, ubuntu-5.04

USN-341-1: libxfont vulnerability

An integer overflow has been discovered in X.org’s font handling library. By using a specially crafted font file, this could be exploited to crash the X server or execute arbitrary code with root privileges.

7 September 2006 | ubuntu-6.06-lts, ubuntu-5.10, ubuntu-5.04

USN-340-1: imagemagick vulnerabilities

Tavis Ormandy discovered several buffer overflows in imagemagick’s Sun Raster and XCF (Gimp) image decoders. By tricking a user or automated system into processing a specially crafted image, this could be exploited to execute arbitrary code with the users’ privileges.

6 September 2006 | ubuntu-6.06-lts, ubuntu-5.10, ubuntu-5.04

USN-339-1: OpenSSL vulnerability

Philip Mackenzie, Marius Schilder, Jason Waddle and Ben Laurie of Google Security discovered that the OpenSSL library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge signatures without the need of the secret key.

5 September 2006 | ubuntu-6.06-lts, ubuntu-5.10, ubuntu-5.04

USN-338-1: MySQL vulnerabilities

Dmitri Lenev discovered that arguments of setuid SQL functions were evaluated in the security context of the functions’ definer instead of its caller. An authenticated user with the privilege to call such a function could exploit this to execute arbitrary statements with the privileges of the definer of that function. (CVE-2006-4227) Peter…

5 September 2006 | ubuntu-6.06-lts

USN-337-1: imagemagick vulnerability

Damian Put discovered a buffer overflow in imagemagick’s SGI file format decoder. By tricking an user or automated system into processing a specially crafted SGI image, this could be exploited to execute arbitrary code with the user’s privileges.

17 August 2006 | ubuntu-6.06-lts, ubuntu-5.10, ubuntu-5.04

USN-336-1: binutils vulnerability

A buffer overflow was discovered in gas (the GNU assembler). By tricking an user or automated system (like a compile farm) into assembling a specially crafted source file with gcc or gas, this could be exploited to execute arbitrary code with the user’s privileges.

17 August 2006 | ubuntu-5.10, ubuntu-5.04

USN-335-1: heartbeat vulnerability

Yan Rong Ge discovered that heartbeat did not sufficiently verify some packet input data, which could lead to an out-of-boundary memory access. A remote attacker could exploit this to crash the daemon (Denial of Service).

16 August 2006 | ubuntu-6.06-lts, ubuntu-5.10, ubuntu-5.04

USN-334-1: krb5 vulnerabilities

Michael Calmer and Marcus Meissner discovered that several krb5 tools did not check the return values from setuid() system calls. On systems that have configured user process limits, it may be possible for an attacker to cause setuid() to fail via resource starvation. In that situation, the tools will not reduce their privilege levels, and…

16 August 2006 | ubuntu-6.06-lts, ubuntu-5.10, ubuntu-5.04