These are the Ubuntu security notices that affect the current supported releases of Ubuntu. These notices are also posted to the ubuntu-security-announce mailing list (list archive). To report a security vulnerability in an Ubuntu package, please contact the Ubuntu Security Team. You may also be interested in learning about Ubuntu security policies. For more details on a specific CVE or source package, please see the Ubuntu CVE Tracker.

You can also view the latest notices by subscribing to the RSS or the Atom feeds.

Latest notices

USN-327-1: firefox vulnerabilities

Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious URL. (CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3811, CVE-2006-3812) cross-site scripting vulnerabilities were…

28 July 2006 | ubuntu-6.06-lts

USN-326-1: heartbeat vulnerability

Yan Rong Ge discovered that heartbeat did not set proper permissions for an allocated shared memory segment. A local attacker could exploit this to render the heartbeat service unavailable (Denial of Service).

28 July 2006 | ubuntu-6.06-lts, ubuntu-5.10, ubuntu-5.04

USN-325-1: ruby1.8 vulnerability

The alias function, certain directory operations, and regular expressions did not correctly implement safe levels. Depending on the application these flaws might allow attackers to bypass safe level restrictions and perform unintended operations.

28 July 2006 | ubuntu-6.06-lts, ubuntu-5.10, ubuntu-5.04

USN-324-1: freetype vulnerability

An integer overflow has been discovered in the FreeType library. By tricking a user into installing and/or opening a specially crafted font file, these could be exploited to execute arbitrary code with the privileges of that user.

28 July 2006 | ubuntu-6.06-lts, ubuntu-5.10, ubuntu-5.04

USN-320-2: php4 regression

USN-320-2 fixed several vulnerabilities in PHP. James Manning discovered that the Ubuntu 5.04 update introduced a regression, the function tempnam() caused a crash of the PHP interpreter in some circumstances. The updated packages fix this. We apologize for the inconvenience.

26 July 2006 | ubuntu-5.04

USN-297-3: Thunderbird vulnerabilities

USN-297-1 fixed several vulnerabilities in Thunderbird for the Ubuntu 6.06 LTS release. This update provides the corresponding fixes for Ubuntu 5.04 and Ubuntu 5.10. For reference, these are the details of the original USN: Jonas Sicking discovered that under some circumstances persisted XUL attributes are associated with the wrong URL. A…

26 July 2006 | ubuntu-5.10, ubuntu-5.04

USN-323-1: mozilla vulnerabilities

Jonas Sicking discovered that under some circumstances persisted XUL attributes are associated with the wrong URL. A malicious web site could exploit this to execute arbitrary code with the privileges of the user. (MFSA 2006-35, CVE-2006-2775) Paul Nickerson discovered that content-defined setters on an object prototype were getting called by…

26 July 2006 | ubuntu-5.10, ubuntu-5.04

USN-296-2: Firefox vulnerabilities

USN-296-1 fixed several vulnerabilities in Firefox for the Ubuntu 6.06 LTS release. This update provides the corresponding fixes for Ubuntu 5.04 and Ubuntu 5.10. For reference, these are the details of the original USN: Jonas Sicking discovered that under some circumstances persisted XUL attributes are associated with the wrong URL. A…

25 July 2006 | ubuntu-5.10, ubuntu-5.04

USN-322-1: Konqueror vulnerability

A Denial of Service vulnerability has been reported in the replaceChild() method in KDE’s DOM handler. A malicious remote web page could exploit this to cause Konqueror to crash.

25 July 2006 | ubuntu-6.06-lts, ubuntu-5.10, ubuntu-5.04

USN-321-1: mysql-dfsg-4.1 vulnerability

Jean-David Maillefer discovered a format string bug in the date_format() function’s error reporting. By calling the function with invalid arguments, an authenticated user could exploit this to crash the server.

21 July 2006 | ubuntu-5.10