These are the Ubuntu security notices that affect the current supported releases of Ubuntu. These notices are also posted to the ubuntu-security-announce mailing list (list archive). To report a security vulnerability in an Ubuntu package, please contact the Ubuntu Security Team. You may also be interested in learning about Ubuntu security policies. For more details on a specific CVE or source package, please see the Ubuntu CVE Tracker.

You can also view the latest notices by subscribing to the RSS or the Atom feeds.

Latest notices

USN-23-1: apache2 vulnerability

Chintan Trivedi discovered a Denial of Service vulnerability in apache2. The field length limit was not enforced for certain malicious requests. This could allow a remote attacker who is able to send large amounts of data to a server to cause HTTP server instances to consume proportional amounts of memory, which can render the service unavailable.

12 November 2004 | ubuntu-4.10

USN-22-1: samba vulnerability

Karol Wiesek discovered a Denial of Service vulnerability in samba. A flaw in the input validation routines used to match filename strings containing wildcard characters may allow a remote user to consume more than normal amounts of CPU resources, thus impacting the performance and response of the server. In some circumstances the server…

10 November 2004 | ubuntu-4.10

USN-21-1: libgd vulnerabilities

Several buffer overflows have been discovered in libgd’s PNG handling functions. If an attacker tricked a user into loading a malicious PNG image, they could leverage this into executing arbitrary code in the context of the user opening image. Most importantly, this library is commonly used in PHP. One possible target would be a PHP driven photo…

10 November 2004 | ubuntu-4.10

USN-20-1: Ruby CGI module vulnerability

The Ruby developers discovered a potential Denial of Service vulnerability in the CGI module (cgi.rb). Specially crafted CGI requests could cause an infinite loop in the server process. Repetitive attacks could use most of the available processor resources, exhaust the number of allowed parallel connections in web servers, or cause similar effects…

9 November 2004 | ubuntu-4.10

USN-19-1: squid vulnerabilities

Recently, two Denial of Service vulnerabilities have been discovered in squid, a WWW proxy cache. Insufficient input validation in the NTLM authentication handler allowed a remote attacker to crash the service by sending a specially crafted NTLMSSP packet. Likewise, due to an insufficient validation of ASN.1 headers, a remote attacker…

7 November 2004 | ubuntu-4.10

USN-18-1: zip vulnerability

HexView discovered a buffer overflow in the zip package. The overflow is triggered by creating a ZIP archive of files with very long path names. This vulnerability might result in execution of arbitrary code with the privileges of the user who calls zip. This flaw may lead to privilege escalation on systems which automatically create ZIP archives…

6 November 2004 | ubuntu-4.10

USN-17-1: passwd vulnerability

Martin Schulze and Steve Grubb discovered a flaw in the authentication input validation of the “chfn” and “chsh” programs. This allowed logged in users with an expired password to change their real name and their login shell without having to change their password. This flaw cannot lead to privilege escalation and does not allow to modify account…

5 November 2004 | ubuntu-4.10

USN-16-1: perl vulnerabilities

Recently, Trustix Secure Linux discovered some vulnerabilities in the perl package. The utility “instmodsh”, the Perl package “PPPort.pm”, and several test scripts (which are not shipped and only used during build) created temporary files in an insecure way, which could allow a symlink attack to create or overwrite arbitrary files with…

3 November 2004 | ubuntu-4.10

USN-15-1: lvm10 vulnerability

Recently, Trustix Secure Linux discovered a vulnerability in a supplemental script of the lvm10 package. The program “lvmcreate_initrd” created a temporary directory in an insecure way, which could allow a symlink attack to create or overwrite arbitrary files with the privileges of the user invoking the program.

2 November 2004 | ubuntu-4.10

USN-14-1: xpdf vulnerabilities

Markus Meissner discovered even more integer overflow vulnerabilities in xpdf, a viewer for PDF files. These integer overflows can eventually lead to buffer overflows. The Common UNIX Printing System (CUPS) uses the same code to print PDF files; tetex-bin uses the code to generate PDF output and process included PDF files. In any case, these…

2 November 2004 | ubuntu-4.10