These are the Ubuntu security notices that affect the current supported releases of Ubuntu. These notices are also posted to the ubuntu-security-announce mailing list (list archive). To report a security vulnerability in an Ubuntu package, please contact the Ubuntu Security Team. You may also be interested in learning about Ubuntu security policies. For more details on a specific CVE or source package, please see the Ubuntu CVE Tracker.

You can also view the latest notices by subscribing to the RSS or the Atom feeds.

Latest notices

USN-16-1: perl vulnerabilities

Recently, Trustix Secure Linux discovered some vulnerabilities in the perl package. The utility “instmodsh”, the Perl package “PPPort.pm”, and several test scripts (which are not shipped and only used during build) created temporary files in an insecure way, which could allow a symlink attack to create or overwrite arbitrary files with…

3 November 2004 | ubuntu-4.10

USN-15-1: lvm10 vulnerability

Recently, Trustix Secure Linux discovered a vulnerability in a supplemental script of the lvm10 package. The program “lvmcreate_initrd” created a temporary directory in an insecure way, which could allow a symlink attack to create or overwrite arbitrary files with the privileges of the user invoking the program.

2 November 2004 | ubuntu-4.10

USN-14-1: xpdf vulnerabilities

Markus Meissner discovered even more integer overflow vulnerabilities in xpdf, a viewer for PDF files. These integer overflows can eventually lead to buffer overflows. The Common UNIX Printing System (CUPS) uses the same code to print PDF files; tetex-bin uses the code to generate PDF output and process included PDF files. In any case, these…

2 November 2004 | ubuntu-4.10

USN-13-1: groff utility vulnerability

Recently, Trustix Secure Linux discovered a vulnerability in the groff package. The utility “groffer” created a temporary directory in an insecure way, which allowed exploitation of a race condition to create or overwrite files with the privileges of the user invoking the program.

2 November 2004 | ubuntu-4.10

USN-10-1: XML library vulnerabilities

Several buffer overflows have been discovered in libxml2’s FTP connection and DNS resolution functions. Supplying very long FTP URLs or IP addresses might result in execution of arbitrary code with the privileges of the process using libxml2. Since libxml2 is used in packages like php4-imagick, the vulnerability also might lead to privilege…

30 October 2004 | ubuntu-4.10

USN-12-1: ppp Denial of Service

It has been discovered that ppp does not properly verify certain data structures used in the CBCP protocol. This vulnerability could allow an attacker to cause the pppd server to crash due to an invalid memory access, leading to a denial of service. However, there is no possibility of code execution or privilege escalation.

29 October 2004 | ubuntu-4.10

USN-11-1: libgd2 vulnerabilities

Several buffer overflows have been discovered in libgd’s PNG handling functions. If an attacker tricked a user into loading a malicious PNG image, they could leverage this into executing arbitrary code in the context of the user opening image. Most importantly, this library is commonly used in PHP. One possible target would be a PHP driven photo…

29 October 2004 | ubuntu-4.10

USN-9-1: tetex-bin vulnerabilities

Chris Evans and Marcus Meissner recently discovered several integer overflow vulnerabilities in xpdf, a viewer for PDF files. Because tetex-bin contains xpdf code, it is also affected. These vulnerabilities could be exploited by an attacker providing a specially crafted TeX, LaTeX, or PDF file. Processing such a file with pdflatex could result in…

28 October 2004 | ubuntu-4.10

USN-4-1: Standard C library script vulnerabilities

Recently, Trustix Secure Linux discovered some vulnerabilities in the libc6 package. The utilities “catchsegv” and “glibcbug” created temporary files in an insecure way, which allowed a symlink attack to create or overwrite arbitrary files with the privileges of the user invoking the program.

28 October 2004 | ubuntu-4.10

USN-8-1: gaim vulnerabilities

A buffer overflow and two remote crashes were recently discovered in gaim’s MSN protocol handler. An attacker could potentially execute arbitrary code with the user’s privileges by crafting and sending a particular MSN message.

27 October 2004 | ubuntu-4.10