LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: July 18th, 2014
Linux Advisory Watch: July 13th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Ubuntu
Find the information you need for your favorite open source distribution

To browse through our weekly Linux Advisory Watch newsletters, click here.



Ubuntu: 1009-2: GNU C Library vulnerability  12 January 2011 
Posted by Benjamin D. Thomas   
USN-1009-1 fixed vulnerabilities in the GNU C library. Colin Watsondiscovered that the fixes were incomplete and introduced flaws withsetuid programs loading libraries that used dynamic string tokens in theirRPATH. If the "man" program was installed setuid, a local attacker couldexploit this to gain "man" user privileges, potentially leading to further [More...]
 
Ubuntu: 1042-1: PHP vulnerabilities  11 January 2011 
Posted by Benjamin D. Thomas   
It was discovered that an integer overflow in the XML UTF-8 decodingcode could allow an attacker to bypass cross-site scripting (XSS)protections. This issue only affected Ubuntu 6.06 LTS, Ubuntu 8.04 LTS,and Ubuntu 9.10. (CVE-2009-5016) [More...]
 
Ubuntu: 1041-1: Linux kernel vulnerabilities  10 January 2011 
Posted by Benjamin D. Thomas   
Dan Rosenberg discovered that the btrfs filesystem did not correctlyvalidate permissions when using the clone function. A local attacker couldoverwrite the contents of file handles that were opened for append-only,or potentially read arbitrary contents, leading to a loss of privacy. OnlyUbuntu 9.10 was affected. (CVE-2010-2537, CVE-2010-2538) [More...]
 
Ubuntu: 1040-1: Django vulnerabilities  06 January 2011 
Posted by Benjamin D. Thomas   
Adam Baldwin discovered that Django did not properly validate query stringlookups. This could be exploited to provide an information leak to anattacker with admin privilieges. (CVE-2010-4534) [More...]
 
Ubuntu: 1036-1: CUPS update  06 January 2011 
Posted by Benjamin D. Thomas   
Under certain circumstances, CUPS could start before its AppArmor profilewas loaded and therefore run unconfined. This update ensures the AppArmorprofile is loaded before CUPS starts. [More...]
 
Ubuntu: 1038-1: dpkg vulnerability  06 January 2011 
Posted by Benjamin D. Thomas   
Jakub Wilk and RaphaŽl Hertzog discovered that dpkg-source did notcorrectly handle certain paths and symlinks when unpacking source-formatversion 3.0 packages. If a user or an automated system were tricked intounpacking a specially crafted source package, a remote attacker couldmodify files outside the target unpack directory, leading to a denial [More...]
 
Ubuntu: 1033-1: Eucalyptus vulnerability  16 December 2010 
Posted by Benjamin D. Thomas   
It was discovered that Eucalyptus did not verify password resets fromthe Admin UI correctly. An unauthenticated remote attacker could issuepassword reset requests to gain admin privileges in the Eucalyptusenvironment. [More...]
 
<< Start < Prev 175 176 177 Next > End >>

Results 1219 - 1225 of 1830
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Anti-surveillance advocates want you to run an open, secure WiFi router
Attackers raid SWISS BANKS with DNS and malware bombs
A Convicted Hacker and an Internet Icon Join Forces to Thwart NSA Spying
Black Hat presentation on TOR suddenly cancelled
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.