Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

==========================================================================
Ubuntu Security Notice USN-1568-1
September 14, 2012

linux vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 11.10

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux: Linux kernel

Details:

Ben Hutchings reported a flaw in the Linux kernel with some network drivers
that support TSO (TCP segment offload). A local or peer user could exploit
this flaw to to cause a denial of service. (CVE-2012-3412)

Jay Fenlason and Doug Ledford discovered a bug in the Linux kernel
implementation of RDS sockets. A local unprivileged user could potentially
use this flaw to read privileged information from the kernel.
(CVE-2012-3430)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 11.10:
  linux-image-3.0.0-26-generic    3.0.0-26.42
  linux-image-3.0.0-26-generic-pae  3.0.0-26.42
  linux-image-3.0.0-26-omap       3.0.0-26.42
  linux-image-3.0.0-26-powerpc    3.0.0-26.42
  linux-image-3.0.0-26-powerpc-smp  3.0.0-26.42
  linux-image-3.0.0-26-powerpc64-smp  3.0.0-26.42
  linux-image-3.0.0-26-server     3.0.0-26.42
  linux-image-3.0.0-26-virtual    3.0.0-26.42

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References:
  http://www.ubuntu.com/usn/usn-1568-1
  CVE-2012-3412, CVE-2012-3430

Package Information:
  https://launchpad.net/ubuntu/+source/linux/3.0.0-26.42


--------------060809010206000003090501
Content-Type: text/plain; charset=UTF-8;
 name="Attached Message Part"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
 filename="Attached Message Part"


--------------060809010206000003090501--

--------------enig90C03F89D79D39C9B3665A97
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=8z6X
-----END PGP SIGNATURE-----

--------------enig90C03F89D79D39C9B3665A97--


--==============�94884465245771502=Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

-- 
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--==============�94884465245771502==--

From - Mon Sep 17 08:59:00 2012
X-Account-Key: account7
X-UIDL: 4d7faa1e0001ee4e
X-Mozilla-Status: 0001
X-Mozilla-Status2: 10000000
X-Mozilla-Keys:                                                                                 
Return-Path: <ubuntu-security-announce-bounces@lists.ubuntu.com>
X-Original-To: lists@securityspace.com
Delivered-To: lists@securityspace.com
Received: from chlorine.canonical.com (chlorine.canonical.com [91.189.94.204])
by mx.securityspace.com (Postfix) with ESMTP id F284DEC187
for <lists@securityspace.com>; Mon, 17 Sep 2012 08:54:26 -0400 (EDT)
Received: from localhost ([127.0.0.1] helo=chlorine.canonical.com)
by chlorine.canonical.com with esmtp (Exim 4.71)
(envelope-from <ubuntu-security-announce-bounces@lists.ubuntu.com>)
id 1TDanB-0007V8-Kv; Mon, 17 Sep 2012 12:51:13 +0000
Received: from youngberry.canonical.com ([91.189.89.112])
by chlorine.canonical.com with esmtp (Exim 4.71)
(envelope-from <marc.deslauriers@canonical.com>) id 1TDamw-0007UL-Mm
for ubuntu-security-announce@lists.ubuntu.com;
Mon, 17 Sep 2012 12:50:58 +0000
Received: from modemcable236.11-81-70.mc.videotron.ca ([70.81.11.236]
helo=[192.168.66.150]) by youngberry.canonical.com with esmtpsa
(TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.71)
(envelope-from <marc.deslauriers@canonical.com>) id 1TDaor-0005Na-TV
for ubuntu-security-announce@lists.ubuntu.com;
Mon, 17 Sep 2012 12:52:58 +0000
Message-ID: <1347886373.3321.5.camel@mdlinux>
Subject: [USN-1569-1] PHP vulnerabilities
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Date: Mon, 17 Sep 2012 08:52:53 -0400
X-Mailer: Evolution 3.2.3-0ubuntu6 
Mime-Version: 1.0
X-Mailman-Approved-At: Mon, 17 Sep 2012 12:51:09 +0000
X-BeenThere: ubuntu-security-announce@lists.ubuntu.com
X-Mailman-Version: 2.1.13
Precedence: list
Reply-To: ubuntu-users@lists.ubuntu.com, Ubuntu Security <security@ubuntu.com>
List-Id: Ubuntu Security Announcements
<ubuntu-security-announce.lists.ubuntu.com>
List-Unsubscribe: <https://lists.ubuntu.com/mailman/options/ubuntu-security-announce>,
<mailto:ubuntu-security-announce-request@lists.ubuntu.com?subject=unsubscribe>
List-Archive: <https://lists.ubuntu.com/archives/ubuntu-security-announce>
List-Post: <mailto:ubuntu-security-announce@lists.ubuntu.com>
List-Help: <mailto:ubuntu-security-announce-request@lists.ubuntu.com?subject=help>
List-Subscribe: <https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce>,
<mailto:ubuntu-security-announce-request@lists.ubuntu.com?subject=subscribe>
Content-Type: multipart/mixed; boundary="==============88060801116473731=="
Sender: ubuntu-security-announce-bounces@lists.ubuntu.com
Errors-To: ubuntu-security-announce-bounces@lists.ubuntu.com
Status:   


--==============88060801116473731=Content-Type: multipart/signed; micalg="pgp-sha512";
protocol="application/pgp-signature"; boundary="=-Dr10ZaS0JU7aVjbmE+/7"


--=-Dr10ZaS0JU7aVjbmE+/7
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1569-1
September 17, 2012

php5 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS

Summary:

Several security issues were fixed in PHP.

Software Description:
- php5: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP incorrectly handled certain character sequences
when applying HTTP response-splitting protection. A remote attacker could
create a specially-crafted URL and inject arbitrary headers.
(CVE-2011-1398, CVE-2012-4388)

It was discovered that PHP incorrectly handled directories with a large
number of files. This could allow a remote attacker to execute arbitrary
code with the privileges of the web server, or to perform a denial of
service. (CVE-2012-2688)

It was discovered that PHP incorrectly parsed certain PDO prepared
statements. A remote attacker could use this flaw to cause PHP to crash,
leading to a denial of service. (CVE-2012-3450)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
  php5                            5.3.10-1ubuntu3.4

Ubuntu 11.10:
  php5                            5.3.6-13ubuntu3.9

Ubuntu 11.04:
  php5                            5.3.5-1ubuntu7.11

Ubuntu 10.04 LTS:
  php5                            5.3.2-1ubuntu4.18

Ubuntu 8.04 LTS:
  php5                            5.2.4-2ubuntu5.26

In general, a standard system update will make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-1569-1
  CVE-2011-1398, CVE-2012-2688, CVE-2012-3450, CVE-2012-4388

Package Information:
  https://launchpad.net/ubuntu/+source/php5/5.3.10-1ubuntu3.4
  https://launchpad.net/ubuntu/+source/php5/5.3.6-13ubuntu3.9
  https://launchpad.net/ubuntu/+source/php5/5.3.5-1ubuntu7.11
  https://launchpad.net/ubuntu/+source/php5/5.3.2-1ubuntu4.18
  https://launchpad.net/ubuntu/+source/php5/5.2.4-2ubuntu5.26





© 1998-2025 E-Soft Inc. All rights reserved.