Flubber Posted February 15, 2011 Report Posted February 15, 2011 2 urate.1. ===========================================================Ubuntu Security Notice USN-1064-1 February 15, 2011openssl vulnerabilityCVE-2011-0014===========================================================A security issue affects the following Ubuntu releases:Ubuntu 10.04 LTSUbuntu 10.10This advisory also applies to the corresponding versions ofKubuntu, Edubuntu, and Xubuntu.The problem can be corrected by upgrading your system to thefollowing package versions:Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.6Ubuntu 10.10: libssl0.9.8 0.9.8o-1ubuntu4.4After a standard system update you need to reboot your computer to makeall the necessary changes.Details follow:Neel Mehta discovered that incorrectly formatted ClientHello handshakemessages could cause OpenSSL to parse past the end of the message.This could allow a remote attacker to cause a crash and denial ofservice by triggering invalid memory accesses.2.===========================================================Ubuntu Security Notice USN-1065-1 February 15, 2011shadow vulnerabilityCVE-2011-0721===========================================================A security issue affects the following Ubuntu releases:Ubuntu 9.10Ubuntu 10.04 LTSUbuntu 10.10This advisory also applies to the corresponding versions ofKubuntu, Edubuntu, and Xubuntu.The problem can be corrected by upgrading your system to thefollowing package versions:Ubuntu 9.10: passwd 1:4.1.4.1-1ubuntu2.2Ubuntu 10.04 LTS: passwd 1:4.1.4.2-1ubuntu2.2Ubuntu 10.10: passwd 1:4.1.4.2-1ubuntu3.2In general, a standard system update will make all the necessary changes.Details follow:Kees Cook discovered that some shadow utilities did not correctly validateuser input. A local attacker could exploit this flaw to inject newlines intothe /etc/passwd file. If the system was configured to use NIS, this couldlead to existing NIS groups or users gaining or losing access to the system,resulting in a denial of service or unauthorized access.Update & packet upgrade:sudo apt-get updatesudo apt-get upgradesudo apt-get cleansudo apt-get autocleansudo apt-get autoremovesudo shutdown -r 0 -- restart^ sau: sudo rebootPrimite via RSS1] http://seclists.org/fulldisclosure/2011/Feb/3132] http://seclists.org/fulldisclosure/2011/Feb/329 Quote