IT News

Willkommen auf der Seite mit Neuigkeiten und Informationen des aktuellen Monates rund um die Thematik der IT, IT-Sicherheit und meinem eigenen kleinen Webprojekt.

Hier finden Sie eine kleine Auswahl an externen Feeds wieder mit denen sich nicht nur Administratoren aus den Welten von Microsoft® und Linux® beschäftigen sollten, zudem spezifisch zu Ubuntu und Kubuntu.

Ebenfalls haben Sie die Möglichkeit die aktuellen Nachrichten über die Veröffentlichung neuer Artikel
unter HowTo's, ... zu meiner Webseite mittels einem Feedreader zu abonieren im Format RSS 2.0 und im Nachrichtenarchiv in den Listen der News herum zu stöbern.

D.R.G.

Juli 2020

Keine Nachrichten in diesem Zeitraum vorhanden.

IT-Security | Golem

Juli 2020

Datenschutz: Linkedin will die iOS-Zwischenablage nicht mehr auslesen

Es war kein Feature, sondern ein Bug - und den will Linkedin schnell beheben. (LinkedIn, Apple)

Weiterlesen …

DSGVO: Teams und Zoom lassen sich nicht rechtskonform nutzen

Bei einem Kurztest der Berliner Datenschutzbeauftragten fielen die meisten Videokonferenzsysteme durch - es gibt aber auch empfehlenswerte. (Videotelefonie, Google)

Weiterlesen …

Bundeskartellamt: Smart-TVs verstoßen gegen die DSGVO

In einer Sektorenanalyse zu Smart-TVs kritisiert das Bundeskartellamt die unzureichende IT-Sicherheit und Datenschutzverstöße. (Smart-TV, Datenschutz)

Weiterlesen …

IT-Konsolidierung: Bund zahlt IT-Beratern Tagessätze von mehr als 2.200 Euro

Mehr als 800 Millionen Euro sollen Berater für die IT-Konsolidierung des Bundes bekommen. Ein "Goldesel" für die Firmen, findet die Opposition. Ein Bericht von Friedhelm Greis (Bundesregierung, Security)

Weiterlesen …

Apps: Facebook gibt Daten wider eigene Datenschutzregeln weiter

Rund 5.000 App-Entwickler haben Daten von Facebook erhalten, die sie eigentlich nicht bekommen sollten. (Facebook, Soziales Netz)

Weiterlesen …

Datenschutz: Duckduckgo-Browser leakt besuchte Domains

Ein Service zum Finden von Favicons sorgt dafür, dass der Browser von Duckduckgo ein Datenschutzproblem hat. (Datenschutz, Browser)

Weiterlesen …

Windows 10: Microsoft entdeckt kritische Lücken in H.265-Bibliothek

Betroffen ist die HEVC-Erweiterung für Windows 10, die über den Microsoft Store bezogen wird. Es gibt auch einen Fix von Microsoft. (HEVC, H.265)

Weiterlesen …

500 Euro Schadenersatz: Schrems enttäuscht von Urteil gegen Facebook

Nach sechs Jahren Prozess hat der Netzaktivist Max Schrems ein erstes Urteil gegen Facebook erwirkt. Doch damit ist er alles andere als zufrieden. (Max Schrems, Soziales Netz)

Weiterlesen …

Raumfahrt: Vega-Raketenstart während Corona-Ausbruchs verschoben

Arianespace spricht von schlechtem Wetter, aber ein Zusammenhang mit den enormen Covid-19-Infektionszahlen in Französisch Guayana liegt nahe. Von Frank Wunderlich-Pfeiffer (Coronavirus, Virus)

Weiterlesen …

Security: Android bekommt automatische Speicherinitialisierung

Das soll typische Lücken in C verhindern. Außerdem erhält Android 11 einen neuen Allocator und einen Address Sanitizer für den Kernel. (Android 11, Google)

Weiterlesen …

IT-Security | Heise

Juli 2020

Sicherheitsupdates: Samba-Software für DoS-Attacken anfällig

In bestimmten Situationen könnten Angreifer Computer mit Samba-Software lahmlegen.

Weiterlesen …

Patch schließt Schlupfloch in ZoneAlarm-Firewall von Check Point

Es gibt ein wichtiges Sicherheitsupdate für die Firewall ZoneAlarm.

Weiterlesen …

Erpressungstrojaner: Try2Cry will PCs wurmartig infizieren

Dem Verschlüsselungstrojaner Try2Cry sollen so viele Windows-Computer wie möglich zum Opfer fallen. Dabei spielen USB-Sticks eine zentrale Rolle.

Weiterlesen …

Sicherheitsupdates F5 BIG-IP: Schadcode-Lücke im Konfigurationstool

BIG-IP Appliances von F5 sind über mehrere Sicherheitslücken attackierbar. Darunter findet sich eine kritische Schwachstelle mit Höchstwertung.

Weiterlesen …

Tails 4.8: Neue Version des Live-Systems bringt viele Security-Fixes mit

Die Entwickler der Debian-basierten, anonymisierenden Linux-Distribution raten angesichts zahlreicher geschlossener Sicherheitslücken zum zügigen Update.

Weiterlesen …

Sicherheitsupdates: Root-Lücke in IBM-Datenbank DB2

Über eine Lücke könnte Schadcode auf Systeme mit IBM DB2 gelangen. Außerdem könnten Angreifer Datenbank-Server lahmlegen.

Weiterlesen …

"Encrochat" geknackt: Schwerer Schlag gegen organisierte Kriminalität

Wochenlang konnten Ermittler in einem verschlüsselten Chatsystem mitlesen, über das illegale Geschäfte gemacht wurden. Dann schlugen sie zu.

Weiterlesen …

Schlecht gesicherte MongoDB-Datenbanken erneut im Visier von Ransomware

Nach Erkenntnissen eines Sicherheitsforschers ist der Inhalt von knapp 23.000 öffentlich zugänglichen MongoDB-Installationen von Erpressern "gestohlen" worden.

Weiterlesen …

Service-Mesh: Istio hat vier neu entdeckte Sicherheitslücken gestopft

Mit zwei Sicherheitsupdates bessert das Service-Mesh vier Schwachstellen im Envoy-Proxy aus. Das Istio-Team empfiehlt Nutzern ein Upgrade auf die neue Version.

Weiterlesen …

Aktualisierte Advisories zu Remote-Lücken: Windows Server doch nicht betroffen

Microsoft hat Hinweise zu Lücken in der Windows Codecs Library vom vergangenen Dienstag überarbeitet und die potenziell betroffenen Systeme stark eingegrenzt.

Weiterlesen …

Emotet: Arbeit am Berliner Kammergericht nach Monaten weiter eingeschränkt

Ein Dreivierteljahr nach dem Trojaner-Angriff auf die Berliner Justizinstitution kann ein Großteil der Richter neue Laptops nur als Schreibmaschinen verwenden.

Weiterlesen …

Microsoft verteilt wichtige Updates für Remote-Lücken in Windows 10 und Server

Außerplanmäßige, über den Microsoft Store verteilte Updates beseitigen zwei aus der Ferne ausnutzbare Sicherheitslücken in der Windows Codecs Library.

Weiterlesen …

Neue Mac-Ransomware kursiert in illegalen Kopien

Der "EvilQuest"-Schädling kann Festplatte oder SSD verschlüsseln, soll aber so schlecht programmiert sein, dass die Lösegeldforderung nicht übermittelt wird.

Weiterlesen …

IT-Security | Microsoft®

Juli 2020

Keine Nachrichten in diesem Zeitraum vorhanden.

IT-Security | "The Hacker News"

Juli 2020

Critical RCE Flaw (CVSS 10) Affects F5 BIG-IP Application Security Servers

Cybersecurity researchers today issued a security advisory warning enterprises and governments across the globe to immediately patch a highly-critical remote code execution vulnerability affecting F5's BIG-IP networking devices running application security servers. The vulnerability, assigned CVE-2020-5902 and rated as critical with a CVSS score of 10 out of 10, could let remote attackers

Weiterlesen …

Police Arrested Hundreds of Criminals After Hacking Into Encrypted Chat Network

In a joint operation, European and British law enforcement agencies recently arrested hundreds of alleged drug dealers and other criminals after infiltrating into a global network of an encrypted chatting app that was used to plot drug deals, money laundering, extortions, and even murders. Dubbed EncroChat, the top-secret encrypted communication app comes pre-installed on a customized

Weiterlesen …

Critical Apache Guacamole Flaws Put Remote Desktops at Risk of Hacking

A new research has uncovered multiple critical reverse RDP vulnerabilities in Apache Guacamole, a popular remote desktop application used by system administrators to access and manage Windows and Linux machines remotely. The reported flaws could potentially let bad actors achieve full control over the Guacamole server, intercept, and control all other connected sessions. According to a

Weiterlesen …

Microsoft Releases Urgent Windows Update to Patch Two Critical Flaws

Microsoft yesterday quietly released out-of-band software updates to patch two high-risk security vulnerabilities affecting hundreds of millions of Windows 10 and Server editions' users. To be noted, Microsoft rushed to deliver patches almost two weeks before the upcoming monthly 'Patch Tuesday Updates' scheduled for 14th July. That's likely because both flaws reside in the Windows Codecs

Weiterlesen …

Use This Definitive RFP Template to Effectively Evaluate XDR solutions

A new class of security tools is emerging that promises to significantly improve the effectiveness and efficiency of threat detection and response. Emerging Extended Detection and Response (XDR) solutions aim to aggregate and correlate telemetry from multiple detection controls and then synthesize response actions. XDR has been referred to as the next step in the evolution of Endpoint

Weiterlesen …

A New Ransomware Targeting Apple macOS Users Through Pirated Apps

Cybersecurity researchers this week discovered a new type of ransomware targeting macOS users that spreads via pirated apps. According to several independent reports from K7 Lab malware researcher Dinesh Devadoss, Patrick Wardle, and Malwarebytes, the ransomware variant — dubbed "EvilQuest" — is packaged along with legitimate apps, which upon installation, disguises itself as Apple's

Weiterlesen …

IT-Security | Ubuntu

Juli 2020

USN-4414-1: Linux kernel vulnerabilities

linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gcp-4.15, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS

Summary

Several security issues were fixed in the Linux kernel.

Software Description

  • linux - Linux kernel
  • linux-aws - Linux kernel for Amazon Web Services (AWS) systems
  • linux-gcp-4.15 - Linux kernel for Google Cloud Platform (GCP) systems
  • linux-gke-4.15 - Linux kernel for Google Container Engine (GKE) systems
  • linux-kvm - Linux kernel for cloud environments
  • linux-oem - Linux kernel for OEM systems
  • linux-oracle - Linux kernel for Oracle Cloud systems
  • linux-raspi2 - Linux kernel for Raspberry Pi (V7) systems
  • linux-snapdragon - Linux kernel for Qualcomm Snapdragon processors
  • linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE) systems
  • linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
  • linux-hwe - Linux hardware enablement (HWE) kernel

Details

It was discovered that the network block device (nbd) implementation in the Linux kernel did not properly check for error conditions in some situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-16089)

It was discovered that the btrfs file system implementation in the Linux kernel did not properly validate file system metadata in some situations. An attacker could use this to construct a malicious btrfs image that, when mounted, could cause a denial of service (system crash). (CVE-2019-19036, CVE-2019-19318, CVE-2019-19813, CVE-2019-19816)

It was discovered that the btrfs implementation in the Linux kernel did not properly detect that a block was marked dirty in some situations. An attacker could use this to specially craft a file system image that, when unmounted, could cause a denial of service (system crash). (CVE-2019-19377)

It was discovered that the kernel->user space relay implementation in the Linux kernel did not properly check return values in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-19462)

Matthew Sheets discovered that the SELinux network label handling implementation in the Linux kernel could be coerced into de-referencing a NULL pointer. A remote attacker could use this to cause a denial of service (system crash). (CVE-2020-10711)

It was discovered that the SCSI generic (sg) driver in the Linux kernel did not properly handle certain error conditions correctly. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2020-12770)

It was discovered that the USB Gadget device driver in the Linux kernel did not validate arguments passed from configfs in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2020-13143)

It was discovered that the efi subsystem in the Linux kernel did not handle memory allocation failures during early boot in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-12380)

It was discovered that the btrfs file system in the Linux kernel in some error conditions could report register information to the dmesg buffer. A local attacker could possibly use this to expose sensitive information. (CVE-2019-19039)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04 LTS
linux-image-4.15.0-1048-oracle - 4.15.0-1048.52

Weiterlesen …

USN-4413-1: Linux kernel vulnerabilities

linux-gke-5.0, linux-oem-osp1 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.04 LTS

Summary

Several security issues were fixed in the Linux kernel.

Software Description

  • linux-gke-5.0 - Linux kernel for Google Container Engine (GKE) systems
  • linux-oem-osp1 - Linux kernel for OEM systems

Details

Matthew Sheets discovered that the SELinux network label handling implementation in the Linux kernel could be coerced into de-referencing a NULL pointer. A remote attacker could use this to cause a denial of service (system crash). (CVE-2020-10711)

It was discovered that the SCSI generic (sg) driver in the Linux kernel did not properly handle certain error conditions correctly. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2020-12770)

It was discovered that the USB Gadget device driver in the Linux kernel did not validate arguments passed from configfs in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2020-13143)

Dmitry Vyukov discovered that the SELinux netlink security hook in the Linux kernel did not validate messages in some situations. A privileged attacker could use this to bypass SELinux netlink restrictions. (CVE-2020-10751)

It was discovered that the KVM implementation in the Linux kernel did not properly deallocate memory on initialization for some processors. A local attacker could possibly use this to cause a denial of service. (CVE-2020-12768)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04 LTS
linux-image-5.0.0-1043-gke - 5.0.0-1043.44
linux-image-5.0.0-1063-oem-osp1 - 5.0.0-1063.68
linux-image-gke-5.0 - 5.0.0.1043.28
linux-image-oem-osp1 - 5.0.0.1063.61

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

References

Weiterlesen …

USN-4412-1: Linux kernel vulnerabilities

linux, linux-azure, linux-gcp, linux-gcp-5.3, linux-hwe, linux-kvm, linux-oracle, linux-oracle-5.3 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.10
  • Ubuntu 18.04 LTS

Summary

Several security issues were fixed in the Linux kernel.

Software Description

  • linux - Linux kernel
  • linux-azure - Linux kernel for Microsoft Azure Cloud systems
  • linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
  • linux-kvm - Linux kernel for cloud environments
  • linux-oracle - Linux kernel for Oracle Cloud systems
  • linux-gcp-5.3 - Linux kernel for Google Cloud Platform (GCP) systems
  • linux-hwe - Linux hardware enablement (HWE) kernel
  • linux-oracle-5.3 - Linux kernel for Oracle Cloud systems

Details

Matthew Sheets discovered that the SELinux network label handling implementation in the Linux kernel could be coerced into de-referencing a NULL pointer. A remote attacker could use this to cause a denial of service (system crash). (CVE-2020-10711)

It was discovered that the SCSI generic (sg) driver in the Linux kernel did not properly handle certain error conditions correctly. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2020-12770)

It was discovered that the USB Gadget device driver in the Linux kernel did not validate arguments passed from configfs in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2020-13143)

Dmitry Vyukov discovered that the SELinux netlink security hook in the Linux kernel did not validate messages in some situations. A privileged attacker could use this to bypass SELinux netlink restrictions. (CVE-2020-10751)

It was discovered that the KVM implementation in the Linux kernel did not properly deallocate memory on initialization for some processors. A local attacker could possibly use this to cause a denial of service. (CVE-2020-12768)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.10
linux-image-5.3.0-1024-kvm - 5.3.0-1024.26
linux-image-5.3.0-1028-oracle - 5.3.0-1028.30
linux-image-5.3.0-1030-gcp - 5.3.0-1030.32
linux-image-5.3.0-1031-azure - 5.3.0-1031.32
linux-image-5.3.0-62-generic - 5.3.0-62.56
linux-image-5.3.0-62-generic-lpae - 5.3.0-62.56
linux-image-5.3.0-62-lowlatency - 5.3.0-62.56
linux-image-5.3.0-62-snapdragon - 5.3.0-62.56
linux-image-azure - 5.3.0.1031.49
linux-image-gcp - 5.3.0.1030.40
linux-image-generic - 5.3.0.62.52
linux-image-generic-lpae - 5.3.0.62.52
linux-image-gke - 5.3.0.1030.40
linux-image-kvm - 5.3.0.1024.22
linux-image-lowlatency - 5

Weiterlesen …

USN-4411-1: Linux kernel vulnerabilities

linux, linux-aws, linux-gcp, linux-kvm, linux-oracle, linux-riscv, vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 20.04 LTS

Summary

Several security issues were fixed in the Linux kernel.

Software Description

  • linux - Linux kernel
  • linux-aws - Linux kernel for Amazon Web Services (AWS) systems
  • linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
  • linux-kvm - Linux kernel for cloud environments
  • linux-oracle - Linux kernel for Oracle Cloud systems
  • linux-riscv - Linux kernel for RISC-V systems

Details

It was discovered that the elf handling code in the Linux kernel did not initialize memory before using it in certain situations. A local attacker could use this to possibly expose sensitive information (kernel memory). (CVE-2020-10732)

Matthew Sheets discovered that the SELinux network label handling implementation in the Linux kernel could be coerced into de-referencing a NULL pointer. A remote attacker could use this to cause a denial of service (system crash). (CVE-2020-10711)

It was discovered that the SCSI generic (sg) driver in the Linux kernel did not properly handle certain error conditions correctly. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2020-12770)

It was discovered that the USB Gadget device driver in the Linux kernel did not validate arguments passed from configfs in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2020-13143)

It was discovered that the KVM implementation in the Linux kernel did not properly deallocate memory on initialization for some processors. A local attacker could possibly use this to cause a denial of service. (CVE-2020-12768)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 20.04 LTS
linux-image-5.4.0-1018-aws - 5.4.0-1018.18
linux-image-5.4.0-1019-gcp - 5.4.0-1019.19
linux-image-5.4.0-1019-oracle - 5.4.0-1019.19
linux-image-5.4.0-28-generic - 5.4.0-28.32
linux-image-5.4.0-40-generic - 5.4.0-40.44
linux-image-5.4.0-40-generic-lpae - 5.4.0-40.44
linux-image-5.4.0-40-lowlatency - 5.4.0-40.44
linux-image-aws - 5.4.0.1018.19
linux-image-gcp - 5.4.0.1019.17
linux-image-generic - 5.4.0.28.35
linux-image-generic-lpae - 5.4.0.40.43
linux-image-gke - 5.4.0.1019.17
linux-image-kvm - 5.4.0.1018.17
linux-image-lowlatency - 5.4.0.40.43
linux-image-oem - 5.4.0.40.43
linux-image-oem-osp1 - 5.4.0.40.43
linux-image-oracle - 5.4.0.1019.17
linux-image-virtual - 5.4.0.28.35

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After

Weiterlesen …

USN-4410-1: Net-SNMP vulnerability

net-snmp vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 20.04 LTS

Summary

Net-SNMP could be made to crash if it received specially crafted input.

Software Description

  • net-snmp - SNMP (Simple Network Management Protocol) server and applications

Details

A double-free bug was discovered in snmpd server. An authenticated user could potentially cause a DoS by sending a crafted request to the server. (CVE-2019-20892)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 20.04 LTS
libsnmp-base - 5.8+dfsg-2ubuntu2.1
libsnmp-perl - 5.8+dfsg-2ubuntu2.1
libsnmp35 - 5.8+dfsg-2ubuntu2.1
snmpd - 5.8+dfsg-2ubuntu2.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart snmpd to make all the necessary changes.

References

Weiterlesen …

USN-4408-1: Firefox vulnerabilities

firefox vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 20.04 LTS
  • Ubuntu 19.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS

Summary

Firefox could be made to crash or run programs as your login if it opened a malicious website.

Software Description

  • firefox - Mozilla Open Source web browser

Details

Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass permission prompts, or execute arbitrary code. (CVE-2020-12415, CVE-2020-12416, CVE-2020-12417, CVE-2020-12418, CVE-2020-12419, CVE-2020-12420, CVE-2020-12422, CVE-2020-12424, CVE-2020-12425, CVE-2020-12426)

It was discovered that when performing add-on updates, certificate chains not terminating with built-in roots were silently rejected. This could result in add-ons becoming outdated. (CVE-2020-12421)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 20.04 LTS
firefox - 78.0.1+build1-0ubuntu0.20.04.1
Ubuntu 19.10
firefox - 78.0.1+build1-0ubuntu0.19.10.1
Ubuntu 18.04 LTS
firefox - 78.0.1+build1-0ubuntu0.18.04.1
Ubuntu 16.04 LTS
firefox - 78.0.1+build1-0ubuntu0.16.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make all the necessary changes.

References

Weiterlesen …

USN-4409-1: Samba vulnerabilities

samba vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 20.04 LTS
  • Ubuntu 19.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 ESM
  • Ubuntu 12.04 ESM

Summary

Several security issues were fixed in Samba.

Software Description

  • samba - SMB/CIFS file, print, and login server for Unix

Details

Andrew Bartlett discovered that Samba incorrectly handled certain LDAP queries. A remote attacker could use this issue to cause Samba to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 19.10 and Ubuntu 20.04 LTS. (CVE-2020-10730)

Douglas Bagnall discovered that Samba incorrectly handled certain queries. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2020-10745)

Andrei Popa discovered that Samba incorrectly handled certain LDAP queries A remote attacker could use this issue to cause Samba to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 19.10 and Ubuntu 20.04 LTS. (CVE-2020-10760)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 20.04 LTS
samba - 2:4.11.6+dfsg-0ubuntu1.3
Ubuntu 19.10
samba - 2:4.10.7+dfsg-0ubuntu2.6
Ubuntu 18.04 LTS
samba - 2:4.7.6+dfsg~ubuntu-0ubuntu2.17
Ubuntu 16.04 LTS
samba - 2:4.3.11+dfsg-0ubuntu0.16.04.28
Ubuntu 14.04 ESM
samba - 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm7
Ubuntu 12.04 ESM
samba - 2:3.6.25-0ubuntu0.12.04.20

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

Weiterlesen …

USN-4407-1: LibVNCServer vulnerabilities

libvncserver vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 20.04 LTS
  • Ubuntu 19.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS

Summary

Several security issues were fixed in LibVNCServer.

Software Description

  • libvncserver - vnc server library

Details

It was discovered that LibVNCServer incorrectly handled decompressing data. An attacker could possibly use this issue to cause LibVNCServer to crash, resulting in a denial of service. (CVE-2019-15680)

It was discovered that an information disclosure vulnerability existed in LibVNCServer when sending a ServerCutText message. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 19.10, Ubuntu 18.04 LTS, and Ubuntu 16.04 LTS. (CVE-2019-15681)

It was discovered that LibVNCServer incorrectly handled cursor shape updates. If a user were tricked in to connecting to a malicious server, an attacker could possibly use this issue to cause LibVNCServer to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 19.10, Ubuntu 18.04 LTS, and Ubuntu 16.04 LTS. (CVE-2019-15690, CVE-2019-20788)

It was discovered that LibVNCServer incorrectly handled decoding WebSocket frames. An attacker could possibly use this issue to cause LibVNCServer to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 19.10, Ubuntu 18.04 LTS, and Ubuntu 16.04 LTS. (CVE-2017-18922)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 20.04 LTS
libvncclient1 - 0.9.12+dfsg-9ubuntu0.1
libvncserver1 - 0.9.12+dfsg-9ubuntu0.1
Ubuntu 19.10
libvncclient1 - 0.9.11+dfsg-1.3ubuntu0.1
libvncserver1 - 0.9.11+dfsg-1.3ubuntu0.1
Ubuntu 18.04 LTS
libvncclient1 - 0.9.11+dfsg-1ubuntu1.2
libvncserver1 - 0.9.11+dfsg-1ubuntu1.2
Ubuntu 16.04 LTS
libvncclient1 - 0.9.10+dfsg-3ubuntu0.16.04.4
libvncserver1 - 0.9.10+dfsg-3ubuntu0.16.04.4

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart LibVNCServer to make all the necessary changes.

References

Weiterlesen …

Linux® | Kubuntu

Juli 2020

Keine Nachrichten in diesem Zeitraum vorhanden.

Linux® | Ubuntu

Juli 2020

Feeling at home in a LXD container

In this post, we will see how we can containerize our home in LXD simply managing our personal configuration files – a.k.a. dotfiles. Yeah dotfiles, named after their common ~/.my_config form, you know, all of those small configuration files lying across our $HOME. In other words, how one can change the house while keeping the […]

Weiterlesen …

A snap confined shell based on Mir: Mircade

Mircade: An example snap confined user shell There are various scenarios and reasons for packaging a Snap confined shell and a selection of applications together in a confined environment. You might have applications that work well together for a particular task; or, you may want to offer a number of alternative applications and have them […]

Weiterlesen …

A blast from the past – Shutter

The wheel of software turns, and apps come and go. But the end of development does not always mean the end of usefulness. Sometimes, programs stubbornly remain around, offering a complete experience that can withstand the test of time. Several weeks ago, we talked about how you can preserve old applications with snaps. Today, we […]

Weiterlesen …

Data science workflows on Kubernetes with Kubeflow pipelines: Part 2

This blog series is part of the joint collaboration between Canonical and Manceps. Visit our AI consulting and delivery services page to know more. Introduction Kubeflow Pipelines are a great way to build portable, scalable machine learning workflows. It is a part of the Kubeflow project that aims to reduce the complexity and time involved […]

Weiterlesen …

Building Kubeflow pipelines: Data science workflows on Kubernetes – Part 2

This blog series is part of the joint collaboration between Canonical and Manceps. Visit our AI consulting and delivery services page to know more. Introduction Kubeflow Pipelines are a great way to build portable, scalable machine learning workflows. It is a part of the Kubeflow project that aims to reduce the complexity and time involved […]

Weiterlesen …

Encryption at rest with Ceph

Do you have a big data center? Do you have terabytes of confidential data stored in that data center? Are you worried that your data might be exposed to malicious attacks? One of the most prominent security features of storage solutions is encryption at rest. This blog will explain this in more detail and how […]

Weiterlesen …

Microsoft® | TechNet

Juli 2020

Keine Nachrichten in diesem Zeitraum vorhanden.

Automatisch generiert