[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1305578984.3729.81.camel@mdlinux>
Date: Mon, 16 May 2011 16:49:44 -0400
From: Marc Deslauriers <marc.deslauriers@...onical.com>
To: ubuntu-security-announce@...ts.ubuntu.com
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: [USN-1132-1] apturl vulnerability
==========================================================================
Ubuntu Security Notice USN-1132-1
May 16, 2011
apturl vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
Summary:
apturl could be made to cause your desktop to crash if it opened a very
long URL.
Software Description:
- apturl: installs packages using the apt protocol
Details:
It was discovered that apturl incorrectly handled certain long URLs. If
a user were tricked into opening a very long URL, an attacker could cause
their desktop session to crash, leading to a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.04:
apturl-common 0.4.2ubuntu5.1
Ubuntu 10.10:
apturl-common 0.4.1ubuntu7.1
Ubuntu 10.04 LTS:
apturl-common 0.4.1ubuntu4.1
In general, a standard system update will make all the necessary changes.
References:
https://launchpad.net/bugs/783594
Package Information:
https://launchpad.net/ubuntu/+source/apturl/0.4.2ubuntu5.1
https://launchpad.net/ubuntu/+source/apturl/0.4.1ubuntu7.1
https://launchpad.net/ubuntu/+source/apturl/0.4.1ubuntu4.1
Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists