Ubuntu Security Updates  - Ubuntu Security Updates - Ubuntu Security Updates for Vulnerabilities that Affects Multiple Versions

for the that affect releases of Ubuntu and its derivatives. The are fixed with the latest packages if you have enabled automatic update in your Ubuntu servers the updates will be applied automatically.

ClamAV regression

Latest package update fixes vulnerabilities with ClamAVthst fails in handling certain HWP and PDF files in previous . This could be exploited by a remote attacker resulting in a DOS attack.

The vulnerability can be tracked as CVE-2018-0360, CVE-2018-0361, the issue found in Ubuntu 12.04 ESM, Ubuntu 18.04 LTS Ubuntu 16.04 LTS and Ubuntu 14.04 LTS and it has been fixed with clamav – 0.100.1+dfsg-1ubuntu0.12.04.2, clamav – 0.100.1+dfsg-1ubuntu0.18.04.2, clamav – 0.100.1+dfsg-1ubuntu0.16.04.2 and clamav – 0.100.1+dfsg-1ubuntu0.14.04.2.

Data Server vulnerability

Evolution Data Server leads to the sensitive exposure of data over the network, it may result in the user’s password being unexpectedly sent in clear , even though the user had requested to use SSL.

Data Server vulnerability tracked as CVE-2016-10727, it Ubuntu 16.04 LTS and Ubuntu 14.04 LTS.

The Vulnerability can be fixed by updating to following packages, with Ubuntu 16.04 LTS

evolution-data-server – 3.18.5-1ubuntu1.1
evolution-data-server-common – 3.18.5-1ubuntu1.1
libcamel-1.2-54 – 3.18.5-1ubuntu1.1
libebackend-1.2-10 – 3.18.5-1ubuntu1.1
libedataserver-1.2-21 – 3.18.5-1ubuntu1.1

For Ubuntu 14.04 LTS the fixed package versions

evolution-data-server – 3.10.4-0ubuntu1.6
evolution-data-server-common – 3.10.4-0ubuntu1.6
libcamel-1.2-45 – 3.10.4-0ubuntu1.6
libebackend-1.2-7 – 3.10.4-0ubuntu1.6
libedataserver-1.2-18 – 3.10.4-0ubuntu1.6

Also Read

Google Chrome to Show Not Secure For HTTP Sites and Fix for 42 Security Issues

Apache Software Foundation Releases Important Security Patches for Multiple Apache Tomcat Versions

Cisco Released Critical Security Updates for Vulnerabilities that Affected Cisco Products



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here