----------------------------------------------------------------------------------
@MSGID: <20230420183015.psmwqubuiryqfvhw@morty>
fd42e344
@REPLYADDR Paulo Flabiano Smorigo
<pfsmorigo@canonical.com>
@REPLYTO 2:5075/128 Paulo Flabiano Smorigo
@CHRS: CP866 2
@RFC: 1 0
@RFC-Message-ID:
<20230420183015.psmwqubuiryqfvhw@morty>
@RFC-MIME-Version: 1.0
@RFC-Content-Type: multipart/mixed;
boundary="===============3473259494626550037=="
@RFC-Content-Transfer-Encoding: 8bit
@TZUTC: -0300
@TID: FIDOGATE-5.12-ge4e8b94
==========================================================================
Ubuntu Security Notice USN-6035-1
April 20, 2023
kauth vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 ESM
- Ubuntu 16.04 ESM
Summary:
KAuth could be made to crash or run programs if it received specially crafted
input.
Software Description:
- kauth: Abstraction to system policy and authentication features
Details:
It was discovered that KAuth incorrectly handled some configuration parameters
with specially crafted arbitrary types. An attacker could possibly use this
issue to cause a denial of service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 ESM:
libkf5auth-data 5.44.0-0ubuntu1+esm1
libkf5auth5 5.44.0-0ubuntu1+esm1
Ubuntu 16.04 ESM:
libkf5auth-data 5.18.0-0ubuntu2+esm1
libkf5auth5 5.18.0-0ubuntu2+esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6035-1
CVE-2019-7443
--- mail (GNU Mailutils 3.4)
* Origin: Usenet Network (2:5075/128)
SEEN-BY: 221/6 301/1 467/888 5001/100 5005/49
5015/255 5019/40 5020/715 848
SEEN-BY: 5020/1042 4441 12000 5030/49 1081 5075/35
128
@PATH: 5075/128 5020/1042 4441