Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-6308-1

Ubuntu Security Notice 6308-1 - It was discovered that Libqb incorrectly handled certain messages. An attacker could possibly use this issue to cause a crash or execute arbitrary code.

Packet Storm
#vulnerability#ubuntu

==========================================================================
Ubuntu Security Notice USN-6308-1
August 28, 2023

libqb vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 23.04
  • Ubuntu 22.04 LTS

Summary:

Libqb could be made to crash or execute arbitrary code if it
received a specially crafted message.

Software Description:

  • libqb: generate man pages from Doxygen XML files

Details:

It was discovered that Libqb incorrectly handled certain messages.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.04:
doxygen2man 2.0.6-2ubuntu0.1
libqb-tools 2.0.6-2ubuntu0.1
libqb100 2.0.6-2ubuntu0.1

Ubuntu 22.04 LTS:
doxygen2man 2.0.4-1ubuntu0.2
libqb-tools 2.0.4-1ubuntu0.2
libqb100 2.0.4-1ubuntu0.2

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6308-1
CVE-2023-39976

Package Information:
https://launchpad.net/ubuntu/+source/libqb/2.0.6-2ubuntu0.1
https://launchpad.net/ubuntu/+source/libqb/2.0.4-1ubuntu0.2

Related news

Red Hat Security Advisory 2023-5597-01

Red Hat Security Advisory 2023-5597-01 - The libqb packages provide a library with the primary purpose of providing high performance client/server reusable features, such as high performance logging, tracing, inter-process communication, and polling. Issues addressed include a buffer overflow vulnerability.

CVE-2023-39976: log: fix potential overflow with long log messages by chrissie-c · Pull Request #490 · ClusterLabs/libqb

log_blackbox.c in libqb before 2.0.8 allows a buffer overflow via long log messages because the header size is not considered.

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution