Is this a security concern for ubuntu users?How to clean data when wiping/reinstalling a compromised...
On studying Computer Science vs. Software Engineering to become a proficient coder
Would an 8% reduction in drag outweigh the weight addition from this custom CFD-tested winglet?
Ito`s Lemma problem
Labeling matrices/rectangles and drawing Sigma inside rectangle
Conditional probability - sum of dice is even given that at least one is a five
LWC1513: @salesforce/resourceUrl modules only support default imports
How do I interpret improvement in AUC ROC from the business perspective?
Why is a set not a partition of itself?
How to cope with regret and shame about not fully utilizing opportunities during PhD?
Jumping frame contents with beamer and pgfplots
Do I need to say 'o`clock'?
Why was Endgame Thanos so different than Infinity War Thanos?
Why are solar panels kept tilted?
using `is` operator with value type tuples gives error
If current results hold, Man City would win PL title
Find hamming distance between two Strings of equal length in Java
When a land becomes a creature, is it untapped?
declared variable inside void setup is forgotten in void loop
Tikzpicture in figure problem
Solubility in different pressure conditions
Is the expression "To think you would stoop so low" often misused?
Loading Latex packages into Mathematica
What to do if SUS scores contradict qualitative feedback?
Is there anything special about -1 (0xFFFFFFFF) regarding ADC?
Is this a security concern for ubuntu users?
How to clean data when wiping/reinstalling a compromised server?Ubuntu 15.04 OpenSSL HeartbleedLog in to ssh slow for one user, but not anotherIs there an easy to use, simple FTP server for Ubuntu serverCommented lines in named.conf are still interpretedWordpress Permissions Related ProblemsCannot get OpenVPN installed - Ubuntu Server 16.04SSH failed to start - Missing privilege separation directory: /var/run/sshdUbuntu Server 18.04.2 randomly stops responding to PINGForward packets received to internet
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ margin-bottom:0;
}
I am new in ubuntu server. I found this post about a vulnerability in Debian's APT. Do you think this issue has been resolved?
https://www.guardicore.com/2019/01/a-vulnerability-in-debians-apt-allows-for-easy-lateral-movement-in-data-centers
https://justi.cz/security/2019/01/22/apt-rce.html
TIA
server
add a comment |
I am new in ubuntu server. I found this post about a vulnerability in Debian's APT. Do you think this issue has been resolved?
https://www.guardicore.com/2019/01/a-vulnerability-in-debians-apt-allows-for-easy-lateral-movement-in-data-centers
https://justi.cz/security/2019/01/22/apt-rce.html
TIA
server
add a comment |
I am new in ubuntu server. I found this post about a vulnerability in Debian's APT. Do you think this issue has been resolved?
https://www.guardicore.com/2019/01/a-vulnerability-in-debians-apt-allows-for-easy-lateral-movement-in-data-centers
https://justi.cz/security/2019/01/22/apt-rce.html
TIA
server
I am new in ubuntu server. I found this post about a vulnerability in Debian's APT. Do you think this issue has been resolved?
https://www.guardicore.com/2019/01/a-vulnerability-in-debians-apt-allows-for-easy-lateral-movement-in-data-centers
https://justi.cz/security/2019/01/22/apt-rce.html
TIA
server
server
asked 2 hours ago
AbdulAbdul
175
175
add a comment |
add a comment |
2 Answers
2
active
oldest
votes
I opened a link you provided to grab the CVE number, then looked using a search engine for details
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3462.html
> Ubuntu 12.04 ESM (Precise Pangolin): released
> (0.8.16~exp12ubuntu10.28)
> Ubuntu 14.04 LTS (Trusty Tahr): released
> (1.0.1ubuntu2.19) Ubuntu 16.04 LTS (Xenial Xerus): released
> (1.2.29ubuntu0.1) Ubuntu 18.04 LTS (Bionic Beaver): released
> (1.6.6ubuntu0.1) Ubuntu 18.10 (Cosmic Cuttlefish): released
> (1.7.0ubuntu0.1) Ubuntu 19.04 (Disco Dingo): released (1.8.0~alpha3.1)
As long as you have the packages listed as containing the fix you'll be fine. For more details, check Ubuntu security notes.
Thanks the info. Hope this help me to use Ubuntu again.
– Abdul
57 mins ago
add a comment |
Yes, it's definitely fixed.
The best way to track security issues is using a CVE number. That's what CVE numbers are for. In this case, you seem to be worried about CVE-2019-3462
CVEs may have more than one related bug report. You can find all the bugs for this particular CVE at https://bugs.launchpad.net/bugs/cve/2019-3462. The bug tracker will tell you which bugs are fixed in which releases of Ubuntu, and when the fixes were uploaded.
After fixing this particular CVE, the Ubuntu Security Team talked about this issue and the fix in their podcast of 29 January 2019. It's brief, and worth a listen.
Glad to know that. Thanks
– Abdul
56 mins ago
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "89"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1142734%2fis-this-a-security-concern-for-ubuntu-users%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
2 Answers
2
active
oldest
votes
2 Answers
2
active
oldest
votes
active
oldest
votes
active
oldest
votes
I opened a link you provided to grab the CVE number, then looked using a search engine for details
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3462.html
> Ubuntu 12.04 ESM (Precise Pangolin): released
> (0.8.16~exp12ubuntu10.28)
> Ubuntu 14.04 LTS (Trusty Tahr): released
> (1.0.1ubuntu2.19) Ubuntu 16.04 LTS (Xenial Xerus): released
> (1.2.29ubuntu0.1) Ubuntu 18.04 LTS (Bionic Beaver): released
> (1.6.6ubuntu0.1) Ubuntu 18.10 (Cosmic Cuttlefish): released
> (1.7.0ubuntu0.1) Ubuntu 19.04 (Disco Dingo): released (1.8.0~alpha3.1)
As long as you have the packages listed as containing the fix you'll be fine. For more details, check Ubuntu security notes.
Thanks the info. Hope this help me to use Ubuntu again.
– Abdul
57 mins ago
add a comment |
I opened a link you provided to grab the CVE number, then looked using a search engine for details
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3462.html
> Ubuntu 12.04 ESM (Precise Pangolin): released
> (0.8.16~exp12ubuntu10.28)
> Ubuntu 14.04 LTS (Trusty Tahr): released
> (1.0.1ubuntu2.19) Ubuntu 16.04 LTS (Xenial Xerus): released
> (1.2.29ubuntu0.1) Ubuntu 18.04 LTS (Bionic Beaver): released
> (1.6.6ubuntu0.1) Ubuntu 18.10 (Cosmic Cuttlefish): released
> (1.7.0ubuntu0.1) Ubuntu 19.04 (Disco Dingo): released (1.8.0~alpha3.1)
As long as you have the packages listed as containing the fix you'll be fine. For more details, check Ubuntu security notes.
Thanks the info. Hope this help me to use Ubuntu again.
– Abdul
57 mins ago
add a comment |
I opened a link you provided to grab the CVE number, then looked using a search engine for details
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3462.html
> Ubuntu 12.04 ESM (Precise Pangolin): released
> (0.8.16~exp12ubuntu10.28)
> Ubuntu 14.04 LTS (Trusty Tahr): released
> (1.0.1ubuntu2.19) Ubuntu 16.04 LTS (Xenial Xerus): released
> (1.2.29ubuntu0.1) Ubuntu 18.04 LTS (Bionic Beaver): released
> (1.6.6ubuntu0.1) Ubuntu 18.10 (Cosmic Cuttlefish): released
> (1.7.0ubuntu0.1) Ubuntu 19.04 (Disco Dingo): released (1.8.0~alpha3.1)
As long as you have the packages listed as containing the fix you'll be fine. For more details, check Ubuntu security notes.
I opened a link you provided to grab the CVE number, then looked using a search engine for details
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3462.html
> Ubuntu 12.04 ESM (Precise Pangolin): released
> (0.8.16~exp12ubuntu10.28)
> Ubuntu 14.04 LTS (Trusty Tahr): released
> (1.0.1ubuntu2.19) Ubuntu 16.04 LTS (Xenial Xerus): released
> (1.2.29ubuntu0.1) Ubuntu 18.04 LTS (Bionic Beaver): released
> (1.6.6ubuntu0.1) Ubuntu 18.10 (Cosmic Cuttlefish): released
> (1.7.0ubuntu0.1) Ubuntu 19.04 (Disco Dingo): released (1.8.0~alpha3.1)
As long as you have the packages listed as containing the fix you'll be fine. For more details, check Ubuntu security notes.
edited 2 hours ago
answered 2 hours ago
guivercguiverc
5,43921723
5,43921723
Thanks the info. Hope this help me to use Ubuntu again.
– Abdul
57 mins ago
add a comment |
Thanks the info. Hope this help me to use Ubuntu again.
– Abdul
57 mins ago
Thanks the info. Hope this help me to use Ubuntu again.
– Abdul
57 mins ago
Thanks the info. Hope this help me to use Ubuntu again.
– Abdul
57 mins ago
add a comment |
Yes, it's definitely fixed.
The best way to track security issues is using a CVE number. That's what CVE numbers are for. In this case, you seem to be worried about CVE-2019-3462
CVEs may have more than one related bug report. You can find all the bugs for this particular CVE at https://bugs.launchpad.net/bugs/cve/2019-3462. The bug tracker will tell you which bugs are fixed in which releases of Ubuntu, and when the fixes were uploaded.
After fixing this particular CVE, the Ubuntu Security Team talked about this issue and the fix in their podcast of 29 January 2019. It's brief, and worth a listen.
Glad to know that. Thanks
– Abdul
56 mins ago
add a comment |
Yes, it's definitely fixed.
The best way to track security issues is using a CVE number. That's what CVE numbers are for. In this case, you seem to be worried about CVE-2019-3462
CVEs may have more than one related bug report. You can find all the bugs for this particular CVE at https://bugs.launchpad.net/bugs/cve/2019-3462. The bug tracker will tell you which bugs are fixed in which releases of Ubuntu, and when the fixes were uploaded.
After fixing this particular CVE, the Ubuntu Security Team talked about this issue and the fix in their podcast of 29 January 2019. It's brief, and worth a listen.
Glad to know that. Thanks
– Abdul
56 mins ago
add a comment |
Yes, it's definitely fixed.
The best way to track security issues is using a CVE number. That's what CVE numbers are for. In this case, you seem to be worried about CVE-2019-3462
CVEs may have more than one related bug report. You can find all the bugs for this particular CVE at https://bugs.launchpad.net/bugs/cve/2019-3462. The bug tracker will tell you which bugs are fixed in which releases of Ubuntu, and when the fixes were uploaded.
After fixing this particular CVE, the Ubuntu Security Team talked about this issue and the fix in their podcast of 29 January 2019. It's brief, and worth a listen.
Yes, it's definitely fixed.
The best way to track security issues is using a CVE number. That's what CVE numbers are for. In this case, you seem to be worried about CVE-2019-3462
CVEs may have more than one related bug report. You can find all the bugs for this particular CVE at https://bugs.launchpad.net/bugs/cve/2019-3462. The bug tracker will tell you which bugs are fixed in which releases of Ubuntu, and when the fixes were uploaded.
After fixing this particular CVE, the Ubuntu Security Team talked about this issue and the fix in their podcast of 29 January 2019. It's brief, and worth a listen.
answered 1 hour ago
user535733user535733
9,25633045
9,25633045
Glad to know that. Thanks
– Abdul
56 mins ago
add a comment |
Glad to know that. Thanks
– Abdul
56 mins ago
Glad to know that. Thanks
– Abdul
56 mins ago
Glad to know that. Thanks
– Abdul
56 mins ago
add a comment |
Thanks for contributing an answer to Ask Ubuntu!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1142734%2fis-this-a-security-concern-for-ubuntu-users%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown