Canonical Fixes Libproxy Exploit for Three Ubuntu OSes

Users have been urged to upgrade the system as soon as possible

  Ubuntu 12.04 desktop
On November 5, Canonical published details about MySQL vulnerabilities for its Ubuntu 12.04 LTS, Ubuntu 11.10, and Ubuntu 10.04 LTS operating systems.

On November 5, Canonical published details about MySQL vulnerabilities for its Ubuntu 12.04 LTS, Ubuntu 11.10, and Ubuntu 10.04 LTS operating systems.

According to Canonical, libproxy could be made to crash or run programs, if it received specially crafted network traffic.

It was discovered that libproxy incorrectly handled certain PAC files. A remote attacker could have used this issue to cause libproxy to crash or to possibly execute arbitrary code, exposing the target.

For a more detailed description of the security problems, you can visit Canonical's security notification.

Users can simply fix the security flaws by upgrading the operating systems to the latest libproxy1 package, specific to each distribution.

A normal system update, executed with the Update Manager, will implement all the necessary changes. A complete system restart is not necessary.

Comments