Write is a Fantastic Handwritten Notes App for Linux

Write is a free app that lets you make handwritten notes on Linux using a touchscreen and stylus (or a smudgy finger), with features tailored for this use.

This post, Write is a Fantastic Handwritten Notes App for Linux, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.

Read More

The Basics of Consuming REST APIs

It seems that every application out there is hungry for an API. Let’s look at Yelp for example. Yelp by itself won’t have the functionality you’d expect. In order to search nearby restaurants or locations, it needs to use an API for a map. It uses the Google API. With that, you can locate nearest places and get directions to the place. APIs allow you to integrate one tool to another tool to give it more functionality. Without the ability to make these types of integrations, you can say goodbye to a majority of all these softwares and apps out there that you use!

Read More

RHSA-2017:2886-1: Important: rh-mysql57-mysql security and bug fix update

Red Hat Enterprise Linux: An update for rh-mysql57-mysql is now available for Red Hat Software
Collections.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2016-5483, CVE-2016-8327, CVE-2017-3238, CVE-2017-3244, CVE-2017-3251, CVE-2017-3256, CVE-2017-3257, CVE-2017-3258, CVE-2017-3273, CVE-2017-3291, CVE-2017-3308, CVE-2017-3309, CVE-2017-3312, CVE-2017-3313, CVE-2017-3317, CVE-2017-3318, CVE-2017-3319, CVE-2017-3320, CVE-2017-3331, CVE-2017-3450, CVE-2017-3453, CVE-2017-3454, CVE-2017-3455, CVE-2017-3456, CVE-2017-3457, CVE-2017-3458, CVE-2017-3459, CVE-2017-3460, CVE-2017-3461, CVE-2017-3462, CVE-2017-3463, CVE-2017-3464, CVE-2017-3465, CVE-2017-3467, CVE-2017-3468, CVE-2017-3529, CVE-2017-3599, CVE-2017-3600, CVE-2017-3633, CVE-2017-3634, CVE-2017-3637, CVE-2017-3638, CVE-2017-3639, CVE-2017-3640, CVE-2017-3641, CVE-2017-3642, CVE-2017-3643, CVE-2017-3644, CVE-2017-3645, CVE-2017-3646, CVE-2017-3647, CVE-2017-3648, CVE-2017-3649, CVE-2017-3650, CVE-2017-3651, CVE-2017-3652, CVE-2017-3653

Read More

USN-3453-1: X.Org X server vulnerabilities

Ubuntu Security Notice USN-3453-1

12th October, 2017

xorg-server, xorg-server-hwe-16.04, xorg-server-lts-xenial vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in the X.Org X server.

Software description

  • xorg-server
    – X.Org X11 server

  • xorg-server-hwe-16.04
    – X.Org X11 server

  • xorg-server-lts-xenial
    – X.Org X11 server

Details

Michal Srb discovered that the X.Org X server incorrectly handled shared
memory segments. An attacker able to connect to an X server, either locally
or remotely, could use this issue to crash the server, or possibly replace
shared memory segments of other X clients in the same session.
(CVE-2017-13721)

Michal Srb discovered that the X.Org X server incorrectly handled XKB
buffers. An attacker able to connect to an X server, either locally or
remotely, could use this issue to crash the server, or possibly execute
arbitrary code. (CVE-2017-13723)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 17.04:
xserver-xorg-core

2:1.19.3-1ubuntu1.2
Ubuntu 16.04 LTS:
xserver-xorg-core

2:1.18.4-0ubuntu0.6
xserver-xorg-core-hwe-16.04

2:1.19.3-1ubuntu1~16.04.3
Ubuntu 14.04 LTS:
xserver-xorg-core

2:1.15.1-0ubuntu2.10
xserver-xorg-core-lts-xenial

2:1.18.3-1ubuntu2.3~trusty3

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2017-13721,

CVE-2017-13723

Read More

USN-3454-1: libffi vulnerability

Ubuntu Security Notice USN-3454-1

12th October, 2017

libffi vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

A security issue was fixed in libffi.

Software description

  • libffi
    – Foreign Function Interface library

Details

It was discovered that libffi incorrectly enforced an executable stack. An
attacker could possibly use this issue, in combination with another
vulnerability, to facilitate executing arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
libffi6

3.1~rc1+r3.0.13-12ubuntu0.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-1000376

Read More