USN-3438-1: Git vulnerability

Ubuntu Security Notice USN-3438-1

5th October, 2017

git vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Git be made to run programs if it processed a specially crafted file.

Software description

  • git
    – fast, scalable, distributed revision control system

Details

It was discovered that Git incorrectly handled certain subcommands such as
cvsserver. A remote attacker could possibly use this issue via shell
metacharacters in modules names to execute arbitrary code.

This update also removes the cvsserver subcommand from git-shell by
default.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 17.04:
git

1:2.11.0-2ubuntu0.3
Ubuntu 16.04 LTS:
git

1:2.7.4-0ubuntu1.3
Ubuntu 14.04 LTS:
git

1:1.9.1-1ubuntu0.7

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-14867

Read More

USN-3439-1: Ruby vulnerabilities

Ubuntu Security Notice USN-3439-1

5th October, 2017

ruby1.9.1 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in Ruby.

Software description

  • ruby1.9.1
    – Object-oriented scripting language

Details

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to cause a buffer overrun.
(CVE-2017-0898)

Yusuke Endoh discovered that Ruby incorrectly handled certain files.
An attacker could use this to execute terminal escape sequences.
(CVE-2017-0899)

Yusuke Endoh discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to cause a denial of service.
(CVE-2017-0900)

It was discovered that Ruby incorrectly handled certain files.
An attacker could use this to overwrite any file on the filesystem.
(CVE-2017-0901)

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to execute arbitrary code.
(CVE-2017-10784)

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could use this to cause a denial of service.
(CVE-2017-14033)

It was discovered that Ruby incorrectly handled certain files.
An attacker could use this to expose sensitive information.
(CVE-2017-14064)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
ruby1.9.1

1.9.3.484-2ubuntu1.5
libruby1.9.1

1.9.3.484-2ubuntu1.5
ruby1.9.3

1.9.3.484-2ubuntu1.5

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-0898,

CVE-2017-0899,

CVE-2017-0900,

CVE-2017-0901,

CVE-2017-10784,

CVE-2017-14033,

CVE-2017-14064

Read More

USN-3440-1: poppler vulnerabilities

Ubuntu Security Notice USN-3440-1

6th October, 2017

poppler vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in poppler.

Software description

  • poppler
    – PDF rendering library

Details

It was discovered that Poppler incorrectly handled certain files.
If a user or automated system were tricked into opening a
crafted PDF file, an attacker could cause a denial of service.
(CVE-2017-14518, CVE-2017-14520, CVE-2017-14617, CVE-2017-14929,
CVE-2017-14975, CVE-2017-14977)

It was discovered that Poppler incorrectly handled certain files.
If a user or automated system were tricked into opening a crafted
PDF file, an attacker could cause a denial of service. This issue
only affected Ubuntu 17.04 and 16.04. (CVE-2017-14926, CVE-2017-14928)

Alberto Garcia, Francisco Oca and Suleman Ali discovered that Poppler
incorrectly handled certain files. If a user or automated system were
tricked into opening a crafted PDF file, an attacker could cause a
denial of service. (CVE-2017-9776)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 17.04:
libpoppler64

0.48.0-2ubuntu2.3
poppler-utils

0.48.0-2ubuntu2.3
Ubuntu 16.04 LTS:
libpoppler58

0.41.0-0ubuntu1.4
poppler-utils

0.41.0-0ubuntu1.4
Ubuntu 14.04 LTS:
poppler-utils

0.24.5-2ubuntu4.7
libpoppler44

0.24.5-2ubuntu4.7

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-14518,

CVE-2017-14520,

CVE-2017-14617,

CVE-2017-14926,

CVE-2017-14928,

CVE-2017-14929,

CVE-2017-14975,

CVE-2017-14977,

CVE-2017-9776

Read More