RHSA-2018:0260-1: Moderate: systemd security update

Red Hat Enterprise Linux: An update for systemd is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2018-1049

Read More

RHSA-2017:2788-2: Important: augeas security update

Red Hat Enterprise Linux: An update for augeas is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2017-7555

Read More

USN-3553-1: Ruby vulnerabilities

Ubuntu Security Notice USN-3553-1

31st January, 2018

ruby2.3 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS

Summary

Several security issues were fixed in Ruby.

Software description

  • ruby2.3
    – Interpreter of object-oriented scripting language Ruby

Details

It was discovered that Ruby failed to validate specification names.
An attacker could possibly use a maliciously crafted gem to potentially
overwrite any file on the filesystem. (CVE-2017-0901)

It was discovered that Ruby was vulnerable to a DNS hijacking vulnerability.
An attacker could use this to possibly force the RubyGems client to download
and install gems from a server that the attacker controls. (CVE-2017-0902)

It was discovered that Ruby incorrectly handled certain YAML files. An attacker could
use this to possibly execute arbitrary code. (CVE-2017-0903)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 17.10:
libruby2.3

2.3.3-1ubuntu1.3
ruby2.3

2.3.3-1ubuntu1.3
Ubuntu 16.04 LTS:
libruby2.3

2.3.1-2~16.04.6
ruby2.3

2.3.1-2~16.04.6

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-0901,

CVE-2017-0902,

CVE-2017-0903

Read More

USN-3552-1: Firefox vulnerability

Ubuntu Security Notice USN-3552-1

31st January, 2018

firefox vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Firefox could be made to run programs as your login if it opened a
malicious website.

Software description

  • firefox
    – Mozilla Open Source web browser

Details

Johann Hofmann discovered that HTML fragments created for
chrome-privileged documents were not properly sanitized. An attacker
could exploit this to execute arbitrary code. (CVE-2018-5124)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 17.10:
firefox

58.0.1+build1-0ubuntu0.17.10.1
Ubuntu 16.04 LTS:
firefox

58.0.1+build1-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox

58.0.1+build1-0ubuntu0.14.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make
all the necessary changes.

References

CVE-2018-5124

Read More

USN-3554-1: curl vulnerabilities

Ubuntu Security Notice USN-3554-1

31st January, 2018

curl vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in curl.

Software description

  • curl
    – HTTP, HTTPS, and FTP client and client libraries

Details

It was discovered that curl incorrectly handled certain data. An attacker
could possibly use this to cause a denial of service or even to get access
to sensitive data. This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10.

It was discovered that curl could accidentally leak authentication data.
An attacker could possibly use this to get access to sensitive information.
(CVE-2018-1000007)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 17.10:
libcurl3-nss

7.55.1-1ubuntu2.3
curl

7.55.1-1ubuntu2.3
libcurl3-gnutls

7.55.1-1ubuntu2.3
libcurl3

7.55.1-1ubuntu2.3
Ubuntu 16.04 LTS:
libcurl3-nss

7.47.0-1ubuntu2.6
curl

7.47.0-1ubuntu2.6
libcurl3-gnutls

7.47.0-1ubuntu2.6
libcurl3

7.47.0-1ubuntu2.6
Ubuntu 14.04 LTS:
libcurl3-nss

7.35.0-1ubuntu2.14
curl

7.35.0-1ubuntu2.14
libcurl3-gnutls

7.35.0-1ubuntu2.14
libcurl3

7.35.0-1ubuntu2.14

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2018-1000005,

CVE-2018-1000007

Read More

USN-3554-2: curl vulnerability

Ubuntu Security Notice USN-3554-2

31st January, 2018

curl vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

curl could be made to expose sensitive information.

Software description

  • curl
    – HTTP, HTTPS, and FTP client and client libraries

Details

USN-3554-1 fixed vulnerabilities in curl. This update
provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

It was discovered that curl could accidentally leak authentication data.
An attacker could possibly use this to get access to sensitive information.
(CVE-2018-1000007)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
libcurl3-nss

7.22.0-3ubuntu4.20
curl

7.22.0-3ubuntu4.20
libcurl3-gnutls

7.22.0-3ubuntu4.20
libcurl3

7.22.0-3ubuntu4.20

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2018-1000007

Read More