RHSA-2018:0095-1: Important: java-1.8.0-openjdk security update

Red Hat Enterprise Linux: An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 6
and Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2018-2579, CVE-2018-2582, CVE-2018-2588, CVE-2018-2599, CVE-2018-2602, CVE-2018-2603, CVE-2018-2618, CVE-2018-2629, CVE-2018-2633, CVE-2018-2634, CVE-2018-2637, CVE-2018-2641, CVE-2018-2663, CVE-2018-2677, CVE-2018-2678

Read More

USN-3532-1: GDK-PixBuf vulnerabilities

Ubuntu Security Notice USN-3532-1

15th January, 2018

gdk-pixbuf vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in GDK-PixBuf.

Software description

  • gdk-pixbuf
    – GDK Pixbuf library

Details

It was discoreved that GDK-PixBuf incorrectly handled certain gif images.
An attacker could use this to execute arbitrary code. This issue only affected
Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2017-1000422)

Ariel Zelivansky discovered that GDK-PixBuf incorrectly handled certain images.
An attacker could use this to cause a denial of service.
(CVE-2017-6312, CVE-2017-6313)

Ariel Zelivansky discovered that GDK-PixBuf incorrectly handled large TIFF files.
An attacker could use this to cause a denial of service. (CVE-2017-6314)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 17.10:
libgdk-pixbuf2.0-0

2.36.11-1ubuntu0.1
Ubuntu 16.04 LTS:
libgdk-pixbuf2.0-0

2.32.2-1ubuntu1.4
Ubuntu 14.04 LTS:
libgdk-pixbuf2.0-0

2.30.7-0ubuntu1.8

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart your session to make
all the necessary changes.

References

CVE-2017-1000422,

CVE-2017-6312,

CVE-2017-6313,

CVE-2017-6314

Read More

USN-3533-1: Transmission vulnerability

Ubuntu Security Notice USN-3533-1

16th January, 2018

transmission vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Transmission could be made to run arbitraty code.

Software description

  • transmission
    – lightweight BitTorrent client

Details

It was discovered that Transmission incorrectly handled certain POST requests to
the RPC server and allowed DNS rebinding attack. An attacker could possibly use this
issue to execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 17.10:
transmission

2.92-2ubuntu3.1
Ubuntu 16.04 LTS:
transmission

2.84-3ubuntu3.1
Ubuntu 14.04 LTS:
transmission

2.82-1.1ubuntu3.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2018-5702

Read More

USN-3535-1: Bind vulnerability

Ubuntu Security Notice USN-3535-1

17th January, 2018

bind9 vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Bind could be made to crash if it received specially crafted network
traffic.

Software description

  • bind9
    – Internet Domain Name Server

Details

Jayachandran Palanisamy discovered that the Bind resolver incorrectly
handled fetch cleanup sequencing. A remote attacker could possibly use this
issue to cause Bind to crash, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 17.10:
bind9

1:9.10.3.dfsg.P4-12.6ubuntu1.1
Ubuntu 16.04 LTS:
bind9

1:9.10.3.dfsg.P4-8ubuntu1.10
Ubuntu 14.04 LTS:
bind9

1:9.9.5.dfsg-3ubuntu0.17

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-3145

Read More

USN-3534-1: GNU C Library vulnerabilities

Ubuntu Security Notice USN-3534-1

17th January, 2018

eglibc, glibc vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in the GNU C library.

Software description

  • eglibc
    – GNU C Library

  • glibc
    – GNU C Library

Details

It was discovered that the GNU C library did not properly handle all of
the possible return values from the kernel getcwd(2) syscall. A local
attacker could potentially exploit this to execute arbitrary code in setuid
programs and gain administrative privileges. (CVE-2018-1000001)

A memory leak was discovered in the _dl_init_paths() function in the GNU
C library dynamic loader. A local attacker could potentially exploit this
with a specially crafted value in the LD_HWCAP_MASK environment variable,
in combination with CVE-2017-1000409 and another vulnerability on a system
with hardlink protections disabled, in order to gain administrative
privileges. (CVE-2017-1000408)

A heap-based buffer overflow was discovered in the _dl_init_paths()
function in the GNU C library dynamic loader. A local attacker could
potentially exploit this with a specially crafted value in the
LD_LIBRARY_PATH environment variable, in combination with CVE-2017-1000408
and another vulnerability on a system with hardlink protections disabled,
in order to gain administrative privileges. (CVE-2017-1000409)

An off-by-one error leading to a heap-based buffer overflow was discovered
in the GNU C library glob() implementation. An attacker could potentially
exploit this to cause a denial of service or execute arbitrary code via a
maliciously crafted pattern. (CVE-2017-15670)

A heap-based buffer overflow was discovered during unescaping of user names
with the ~ operator in the GNU C library glob() implementation. An attacker
could potentially exploit this to cause a denial of service or execute
arbitrary code via a maliciously crafted pattern. (CVE-2017-15804)

It was discovered that the GNU C library dynamic loader mishandles RPATH
and RUNPATH containing $ORIGIN for privileged (setuid or AT_SECURE)
programs. A local attacker could potentially exploit this by providing a
specially crafted library in the current working directory in order to
gain administrative privileges. (CVE-2017-16997)

It was discovered that the GNU C library malloc() implementation could
return a memory block that is too small if an attempt is made to allocate
an object whose size is close to SIZE_MAX, resulting in a heap-based
overflow. An attacker could potentially exploit this to cause a denial of
service or execute arbitrary code. This issue only affected Ubuntu 17.10.
(CVE-2017-17426)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 17.10:
libc6

2.26-0ubuntu2.1
Ubuntu 16.04 LTS:
libc6

2.23-0ubuntu10
Ubuntu 14.04 LTS:
libc6

2.19-0ubuntu6.14

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2017-1000408,

CVE-2017-1000409,

CVE-2017-15670,

CVE-2017-15804,

CVE-2017-16997,

CVE-2017-17426,

CVE-2018-1000001

Read More

USN-3536-1: GNU C Library vulnerability

Ubuntu Security Notice USN-3536-1

17th January, 2018

eglibc vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

The GNU C library could be made to run programs as an administrator.

Software description

  • eglibc
    – GNU C Library

Details

It was discovered that the GNU C library did not properly handle all of
the possible return values from the kernel getcwd(2) syscall. A local
attacker could potentially exploit this to execute arbitrary code in setuid
programs and gain administrative privileges. (CVE-2018-1000001)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
libc6

2.15-0ubuntu10.21

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2018-1000001

Read More

USN-3535-2: Bind vulnerability

Ubuntu Security Notice USN-3535-2

17th January, 2018

bind9 vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

Bind could be made to crash if it received specially crafted network
traffic.

Software description

  • bind9
    – Internet Domain Name Server

Details

USN-3535-1 fixed a vulnerability in Bind. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

Jayachandran Palanisamy discovered that the Bind resolver incorrectly
handled fetch cleanup sequencing. A remote attacker could possibly use this
issue to cause Bind to crash, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
bind9

1:9.8.1.dfsg.P1-4ubuntu0.24

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-3145

Read More