Category Archives: Ubuntu

Ubuntu

USN-3471-1: Quagga vulnerabilities

Ubuntu Security Notice USN-3471-1

31st October, 2017

quagga vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 17.10
  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in Quagga.

Software description

  • quagga
    – BGP/OSPF/RIP routing daemon

Details

Andreas Jaggi discovered that Quagga incorrectly handled certain BGP UPDATE
messages. A remote attacker could possibly use this issue to cause Quagga
to crash, resulting in a denial of service. (CVE-2017-16227)

Quentin Young discovered that Quagga incorrectly handled memory in the
telnet vty CLI. An attacker able to connect to the telnet interface could
possibly use this issue to cause Quagga to consume memory, resulting in a
denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu
16.04 LTS. (CVE-2017-5495)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 17.10:
quagga

1.1.1-3ubuntu0.1
quagga-bgpd

1.1.1-3ubuntu0.1
Ubuntu 17.04:
quagga

1.1.1-1ubuntu0.1
quagga-bgpd

1.1.1-1ubuntu0.1
Ubuntu 16.04 LTS:
quagga

0.99.24.1-2ubuntu1.3
Ubuntu 14.04 LTS:
quagga

0.99.22.4-3ubuntu1.4

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Quagga to make all the
necessary changes.

References

CVE-2017-16227,

CVE-2017-5495

Read More

USN-3464-2: Wget vulnerabilities

Ubuntu Security Notice USN-3464-2

30th October, 2017

wget vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in Wget.

Software description

  • wget
    – retrieves files from the web

Details

USN-3464-1 fixed several vulnerabilities in Wget. This update
provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

Antti Levomäki, Christian Jalio, and Joonas Pihlaja discovered that Wget
incorrectly handled certain HTTP responses. A remote attacker could use
this issue to cause Wget to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2017-13089, CVE-2017-13090)

Dawid Golunski discovered that Wget incorrectly handled recursive or
mirroring mode. A remote attacker could possibly use this issue to bypass
intended access list restrictions. (CVE-2016-7098)

Orange Tsai discovered that Wget incorrectly handled CRLF sequences in
HTTP headers. A remote attacker could possibly use this issue to inject
arbitrary HTTP headers. (CVE-2017-6508)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
wget

1.13.4-2ubuntu1.5

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-7098,

CVE-2017-13089,

CVE-2017-13090,

CVE-2017-6508

Read More

USN-3467-1: poppler vulnerability

Ubuntu Security Notice USN-3467-1

30th October, 2017

poppler vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 17.10
  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

poppler could be made to crash if it opened a specially crafted file.

Software description

  • poppler
    – PDF rendering library

Details

It was discovered that Poppler incorrectly handled certain files.
If a user or automated system were tricked into opening a
crafted PDF file, an attacker could cause a denial of service.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 17.10:
libpoppler68

0.57.0-2ubuntu4.1
poppler-utils

0.57.0-2ubuntu4.1
Ubuntu 17.04:
libpoppler64

0.48.0-2ubuntu2.4
poppler-utils

0.48.0-2ubuntu2.4
Ubuntu 16.04 LTS:
libpoppler58

0.41.0-0ubuntu1.5
poppler-utils

0.41.0-0ubuntu1.5
Ubuntu 14.04 LTS:
poppler-utils

0.24.5-2ubuntu4.8
libpoppler44

0.24.5-2ubuntu4.8

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-15565

Read More

USN-3459-2: MySQL vulnerabilities

Ubuntu Security Notice USN-3459-2

30th October, 2017

mysql-5.5 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in MySQL.

Software description

  • mysql-5.5
    – MySQL database

Details

USN-3459-1 fixed several vulnerabilities in MySQL. This update
provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 5.5.58 in Ubuntu 12.04 ESM.

In addition to security fixes, the updated packages contain bug fixes,
new features, and possibly incompatible changes.

Please see the following for more information:
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-58.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
mysql-server-5.5

5.5.58-0ubuntu0.12.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-10268,

CVE-2017-10378,

CVE-2017-10379,

CVE-2017-10384

Read More

USN-3466-1: systemd vulnerability

Ubuntu Security Notice USN-3466-1

26th October, 2017

systemd vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 17.10
  • Ubuntu 17.04

Summary

systemd could be made to temporarily stop responding if it received
specially crafted network traffic.

Software description

  • systemd
    – system and service manager

Details

Karim Hossen & Thomas Imbert discovered that systemd-resolved incorrectly
handled certain DNS responses. A remote attacker could possibly use this
issue to cause systemd to temporarily stop responding, resulting in a
denial of service.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 17.10:
systemd

234-2ubuntu12.1
Ubuntu 17.04:
systemd

232-21ubuntu7.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-15908

Read More

USN-3465-1: Irssi vulnerabilities

Ubuntu Security Notice USN-3465-1

26th October, 2017

irssi vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 17.10
  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in Irssi.

Software description

  • irssi
    – terminal based IRC client

Details

Brian Carpenter discovered that Irssi incorrectly handled messages with
invalid time stamps. A malicious IRC server could use this issue to cause
Irssi to crash, resulting in a denial of service. (CVE-2017-10965)

Brian Carpenter discovered that Irssi incorrectly handled the internal nick
list. A malicious IRC server could use this issue to cause Irssi to crash,
resulting in a denial of service. (CVE-2017-10966)

Joseph Bisch discovered that Irssi incorrectly removed destroyed channels
from the query list. A malicious IRC server could use this issue to cause
Irssi to crash, resulting in a denial of service. (CVE-2017-15227)

Hanno Böck discovered that Irssi incorrectly handled themes. If a user were
tricked into using a malicious theme, a attacker could use this issue to
cause Irssi to crash, resulting in a denial of service. (CVE-2017-15228)

Joseph Bisch discovered that Irssi incorrectly handled certain DCC CTCP
messages. A malicious IRC server could use this issue to cause Irssi to
crash, resulting in a denial of service. (CVE-2017-15721)

Joseph Bisch discovered that Irssi incorrectly handled certain channel IDs.
A malicious IRC server could use this issue to cause Irssi to crash,
resulting in a denial of service. (CVE-2017-15722)

Joseph Bisch discovered that Irssi incorrectly handled certain long nicks
or targets. A malicious IRC server could use this issue to cause Irssi to
crash, resulting in a denial of service. (CVE-2017-15723)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 17.10:
irssi

1.0.4-1ubuntu2.1
Ubuntu 17.04:
irssi

0.8.20-2ubuntu2.2
Ubuntu 16.04 LTS:
irssi

0.8.19-1ubuntu1.5
Ubuntu 14.04 LTS:
irssi

0.8.15-5ubuntu3.3

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Irssi to make all the
necessary changes.

References

CVE-2017-10965,

CVE-2017-10966,

CVE-2017-15227,

CVE-2017-15228,

CVE-2017-15721,

CVE-2017-15722,

CVE-2017-15723

Read More

USN-3464-1: Wget vulnerabilities

Ubuntu Security Notice USN-3464-1

26th October, 2017

wget vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 17.10
  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in Wget.

Software description

  • wget
    – retrieves files from the web

Details

Antti Levomäki, Christian Jalio, and Joonas Pihlaja discovered that Wget
incorrectly handled certain HTTP responses. A remote attacker could use
this issue to cause Wget to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2017-13089, CVE-2017-13090)

Dawid Golunski discovered that Wget incorrectly handled recursive or
mirroring mode. A remote attacker could possibly use this issue to bypass
intended access list restrictions. (CVE-2016-7098)

Orange Tsai discovered that Wget incorrectly handled CRLF sequences in
HTTP headers. A remote attacker could possibly use this issue to inject
arbitrary HTTP headers. (CVE-2017-6508)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 17.10:
wget

1.19.1-3ubuntu1.1
Ubuntu 17.04:
wget

1.18-2ubuntu1.1
Ubuntu 16.04 LTS:
wget

1.17.1-1ubuntu1.3
Ubuntu 14.04 LTS:
wget

1.15-1ubuntu1.14.04.3

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-7098,

CVE-2017-13089,

CVE-2017-13090,

CVE-2017-6508

Read More

USN-3463-1: Werkzeug vulnerability

Ubuntu Security Notice USN-3463-1

25th October, 2017

python-werkzeug vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Werkzeug could be made to run arbitrary code if it opened a
specially crafted file.

Software description

  • python-werkzeug
    – collection of utilities for WSGI applications

Details

It was discovered that Werkzeug did not properly handle certain
web scripts. A remote attacker could use this to inject arbitrary
code via a field that contains an exception message.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.04 LTS:
python3-werkzeug

0.10.4+dfsg1-1ubuntu1.1
python-werkzeug

0.10.4+dfsg1-1ubuntu1.1
Ubuntu 14.04 LTS:
python3-werkzeug

0.9.4+dfsg-1.1ubuntu2.1
python-werkzeug

0.9.4+dfsg-1.1ubuntu2.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-10516

Read More

USN-3462-1: Pacemaker vulnerabilities

Ubuntu Security Notice USN-3462-1

24th October, 2017

pacemaker vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in Pacemaker.

Software description

  • pacemaker
    – Cluster resource manager

Details

Jan Pokorný and Alain Moulle discovered that Pacemaker incorrectly handled
the IPC interface. A local attacker could possibly use this issue to
execute arbitrary code with root privileges. (CVE-2016-7035)

Alain Moulle discovered that Pacemaker incorrectly handled authentication.
A remote attacker could possibly use this issue to shut down connections,
leading to a denial of service. This issue only affected Ubuntu 16.04 LTS.
(CVE-2016-7797)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.04 LTS:
pacemaker

1.1.14-2ubuntu1.2
Ubuntu 14.04 LTS:
pacemaker

1.1.10+git20130802-1ubuntu2.4

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-7035,

CVE-2016-7797

Read More

USN-3454-2: libffi vulnerability

Ubuntu Security Notice USN-3454-2

24th October, 2017

libffi vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

A security issue was fixed in libffi.

Software description

  • libffi
    – Foreign Function Interface library (development files, 32bit)

Details

USN-3454-1 fixed a vulnerability in libffi. This update
provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

It was discovered that libffi incorrectly enforced an executable stack. An
attacker could possibly use this issue, in combination with another
vulnerability, to facilitate executing arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
libffi6

3.0.11~rc1-5ubuntu0.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-1000376

Read More