Category Archives: Ubuntu

Ubuntu

USN-3155-1: Firefox vulnerabilities

Ubuntu Security Notice USN-3155-1

13th December, 2016

firefox vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Firefox could be made to crash or run programs as your login if it
opened a malicious website.

Software description

  • firefox
    – Mozilla Open Source web browser

Details

Multiple security vulnerabilities were discovered in Firefox. If a user
were tricked in to opening a specially crafted website, an attacker could
potentially exploit these to conduct cross-site scripting (XSS) attacks,
obtain sensitive information, cause a denial of service via application
crash, or execute arbitrary code. (CVE-2016-9080, CVE-2016-9893,
CVE-2016-9894, CVE-2016-9895, CVE-2016-9896, CVE-2016-9897, CVE-2016-9898,
CVE-2016-9899, CVE-2016-9900, CVE-2016-9901, CVE-2016-9902, CVE-2016-9903,
CVE-2016-9904)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
firefox

50.1.0+build2-0ubuntu0.16.10.1
Ubuntu 16.04 LTS:
firefox

50.1.0+build2-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox

50.1.0+build2-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
firefox

50.1.0+build2-0ubuntu0.12.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make
all the necessary changes.

References

CVE-2016-9080,

CVE-2016-9893,

CVE-2016-9894,

CVE-2016-9895,

CVE-2016-9896,

CVE-2016-9897,

CVE-2016-9898,

CVE-2016-9899,

CVE-2016-9900,

CVE-2016-9901,

CVE-2016-9902,

CVE-2016-9903,

CVE-2016-9904

Read More

USN-3156-1: APT vulnerability

Ubuntu Security Notice USN-3156-1

13th December, 2016

apt vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

An attacker could trick APT into installing altered packages.

Software description

  • apt
    – Advanced front-end for dpkg

Details

Jann Horn discovered that APT incorrectly handled InRelease files.
If a remote attacker were able to perform a man-in-the-middle attack, this
flaw could potentially be used to install altered packages.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
apt

1.3.2ubuntu0.1
Ubuntu 16.04 LTS:
apt

1.2.15ubuntu0.2
Ubuntu 14.04 LTS:
apt

1.0.1ubuntu2.17

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-1252

Read More

USN-3132-1: tar vulnerability

Ubuntu Security Notice USN-3132-1

21st November, 2016

tar vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

tar could be made to overwrite files.

Software description

  • tar
    – GNU version of the tar archiving utility

Details

Harry Sintonen discovered that tar incorrectly handled extracting files
when path names are specified on the command line. If a user or automated
system were tricked into processing a specially crafted archive, an
attacker could possibly overwrite arbitrary files.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
tar

1.29b-1ubuntu0.1
Ubuntu 16.04 LTS:
tar

1.28-2.1ubuntu0.1
Ubuntu 14.04 LTS:
tar

1.27.1-1ubuntu0.1
Ubuntu 12.04 LTS:
tar

1.26-4ubuntu1.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-6321

Read More

USN-3131-1: ImageMagick vulnerabilities

Ubuntu Security Notice USN-3131-1

21st November, 2016

imagemagick vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in ImageMagick.

Software description

  • imagemagick
    – Image manipulation programs and library

Details

It was discovered that ImageMagick incorrectly handled certain malformed
image files. If a user or automated system using ImageMagick were tricked
into opening a specially crafted image, an attacker could exploit this to
cause a denial of service or possibly execute code with the privileges of
the user invoking the program.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
libmagick++-6.q16-5v5

8:6.8.9.9-7ubuntu8.1
imagemagick

8:6.8.9.9-7ubuntu8.1
libmagickcore-6.q16-2-extra

8:6.8.9.9-7ubuntu8.1
imagemagick-6.q16

8:6.8.9.9-7ubuntu8.1
libmagickcore-6.q16-2

8:6.8.9.9-7ubuntu8.1
Ubuntu 16.04 LTS:
libmagick++-6.q16-5v5

8:6.8.9.9-7ubuntu5.2
imagemagick

8:6.8.9.9-7ubuntu5.2
libmagickcore-6.q16-2-extra

8:6.8.9.9-7ubuntu5.2
imagemagick-6.q16

8:6.8.9.9-7ubuntu5.2
libmagickcore-6.q16-2

8:6.8.9.9-7ubuntu5.2
Ubuntu 14.04 LTS:
libmagick++5

8:6.7.7.10-6ubuntu3.2
libmagickcore5-extra

8:6.7.7.10-6ubuntu3.2
libmagickcore5

8:6.7.7.10-6ubuntu3.2
imagemagick

8:6.7.7.10-6ubuntu3.2
Ubuntu 12.04 LTS:
libmagick++4

8:6.6.9.7-5ubuntu3.5
libmagickcore4

8:6.6.9.7-5ubuntu3.5
imagemagick

8:6.6.9.7-5ubuntu3.5
libmagickcore4-extra

8:6.6.9.7-5ubuntu3.5

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-8354,

CVE-2014-8355,

CVE-2014-8562,

CVE-2014-8716,

CVE-2014-9805,

CVE-2014-9806,

CVE-2014-9807,

CVE-2014-9808,

CVE-2014-9809,

CVE-2014-9810,

CVE-2014-9811,

CVE-2014-9812,

CVE-2014-9813,

CVE-2014-9814,

CVE-2014-9815,

CVE-2014-9816,

CVE-2014-9817,

CVE-2014-9818,

CVE-2014-9819,

CVE-2014-9820,

CVE-2014-9821,

CVE-2014-9822,

CVE-2014-9823,

CVE-2014-9826,

CVE-2014-9828,

CVE-2014-9829,

CVE-2014-9830,

CVE-2014-9831,

CVE-2014-9833,

CVE-2014-9834,

CVE-2014-9835,

CVE-2014-9836,

CVE-2014-9837,

CVE-2014-9838,

CVE-2014-9839,

CVE-2014-9840,

CVE-2014-9841,

CVE-2014-9843,

CVE-2014-9844,

CVE-2014-9845,

CVE-2014-9846,

CVE-2014-9847,

CVE-2014-9848,

CVE-2014-9849,

CVE-2014-9850,

CVE-2014-9851,

CVE-2014-9853,

CVE-2014-9854,

CVE-2014-9907,

CVE-2015-8894,

CVE-2015-8895,

CVE-2015-8896,

CVE-2015-8897,

CVE-2015-8898,

CVE-2015-8900,

CVE-2015-8901,

CVE-2015-8902,

CVE-2015-8903,

CVE-2015-8957,

CVE-2015-8958,

CVE-2015-8959,

CVE-2016-4562,

CVE-2016-4563,

CVE-2016-4564,

CVE-2016-5010,

CVE-2016-5687,

CVE-2016-5688,

CVE-2016-5689,

CVE-2016-5690,

CVE-2016-5691,

CVE-2016-5841,

CVE-2016-5842,

CVE-2016-6491,

CVE-2016-6823,

CVE-2016-7101,

CVE-2016-7513,

CVE-2016-7514,

CVE-2016-7515,

CVE-2016-7516,

CVE-2016-7517,

CVE-2016-7518,

CVE-2016-7519,

CVE-2016-7520,

CVE-2016-7521,

CVE-2016-7522,

CVE-2016-7523,

CVE-2016-7524,

CVE-2016-7525,

CVE-2016-7526,

CVE-2016-7527,

CVE-2016-7528,

CVE-2016-7529,

CVE-2016-7530,

CVE-2016-7531,

CVE-2016-7532,

CVE-2016-7533,

CVE-2016-7534,

CVE-2016-7535,

CVE-2016-7536,

CVE-2016-7537,

CVE-2016-7538,

CVE-2016-7539,

CVE-2016-7540

Read More

USN-3124-1: Firefox vulnerabilities

Ubuntu Security Notice USN-3124-1

18th November, 2016

firefox vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Firefox could be made to crash or run programs as your login if it
opened a malicious website.

Software description

  • firefox
    – Mozilla Open Source web browser

Details

Christian Holler, Andrew McCreight, Dan Minor, Tyson Smith, Jon Coppeard,
Jan-Ivar Bruaroey, Jesse Ruderman, Markus Stange, Olli Pettay, Ehsan
Akhgari, Gary Kwong, Tooru Fujisawa, and Randell Jesup discovered multiple
memory safety issues in Firefox. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit these to
cause a denial of service via application crash, or execute arbitrary
code. (CVE-2016-5289, CVE-2016-5290)

A same-origin policy bypass was discovered with local HTML files in some
circumstances. An attacker could potentially exploit this to obtain
sensitive information. (CVE-2016-5291)

A crash was discovered when parsing URLs in some circumstances. If a user
were tricked in to opening a specially crafted website, an attacker could
potentially exploit this to execute arbitrary code. (CVE-2016-5292)

A heap buffer-overflow was discovered in Cairo when processing SVG
content. If a user were tricked in to opening a specially crafted website,
an attacker could potentially exploit this to cause a denial of service
via application crash, or execute arbitrary code. (CVE-2016-5296)

An error was discovered in argument length checking in Javascript. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to cause a denial of service via
application crash, or execute arbitrary code. (CVE-2016-5297)

An integer overflow was discovered in the Expat library. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via application
crash. (CVE-2016-9063)

It was discovered that addon updates failed to verify that the addon ID
inside the signed package matched the ID of the addon being updated.
An attacker that could perform a man-in-the-middle (MITM) attack could
potentially exploit this to provide malicious addon updates.
(CVE-2016-9064)

A buffer overflow was discovered in nsScriptLoadHandler. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via application
crash, or execute arbitrary code. (CVE-2016-9066)

2 use-after-free bugs were discovered during DOM operations in some
circumstances. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit these to cause a denial of
service via application crash, or execute arbitrary code. (CVE-2016-9067,
CVE-2016-9069)

A heap use-after-free was discovered during web animations in some
circumstances. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to cause a denial of
service via application crash, or execute arbitrary code. (CVE-2016-9068)

It was discovered that a page loaded in to the sidebar through a bookmark
could reference a privileged chrome window. An attacker could potentially
exploit this to bypass same origin restrictions. (CVE-2016-9070)

An issue was discovered with Content Security Policy (CSP) in combination
with HTTP to HTTPS redirection. An attacker could potentially exploit this
to verify whether a site is within the user’s browsing history.
(CVE-2016-9071)

An issue was discovered with the windows.create() WebExtensions API. If a
user were tricked in to installing a malicious extension, an attacker
could potentially exploit this to escape the WebExtensions sandbox.
(CVE-2016-9073)

It was discovered that WebExtensions can use the mozAddonManager API. An
attacker could potentially exploit this to install additional extensions
without user permission. (CVE-2016-9075)

It was discovered that <select> element dropdown menus can cover location
bar content when e10s is enabled. An attacker could potentially exploit
this to conduct UI spoofing attacks. (CVE-2016-9076)

It was discovered that canvas allows the use of the feDisplacementMap
filter on cross-origin images. An attacker could potentially exploit this
to conduct timing attacks. (CVE-2016-9077)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
firefox

50.0+build2-0ubuntu0.16.10.2
Ubuntu 16.04 LTS:
firefox

50.0+build2-0ubuntu0.16.04.2
Ubuntu 14.04 LTS:
firefox

50.0+build2-0ubuntu0.14.04.2
Ubuntu 12.04 LTS:
firefox

50.0+build2-0ubuntu0.12.04.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make
all the necessary changes.

References

CVE-2016-5289,

CVE-2016-5290,

CVE-2016-5291,

CVE-2016-5292,

CVE-2016-5296,

CVE-2016-5297,

CVE-2016-9063,

CVE-2016-9064,

CVE-2016-9066,

CVE-2016-9067,

CVE-2016-9068,

CVE-2016-9069,

CVE-2016-9070,

CVE-2016-9071,

CVE-2016-9073,

CVE-2016-9075,

CVE-2016-9076,

CVE-2016-9077

Read More

USN-3135-1: GStreamer Good Plugins vulnerability

Ubuntu Security Notice USN-3135-1

22nd November, 2016

gst-plugins-good0.10, gst-plugins-good1.0 vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

GStreamer could be made to crash or run programs as your login if it
opened a specially crafted file.

Software description

  • gst-plugins-good0.10
    – GStreamer plugins

  • gst-plugins-good1.0
    – GStreamer plugins

Details

Chris Evans discovered that GStreamer Good Plugins did not correctly handle
malformed FLC movie files. If a user were tricked into opening a crafted
FLC movie file with a GStreamer application, an attacker could cause a
denial of service via application crash, or execute arbitrary code with the
privileges of the user invoking the program.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
gstreamer1.0-plugins-good

1.8.3-1ubuntu1.1
Ubuntu 16.04 LTS:
gstreamer1.0-plugins-good

1.8.2-1ubuntu0.2
Ubuntu 14.04 LTS:
gstreamer0.10-plugins-good

0.10.31-3+nmu1ubuntu5.1
gstreamer1.0-plugins-good

1.2.4-1~ubuntu1.1
Ubuntu 12.04 LTS:
gstreamer0.10-plugins-good

0.10.31-1ubuntu1.3

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

LP: 1643901

Read More

USN-3134-1: Python vulnerabilities

Ubuntu Security Notice USN-3134-1

22nd November, 2016

python2.7, python3.2, python3.4, python3.5 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in Python.

Software description

  • python2.7
    – An interactive high-level object-oriented language

  • python3.2
    – An interactive high-level object-oriented language

  • python3.4
    – An interactive high-level object-oriented language

  • python3.5
    – An interactive high-level object-oriented language

Details

It was discovered that the smtplib library in Python did not return an
error when StartTLS fails. A remote attacker could possibly use this to
expose sensitive information. (CVE-2016-0772)

Rémi Rampin discovered that Python would not protect CGI applications
from contents of the HTTP_PROXY environment variable when based on
the contents of the Proxy header from HTTP requests. A remote attacker
could possibly use this to cause a CGI application to redirect outgoing
HTTP requests. (CVE-2016-1000110)

Insu Yun discovered an integer overflow in the zipimporter module in
Python that could lead to a heap-based overflow. An attacker could
use this to craft a special zip file that when read by Python could
possibly execute arbitrary code. (CVE-2016-5636)

Guido Vranken discovered that the urllib modules in Python did
not properly handle carriage return line feed (CRLF) in headers. A
remote attacker could use this to craft URLs that inject arbitrary
HTTP headers. This issue only affected Ubuntu 12.04 LTS and Ubuntu
14.04 LTS. (CVE-2016-5699)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.04 LTS:
libpython2.7-minimal

2.7.12-1ubuntu0~16.04.1
libpython3.5-stdlib

3.5.2-2ubuntu0~16.04.1
libpython2.7

2.7.12-1ubuntu0~16.04.1
libpython3.5-minimal

3.5.2-2ubuntu0~16.04.1
python2.7

2.7.12-1ubuntu0~16.04.1
python2.7-minimal

2.7.12-1ubuntu0~16.04.1
python3.5

3.5.2-2ubuntu0~16.04.1
python3.5-minimal

3.5.2-2ubuntu0~16.04.1
libpython3.5

3.5.2-2ubuntu0~16.04.1
libpython2.7-stdlib

2.7.12-1ubuntu0~16.04.1
Ubuntu 14.04 LTS:
libpython2.7-minimal

2.7.6-8ubuntu0.3
libpython2.7

2.7.6-8ubuntu0.3
python2.7

2.7.6-8ubuntu0.3
python3.4-minimal

3.4.3-1ubuntu1~14.04.5
python2.7-minimal

2.7.6-8ubuntu0.3
python3.4

3.4.3-1ubuntu1~14.04.5
libpython3.4-minimal

3.4.3-1ubuntu1~14.04.5
libpython3.4

3.4.3-1ubuntu1~14.04.5
libpython2.7-stdlib

2.7.6-8ubuntu0.3
libpython3.4-stdlib

3.4.3-1ubuntu1~14.04.5
Ubuntu 12.04 LTS:
libpython2.7

2.7.3-0ubuntu3.9
python2.7

2.7.3-0ubuntu3.9
python2.7-minimal

2.7.3-0ubuntu3.9
python3.2

3.2.3-0ubuntu3.8
python3.2-minimal

3.2.3-0ubuntu3.8
libpython3.2

3.2.3-0ubuntu3.8

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart any Python
applications to make all the necessary changes.

References

CVE-2016-0772,

CVE-2016-1000110,

CVE-2016-5636,

CVE-2016-5699

Read More

USN-3138-1: python-cryptography vulnerability

Ubuntu Security Notice USN-3138-1

28th November, 2016

python-cryptography vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS

Summary

python-cryptography could generate incorrect keys.

Software description

  • python-cryptography
    – Cryptography Python library

Details

Markus Döring discovered that python-cryptography incorrectly handled
certain HKDF lengths. This could result in python-cryptography returning an
empty string instead of the expected derived key.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
python3-cryptography

1.5-2ubuntu0.1
python-cryptography

1.5-2ubuntu0.1
Ubuntu 16.04 LTS:
python3-cryptography

1.2.3-1ubuntu0.1
python-cryptography

1.2.3-1ubuntu0.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-9243

Read More

USN-3135-2: GStreamer Good Plugins vulnerability

Ubuntu Security Notice USN-3135-2

28th November, 2016

gst-plugins-good0.10, gst-plugins-good1.0 vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

GStreamer could be made to crash or run programs as your login if it opened
a specially crafted file.

Software description

  • gst-plugins-good0.10
    – GStreamer plugins

  • gst-plugins-good1.0
    – GStreamer plugins

Details

USN-3135-1 fixed a vulnerability in GStreamer Good Plugins. The original
security fix was incomplete. This update fixes the problem.

Original advisory details:

Chris Evans discovered that GStreamer Good Plugins did not correctly handle
malformed FLC movie files. If a user were tricked into opening a crafted
FLC movie file with a GStreamer application, an attacker could cause a
denial of service via application crash, or execute arbitrary code with the
privileges of the user invoking the program.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
gstreamer1.0-plugins-good

1.8.3-1ubuntu1.2
Ubuntu 16.04 LTS:
gstreamer1.0-plugins-good

1.8.2-1ubuntu0.3
Ubuntu 14.04 LTS:
gstreamer0.10-plugins-good

0.10.31-3+nmu1ubuntu5.2
gstreamer1.0-plugins-good

1.2.4-1~ubuntu1.3
Ubuntu 12.04 LTS:
gstreamer0.10-plugins-good

0.10.31-1ubuntu1.4

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

LP: 1643901

Read More

USN-3137-1: MoinMoin vulnerabilities

Ubuntu Security Notice USN-3137-1

23rd November, 2016

moin vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in MoinMoin.

Software description

  • moin
    – Collaborative hypertext environment

Details

It was discovered that MoinMoin did not properly sanitize certain inputs,
resulting in cross-site scripting (XSS) vulnerabilities. With cross-site
scripting vulnerabilities, if a user were tricked into viewing server
output during a crafted server request, a remote attacker could exploit
this to modify the contents, or steal confidential data, within the same
domain.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
python-moinmoin

1.9.8-1ubuntu1.16.10.1
Ubuntu 16.04 LTS:
python-moinmoin

1.9.8-1ubuntu1.16.04.1
Ubuntu 14.04 LTS:
python-moinmoin

1.9.7-1ubuntu2.1
Ubuntu 12.04 LTS:
python-moinmoin

1.9.3-1ubuntu2.3

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-7146,

CVE-2016-7148,

CVE-2016-9119

Read More