Ubuntu

USN-3997-1: Thunderbird vulnerabilities

1 month 3 weeks ago
thunderbird vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

Several security issues were fixed in Thunderbird.

Software Description
  • thunderbird - Mozilla Open Source mail and newsgroup client
Details

Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, bypass same-origin protections, or execute arbitrary code. (CVE-2019-18511, CVE-2019-11691, CVE-2019-11692, CVE-2019-11693, CVE-2019-9797, CVE-2019-9800, CVE-2019-9817, CVE-2019-9819, CVE-2019-9820)

Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit these to cause a denial of service, or execute arbitrary code. (CVE-2019-5798, CVE-2019-7317)

A type confusion bug was discovered with object groups and UnboxedObjects. If a user were tricked in to opening a specially crafted website in a browsing context after enabling the UnboxedObjects feature, an attacker could potentially exploit this to bypass security checks. (CVE-2019-9816)

It was discovered that history data could be exposed via drag and drop of hyperlinks to and from bookmarks. If a user were tricked in to dragging a specially crafted hyperlink to a bookmark toolbar or sidebar, and subsequently back in to the web content area, an attacker could potentially exploit this to obtain sensitive information. (CVE-2019-11698)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
thunderbird - 1:60.7.0+build1-0ubuntu0.19.04.1
Ubuntu 18.10
thunderbird - 1:60.7.0+build1-0ubuntu0.18.10.1
Ubuntu 18.04 LTS
thunderbird - 1:60.7.0+build1-0ubuntu0.18.04.1
Ubuntu 16.04 LTS
thunderbird - 1:60.7.0+build1-0ubuntu0.16.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Thunderbird to make all the necessary changes.

References

USN-3995-2: Keepalived vulnerability

1 month 3 weeks ago
keepalived vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM
  • Ubuntu 12.04 ESM
Summary

Keepalived could be made to crash or run programs if it received specially crafted network traffic.

Software Description
  • keepalived - Failover and monitoring daemon for LVS clusters
Details

USN-3995-1 fixed a vulnerability in keepalived. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that Keepalived incorrectly handled certain HTTP status response codes. A remote attacker could use this issue to cause Keepalived to crash, resulting in a denial of service, or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM
keepalived - 1:1.2.7-1ubuntu1+esm1
Ubuntu 12.04 ESM
keepalived - 1:1.2.2-3ubuntu1.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-3845-2: FreeRDP vulnerabilities

1 month 3 weeks ago
freerdp vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
Summary

Several security issues were fixed in FreeRDP.

Software Description
  • freerdp - RDP client for Windows Terminal Services
Details

USN-3845-1 fixed several vulnerabilities in FreeRDP. This update provides the corresponding update for Ubuntu 18.04 LTS and Ubuntu 18.10.

Original advisory details:

Eyal Itkin discovered FreeRDP incorrectly handled certain stream encodings. A malicious server could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only applies to Ubuntu 18.04 LTS and Ubuntu 18.10. (CVE-2018-8784, CVE-2018-8785)

Eyal Itkin discovered FreeRDP incorrectly handled bitmaps. A malicious server could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2018-8786, CVE-2018-8787)

Eyal Itkin discovered FreeRDP incorrectly handled certain stream encodings. A malicious server could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only applies to Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 18.10. (CVE-2018-8788)

Eyal Itkin discovered FreeRDP incorrectly handled NTLM authentication. A malicious server could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only applies to Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 18.10. (CVE-2018-8789)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.10
libfreerdp-client1.1 - 1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.10.1
Ubuntu 18.04 LTS
libfreerdp-client1.1 - 1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-3995-1: Keepalived vulnerability

1 month 3 weeks ago
keepalived vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

Keepalived could be made to crash or run programs if it received specially crafted network traffic.

Software Description
  • keepalived - Failover and monitoring daemon for LVS clusters
Details

It was discovered that Keepalived incorrectly handled certain HTTP status response codes. A remote attacker could use this issue to cause Keepalived to crash, resulting in a denial of service, or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.10
keepalived - 1:1.3.9-1ubuntu1.1
Ubuntu 18.04 LTS
keepalived - 1:1.3.9-1ubuntu0.18.04.2
Ubuntu 16.04 LTS
keepalived - 1:1.2.24-1ubuntu0.16.04.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-3976-4: Samba vulnerability

1 month 3 weeks ago
samba vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM
Summary

USN-3976-1 introduced a regression in Samba.

Software Description
  • samba - SMB/CIFS file, print, and login server for Unix
Details

USN-3976-1 fixed a vulnerability in Samba. The update introduced a regression causing Samba to occasionally crash. This update fixes the problem.

Original advisory details:

Isaac Boukris and Andrew Bartlett discovered that Samba incorrectly checked S4U2Self packets. In certain environments, a remote attacker could possibly use this issue to escalate privileges.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM
samba - 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-3994-1: gnome-desktop vulnerability

1 month 3 weeks ago
gnome-desktop3 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
Summary

gnome-desktop could be made to escape the thumbnailer sandbox.

Software Description
  • gnome-desktop3 - Introspection data for GnomeDesktop
Details

It was discovered that gnome-desktop incorrectly confined thumbnailers. If a user were tricked into downloading a malicious image file, a remote attacker could possibly combine this issue with another vulnerability to escape the sandbox and execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
libgnome-desktop-3-17 - 3.32.1-1ubuntu1.1
Ubuntu 18.10
libgnome-desktop-3-17 - 3.30.1-1ubuntu1.1
Ubuntu 18.04 LTS
libgnome-desktop-3-17 - 3.28.2-0ubuntu1.3

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart your session to make all the necessary changes.

References

USN-3976-3: Samba regression

1 month 3 weeks ago
samba regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

USN-3976-1 introduced a regression in Samba.

Software Description
  • samba - SMB/CIFS file, print, and login server for Unix
Details

USN-3976-1 fixed a vulnerability in Samba. The update introduced a regression causing Samba to occasionally crash. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Isaac Boukris and Andrew Bartlett discovered that Samba incorrectly checked S4U2Self packets. In certain environments, a remote attacker could possibly use this issue to escalate privileges.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04 LTS
samba - 2:4.7.6+dfsg~ubuntu-0ubuntu2.11
Ubuntu 16.04 LTS
samba - 2:4.3.11+dfsg-0ubuntu0.16.04.21

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-3957-2: MariaDB vulnerabilities

2 months ago
MariaDB vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM
Summary

Several security issues were fixed in MariaDB.

Software Description
  • mariadb-5.5 - MariaDB database
Details

USN-3957-1 fixed multiple vulnerabilities in MySQL. This update addresses some of them in MariaDB 5.5.

Ubuntu 14.04 LTS has been updated to MariaDB 5.5.64.

In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.

Please see the following for more information: https://mariadb.com/kb/en/library/mariadb-5564-changelog/ https://mariadb.com/kb/en/library/mariadb-5564-release-notes/

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM
mariadb-server - 5.5.64-1ubuntu0.14.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional bug fixes. In general, a standard system update will make all the necessary changes.

References

USN-3977-2: Intel Microcode update

2 months ago
intel-microcode update

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 ESM
Summary

The system could be made to expose sensitive information.

Software Description
  • intel-microcode - Processor microcode for Intel CPUs
Details

USN-3977-1 provided mitigations for Microarchitectural Data Sampling (MDS) vulnerabilities in Intel Microcode for a large number of Intel processor families. This update provides the corresponding updated microcode mitigations for Intel Cherry Trail and Bay Trail processor families.

Original advisory details:

Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Giorgi Maisuradze, Dan Horea Lutas, Andrei Lutas, Volodymyr Pikhur, Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Moritz Lipp, Michael Schwarz, and Daniel Gruss discovered that memory previously stored in microarchitectural fill buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2018-12130)

Brandon Falk, Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida discovered that memory previously stored in microarchitectural load ports of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2018-12127)

Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Berk Sunar, Frank Piessens, and Yuval Yarom discovered that memory previously stored in microarchitectural store buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2018-12126)

Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Volodrmyr Pikhur, Moritz Lipp, Michael Schwarz, Daniel Gruss, Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida discovered that uncacheable memory previously stored in microarchitectural buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2019-11091)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
intel-microcode - 3.20190514.0ubuntu0.19.04.3
Ubuntu 18.10
intel-microcode - 3.20190514.0ubuntu0.18.10.2
Ubuntu 18.04 LTS
intel-microcode - 3.20190514.0ubuntu0.18.04.3
Ubuntu 16.04 LTS
intel-microcode - 3.20190514.0ubuntu0.16.04.2
Ubuntu 14.04 ESM
intel-microcode - 3.20190514.0ubuntu0.14.04.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

References

USN-3993-2: curl vulnerability

2 months ago
curl vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM
  • Ubuntu 12.04 ESM
Summary

curl could be made to crash if it received a specially crafted data.

Software Description
  • curl - HTTP, HTTPS, and FTP client and client libraries
Details

USN-3993-1 fixed a vulnerability in curl. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that curl incorrectly handled memory when receiving data from a TFTP server. A remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2019-5436)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM
curl - 7.35.0-1ubuntu2.20+esm2
libcurl3 - 7.35.0-1ubuntu2.20+esm2
libcurl3-gnutls - 7.35.0-1ubuntu2.20+esm2
libcurl3-nss - 7.35.0-1ubuntu2.20+esm2
Ubuntu 12.04 ESM
curl - 7.22.0-3ubuntu4.26
libcurl3 - 7.22.0-3ubuntu4.26
libcurl3-gnutls - 7.22.0-3ubuntu4.26
libcurl3-nss - 7.22.0-3ubuntu4.26

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-3993-1: curl vulnerabilities

2 months ago
curl vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

Several security issues were fixed in curl.

Software Description
  • curl - HTTP, HTTPS, and FTP client and client libraries
Details

Wenchao Li discovered that curl incorrectly handled memory in the curl_url_set() function. A remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 19.04. (CVE-2019-5435)

It was discovered that curl incorrectly handled memory when receiving data from a TFTP server. A remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2019-5436)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
curl - 7.64.0-2ubuntu1.1
libcurl3-gnutls - 7.64.0-2ubuntu1.1
libcurl3-nss - 7.64.0-2ubuntu1.1
libcurl4 - 7.64.0-2ubuntu1.1
Ubuntu 18.10
curl - 7.61.0-1ubuntu2.4
libcurl3-gnutls - 7.61.0-1ubuntu2.4
libcurl3-nss - 7.61.0-1ubuntu2.4
libcurl4 - 7.61.0-1ubuntu2.4
Ubuntu 18.04 LTS
curl - 7.58.0-2ubuntu3.7
libcurl3-gnutls - 7.58.0-2ubuntu3.7
libcurl3-nss - 7.58.0-2ubuntu3.7
libcurl4 - 7.58.0-2ubuntu3.7
Ubuntu 16.04 LTS
curl - 7.47.0-1ubuntu2.13
libcurl3 - 7.47.0-1ubuntu2.13
libcurl3-gnutls - 7.47.0-1ubuntu2.13
libcurl3-nss - 7.47.0-1ubuntu2.13

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-3992-1: WebKitGTK+ vulnerabilities

2 months ago
webkit2gtk vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
Summary

Several security issues were fixed in WebKitGTK+.

Software Description
  • webkit2gtk - Web content engine library for GTK+
Details

A large number of security issues were discovered in the WebKitGTK+ Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
libjavascriptcoregtk-4.0-18 - 2.24.2-0ubuntu0.19.04.1
libwebkit2gtk-4.0-37 - 2.24.2-0ubuntu0.19.04.1
Ubuntu 18.10
libjavascriptcoregtk-4.0-18 - 2.24.2-0ubuntu0.18.10.1
libwebkit2gtk-4.0-37 - 2.24.2-0ubuntu0.18.10.1
Ubuntu 18.04 LTS
libjavascriptcoregtk-4.0-18 - 2.24.2-0ubuntu0.18.04.1
libwebkit2gtk-4.0-37 - 2.24.2-0ubuntu0.18.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any applications that use WebKitGTK+, such as Epiphany, to make all the necessary changes.

References

USN-3566-2: PHP vulnerabilities

2 months ago
php5 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM
  • Ubuntu 12.04 ESM
Summary

Several security issues were fixed in PHP.

Software Description
  • php5 - HTML-embedded scripting language interpreter
Details

USN-3566-1 fixed several vulnerabilities in PHP. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

It was discovered that PHP incorrectly handled certain files. An attacker could possibly use this issue to access sensitive information. (CVE-2018-20783)

It was discovered that PHP incorrectly handled certain files. An attacker could possibly use this issue to access sensitive information or possibly cause a crash, resulting in a denial of service. (CVE-2019-11036)

Original advisory details:

It was discovered that PHP incorrectly handled memory when unserializing certain data. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 ESM. (CVE-2017-12933)

It was discovered that PHP incorrectly handled locale length. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 ESM. (CVE-2017-11362)

It was discovered that PHP incorrectly handled certain stream metadata. A remote attacker could possibly use this issue to set arbitrary metadata. This issue only affected Ubuntu 12.04 ESM. (CVE-2016-10712)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM
libapache2-mod-php5 - 5.5.9+dfsg-1ubuntu4.29+esm2
php5-cgi - 5.5.9+dfsg-1ubuntu4.29+esm2
php5-cli - 5.5.9+dfsg-1ubuntu4.29+esm2
php5-fpm - 5.5.9+dfsg-1ubuntu4.29+esm2
Ubuntu 12.04 ESM
libapache2-mod-php5 - 5.3.10-1ubuntu3.36
php5-cgi - 5.3.10-1ubuntu3.36
php5-cli - 5.3.10-1ubuntu3.36
php5-fpm - 5.3.10-1ubuntu3.36

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-3991-1: Firefox vulnerabilities

2 months ago
firefox vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

Firefox could be made to crash or run programs as your login if it opened a malicious website.

Software Description
  • firefox - Mozilla Open Source web browser
Details

Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, spoof the browser UI, trick the user in to launching local executable binaries, obtain sensitive information, conduct cross-site scripting (XSS) attacks, or execute arbitrary code. (CVE-2019-11691, CVE-2019-11692, CVE-2019-11693, CVE-2019-11695, CVE-2019-11696, CVE-2019-11699, CVE-2019-11701, CVE-2019-7317, CVE-2019-9800, CVE-2019-9814, CVE-2019-9817, CVE-2019-9819, CVE-2019-9820, CVE-2019-9821)

It was discovered that pressing certain key combinations could bypass addon installation prompt delays. If a user opened a specially crafted website, an attacker could potentially exploit this to trick them in to installing a malicious extension. (CVE-2019-11697)

It was discovered that history data could be exposed via drag and drop of hyperlinks to and from bookmarks. If a user were tricked in to dragging a specially crafted hyperlink to the bookmark toolbar or sidebar, and subsequently back in to the web content area, an attacker could potentially exploit this to obtain sensitive information. (CVE-2019-11698)

A type confusion bug was discovered with object groups and UnboxedObjects. If a user were tricked in to opening a specially crafted website after enabling the UnboxedObjects feature, an attacker could potentially exploit this to bypass security checks. (CVE-2019-9816)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
firefox - 67.0+build2-0ubuntu0.19.04.1
Ubuntu 18.10
firefox - 67.0+build2-0ubuntu0.18.10.1
Ubuntu 18.04 LTS
firefox - 67.0+build2-0ubuntu0.18.04.1
Ubuntu 16.04 LTS
firefox - 67.0+build2-0ubuntu0.16.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make all the necessary changes.

References

USN-3990-1: urllib3 vulnerabilities

2 months ago
python-urllib3 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

Several security issues were fixed in urllib3.

Software Description
  • python-urllib3 - HTTP library with thread-safe connection pooling for Python
Details

It was discovered that urllib3 incorrectly removed Authorization HTTP headers when handled cross-origin redirects. This could result in credentials being sent to unintended hosts. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 18.10. (CVE-2018-20060)

It was discovered that urllib3 incorrectly stripped certain characters from requests. A remote attacker could use this issue to perform CRLF injection. (CVE-2019-11236)

It was discovered that urllib3 incorrectly handled situations where a desired set of CA certificates were specified. This could result in certificates being accepted by the default CA certificates contrary to expectatons. This issue only affected Ubuntu 18.04 LTS, Ubuntu 18.10, and Ubuntu 19.04. (CVE-2019-11324)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
python-urllib3 - 1.24.1-1ubuntu0.1
python3-urllib3 - 1.24.1-1ubuntu0.1
Ubuntu 18.10
python-urllib3 - 1.22-1ubuntu0.18.10.1
python3-urllib3 - 1.22-1ubuntu0.18.10.1
Ubuntu 18.04 LTS
python-urllib3 - 1.22-1ubuntu0.18.04.1
python3-urllib3 - 1.22-1ubuntu0.18.04.1
Ubuntu 16.04 LTS
python-urllib3 - 1.13.1-2ubuntu0.16.04.3
python3-urllib3 - 1.13.1-2ubuntu0.16.04.3

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-3989-1: LibRaw vulnerabilities

2 months ago
libraw vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

Several security issues were fixed in LibRaw.

Software Description
  • libraw - raw image decoder library
Details

It was discovered that LibRaw incorrectly handled photo files. If a user or automated system were tricked into processing a specially crafted photo file, a remote attacker could cause applications linked against LibRaw to crash, resulting in a denial of service, or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.10
libraw16 - 0.18.13-1ubuntu0.1
Ubuntu 18.04 LTS
libraw16 - 0.18.8-1ubuntu0.3
Ubuntu 16.04 LTS
libraw15 - 0.17.1-1ubuntu0.5

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart your session to make all the necessary changes.

References

USN-3985-2: libvirt update

2 months 1 week ago
libvirt update

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM
Summary

Several security issues were addressed in libvirt.

Software Description
  • libvirt - Libvirt virtualization toolkit
Details

Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Giorgi Maisuradze, Dan Horea Lutas, Andrei Lutas, Volodymyr Pikhur, Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Moritz Lipp, Michael Schwarz, and Daniel Gruss discovered that memory previously stored in microarchitectural fill buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2018-12130)

Brandon Falk, Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida discovered that memory previously stored in microarchitectural load ports of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2018-12127)

Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Berk Sunar, Frank Piessens, and Yuval Yarom discovered that memory previously stored in microarchitectural store buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2018-12126)

Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Volodrmyr Pikhur, Moritz Lipp, Michael Schwarz, Daniel Gruss, Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida discovered that uncacheable memory previously stored in microarchitectural buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2019-11091)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM
libvirt-bin - 1.2.2-0ubuntu13.1.28
libvirt0 - 1.2.2-0ubuntu13.1.28

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

References

USN-3988-1: MediaInfo vulnerabilities

2 months 1 week ago
libmediainfo vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
Summary

MediaInfo could be made to crash if it opened a specially crafted file.

Software Description
  • libmediainfo - library reading metadata from media files
Details

It was discovered that MediaInfo contained multiple security issues when handling certain multimedia files. If a user were tricked into opening a crafted multimedia file, an attacker could cause MediaInfo to crash, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
libmediainfo0v5 - 18.12-1ubuntu0.1
Ubuntu 18.10
libmediainfo0v5 - 18.03.1-1ubuntu0.1
Ubuntu 18.04 LTS
libmediainfo0v5 - 17.12-1ubuntu0.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-3986-1: Wireshark vulnerabilities

2 months 1 week ago
Wireshark vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

Wireshark could be made to crash if it received specially crafted network traffic or input files.

Software Description
  • wireshark - network traffic analyzer
Details

It was discovered that Wireshark improperly handled certain input. A remote or local attacker could cause Wireshark to crash by injecting malform packets onto the wire or convincing someone to read a malformed packet trace file.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.10
libwireshark-data - 2.6.8-1~ubuntu18.10.0
libwireshark11 - 2.6.8-1~ubuntu18.10.0
libwiretap8 - 2.6.8-1~ubuntu18.10.0
libwscodecs2 - 2.6.8-1~ubuntu18.10.0
libwsutil9 - 2.6.8-1~ubuntu18.10.0
tshark - 2.6.8-1~ubuntu18.10.0
wireshark - 2.6.8-1~ubuntu18.10.0
wireshark-common - 2.6.8-1~ubuntu18.10.0
wireshark-gtk - 2.6.8-1~ubuntu18.10.0
wireshark-qt - 2.6.8-1~ubuntu18.10.0
Ubuntu 18.04 LTS
libwireshark-data - 2.6.8-1~ubuntu18.04.0
libwireshark11 - 2.6.8-1~ubuntu18.04.0
libwiretap8 - 2.6.8-1~ubuntu18.04.0
libwscodecs2 - 2.6.8-1~ubuntu18.04.0
libwsutil9 - 2.6.8-1~ubuntu18.04.0
tshark - 2.6.8-1~ubuntu18.04.0
wireshark - 2.6.8-1~ubuntu18.04.0
wireshark-common - 2.6.8-1~ubuntu18.04.0
wireshark-gtk - 2.6.8-1~ubuntu18.04.0
wireshark-qt - 2.6.8-1~ubuntu18.04.0
Ubuntu 16.04 LTS
libwireshark-data - 2.6.8-1~ubuntu16.04.0
libwireshark11 - 2.6.8-1~ubuntu16.04.0
libwiretap8 - 2.6.8-1~ubuntu16.04.0
libwscodecs2 - 2.6.8-1~ubuntu16.04.0
libwsutil9 - 2.6.8-1~ubuntu16.04.0
tshark - 2.6.8-1~ubuntu16.04.0
wireshark - 2.6.8-1~ubuntu16.04.0
wireshark-common - 2.6.8-1~ubuntu16.04.0
wireshark-gtk - 2.6.8-1~ubuntu16.04.0
wireshark-qt - 2.6.8-1~ubuntu16.04.0

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-3985-1: libvirt update

2 months 1 week ago
libvirt update

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

Several issues were addressed in libvirt.

Software Description
  • libvirt - Libvirt virtualization toolkit
Details

Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Giorgi Maisuradze, Dan Horea Lutas, Andrei Lutas, Volodymyr Pikhur, Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Moritz Lipp, Michael Schwarz, and Daniel Gruss discovered that memory previously stored in microarchitectural fill buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2018-12130)

Brandon Falk, Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida discovered that memory previously stored in microarchitectural load ports of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2018-12127)

Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Berk Sunar, Frank Piessens, and Yuval Yarom discovered that memory previously stored in microarchitectural store buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2018-12126)

Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Volodrmyr Pikhur, Moritz Lipp, Michael Schwarz, Daniel Gruss, Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida discovered that uncacheable memory previously stored in microarchitectural buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2019-11091)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
libvirt-clients - 5.0.0-1ubuntu2.1
libvirt-daemon - 5.0.0-1ubuntu2.1
libvirt0 - 5.0.0-1ubuntu2.1
Ubuntu 18.10
libvirt-clients - 4.6.0-2ubuntu3.5
libvirt-daemon - 4.6.0-2ubuntu3.5
libvirt0 - 4.6.0-2ubuntu3.5
Ubuntu 18.04 LTS
libvirt-clients - 4.0.0-1ubuntu8.10
libvirt-daemon - 4.0.0-1ubuntu8.10
libvirt0 - 4.0.0-1ubuntu8.10
Ubuntu 16.04 LTS
libvirt-bin - 1.3.1-1ubuntu10.26
libvirt0 - 1.3.1-1ubuntu10.26

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

References
Checked
1 month 3 weeks ago
Recent content on Ubuntu security notices
Subscribe to Ubuntu feed
Categrory