UbuntuSecurity

Subscribe to UbuntuSecurity feed
Updated: 41 min 7 sec ago

USN-4214-1: RabbitMQ vulnerability

Thu, 05/12/2019 - 16:15
librabbitmq vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.10
  • Ubuntu 19.04
  • Ubuntu 14.04 ESM
Summary

RabbitMQ could be made to execute arbitrary code if it received a specially crafted input.

Software Description
  • librabbitmq - Command-line utilities for interacting with AMQP servers
Details

It was discovered that RabbitMQ incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.10
amqp-tools - 0.9.0-0.2ubuntu0.19.10.1
librabbitmq4 - 0.9.0-0.2ubuntu0.19.10.1
Ubuntu 19.04
amqp-tools - 0.9.0-0.2ubuntu0.19.04.1
librabbitmq4 - 0.9.0-0.2ubuntu0.19.04.1
Ubuntu 14.04 ESM
amqp-tools - 0.4.1-1ubuntu0.1~esm1
librabbitmq1 - 0.4.1-1ubuntu0.1~esm1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Categories: Linux, Security

USN-4213-1: Squid vulnerabilities

Wed, 04/12/2019 - 19:28
squid, squid3 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.10
  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

Several security issues were fixed in Squid.

Software Description
  • squid - Web proxy cache server
  • squid3 - Web proxy cache server
Details

Jeriko One and Kristoffer Danielsson discovered that Squid incorrectly handled certain URN requests. A remote attacker could possibly use this issue to bypass access checks and access restricted servers. This issue was only addressed in Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-12523)

Jeriko One discovered that Squid incorrectly handed URN responses. A remote attacker could use this issue to cause Squid to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2019-12526)

Alex Rousskov discovered that Squid incorrectly handled certain strings. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. This issue only affected Ubuntu 19.04. (CVE-2019-12854)

Jeriko One and Kristoffer Danielsson discovered that Squid incorrectly handled certain input. A remote attacker could use this issue to cause Squid to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue was only addressed in Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-18676)

Kristoffer Danielsson discovered that Squid incorrectly handled certain messages. This issue could result in traffic being redirected to origins it should not be delivered to. (CVE-2019-18677)

Régis Leroy discovered that Squid incorrectly handled certain HTTP request headers. A remote attacker could use this to smuggle HTTP requests and corrupt caches with arbitrary content. (CVE-2019-18678)

David Fifield discovered that Squid incorrectly handled HTTP Digest Authentication. A remote attacker could possibly use this issue to obtain pointer contents and bypass ASLR protections. (CVE-2019-18679)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.10
squid - 4.8-1ubuntu2.1
Ubuntu 19.04
squid - 4.4-1ubuntu2.3
Ubuntu 18.04 LTS
squid3 - 3.5.27-1ubuntu1.4
Ubuntu 16.04 LTS
squid3 - 3.5.12-1ubuntu7.9

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Categories: Linux, Security

USN-4212-1: HAProxy vulnerability

Wed, 04/12/2019 - 14:48
haproxy vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.10
  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
Summary

HAProxy could be made to execute arbitrary code if it received a specially crafted HTTP/2 header.

Software Description
  • haproxy - fast and reliable load balancing reverse proxy
Details

Tim Düsterhus discovered that HAProxy incorrectly handled certain HTTP/2 headers. An attacker could possibly use this issue to execute arbitrary code through CRLF injection.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.10
haproxy - 2.0.5-1ubuntu0.3
Ubuntu 19.04
haproxy - 1.8.19-1ubuntu1.3
Ubuntu 18.04 LTS
haproxy - 1.8.8-1ubuntu0.9

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Categories: Linux, Security

USN-4182-4: Intel Microcode regression

Wed, 04/12/2019 - 07:45
intel-microcode regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM
Summary

USN-4182-2 introduced a regression in the Intel Microcode for some Skylake processors.

Software Description
  • intel-microcode - Processor microcode for Intel CPUs
Details

USN-4182-2 provided updated Intel Processor Microcode. A regression was discovered that caused some Skylake processors to hang after a warm reboot. This update reverts the microcode for that specific processor family.

We apologize for the inconvenience.

Original advisory details:

Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel processors using Transactional Synchronization Extensions (TSX) could expose memory contents previously stored in microarchitectural buffers to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2019-11135)

It was discovered that certain Intel Xeon processors did not properly restrict access to a voltage modulation interface. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2019-11139)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM
intel-microcode - 3.20191115.1ubuntu0.14.04.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer.

References
Categories: Linux, Security

USN-4182-3: Intel Microcode regression

Wed, 04/12/2019 - 07:37
intel-microcode regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.10
  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

USN-4182-1 introduced a regression in the Intel Microcode for some Skylake processors.

Software Description
  • intel-microcode - Processor microcode for Intel CPUs
Details

USN-4182-1 provided updated Intel Processor Microcode. A regression was discovered that caused some Skylake processors to hang after a warm reboot. This update reverts the microcode for that specific processor family.

We apologize for the inconvenience.

Original advisory details:

Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel processors using Transactional Synchronization Extensions (TSX) could expose memory contents previously stored in microarchitectural buffers to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2019-11135)

It was discovered that certain Intel Xeon processors did not properly restrict access to a voltage modulation interface. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2019-11139)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.10
intel-microcode - 3.20191115.1ubuntu0.19.10.2
Ubuntu 19.04
intel-microcode - 3.20191115.1ubuntu0.19.04.2
Ubuntu 18.04 LTS
intel-microcode - 3.20191115.1ubuntu0.18.04.2
Ubuntu 16.04 LTS
intel-microcode - 3.20191115.1ubuntu0.16.04.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer.

References
Categories: Linux, Security

USN-4194-2: postgresql-common vulnerability

Tue, 03/12/2019 - 20:34
postgresql-common vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM
Summary

postgresql-common could be made to create arbitrary directories.

Software Description
  • postgresql-common - PostgreSQL database-cluster manager
Details

USN-4194-1 fixed a vulnerability in postgresql-common. This update provides the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

Rich Mirch discovered that the postgresql-common pg_ctlcluster script incorrectly handled directory creation. A local attacker could possibly use this issue to escalate privileges.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM
postgresql-common - 154ubuntu1.1+esm1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Categories: Linux, Security

USN-4207-1: GraphicsMagick vulnerabilities

Tue, 03/12/2019 - 15:44
graphicsmagick vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.04 LTS
Summary

Several security issues were fixed in GraphicsMagick.

Software Description
  • graphicsmagick - collection of image processing tools
Details

It was discovered that GraphicsMagick incorrectly handled certain image files. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04 LTS
graphicsmagick - 1.3.28-2ubuntu0.1
libgraphicsmagick++-q16-12 - 1.3.28-2ubuntu0.1
libgraphicsmagick-q16-3 - 1.3.28-2ubuntu0.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Categories: Linux, Security

USN-4211-2: Linux kernel (Xenial HWE) vulnerabilities

Tue, 03/12/2019 - 04:52
linux-lts-xenial, linux-aws vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM
Summary

Several security issues were fixed in the Linux kernel.

Software Description
  • linux-aws - Linux kernel for Amazon Web Services (AWS) systems
  • linux-lts-xenial - Linux hardware enablement kernel from Xenial for Trusty
Details

USN-4211-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 ESM.

Zhipeng Xie discovered that an infinite loop could be triggered in the CFS Linux kernel process scheduler. A local attacker could possibly use this to cause a denial of service. (CVE-2018-20784)

Nicolas Waisman discovered that the WiFi driver stack in the Linux kernel did not properly validate SSID lengths. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2019-17133)

Nicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for the Linux kernel performed DMA from a kernel stack. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-17075)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM
linux-image-4.4.0-1059-aws - 4.4.0-1059.63
linux-image-4.4.0-170-generic - 4.4.0-170.199~14.04.1
linux-image-4.4.0-170-generic-lpae - 4.4.0-170.199~14.04.1
linux-image-4.4.0-170-lowlatency - 4.4.0-170.199~14.04.1
linux-image-4.4.0-170-powerpc-e500mc - 4.4.0-170.199~14.04.1
linux-image-4.4.0-170-powerpc-smp - 4.4.0-170.199~14.04.1
linux-image-4.4.0-170-powerpc64-emb - 4.4.0-170.199~14.04.1
linux-image-4.4.0-170-powerpc64-smp - 4.4.0-170.199~14.04.1
linux-image-aws - 4.4.0.1059.60
linux-image-generic-lpae-lts-xenial - 4.4.0.170.149
linux-image-generic-lts-xenial - 4.4.0.170.149
linux-image-lowlatency-lts-xenial - 4.4.0.170.149
linux-image-powerpc-e500mc-lts-xenial - 4.4.0.170.149
linux-image-powerpc-smp-lts-xenial - 4.4.0.170.149
linux-image-powerpc64-emb-lts-xenial - 4.4.0.170.149
linux-image-powerpc64-smp-lts-xenial - 4.4.0.170.149
linux-image-virtual-lts-xenial - 4.4.0.170.149

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

References
Categories: Linux, Security

USN-4211-1: Linux kernel vulnerabilities

Tue, 03/12/2019 - 04:17
linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS
Summary

Several security issues were fixed in the Linux kernel.

Software Description
  • linux - Linux kernel
  • linux-aws - Linux kernel for Amazon Web Services (AWS) systems
  • linux-kvm - Linux kernel for cloud environments
  • linux-raspi2 - Linux kernel for Raspberry Pi 2
  • linux-snapdragon - Linux kernel for Snapdragon processors
Details

Zhipeng Xie discovered that an infinite loop could be triggered in the CFS Linux kernel process scheduler. A local attacker could possibly use this to cause a denial of service. (CVE-2018-20784)

Nicolas Waisman discovered that the WiFi driver stack in the Linux kernel did not properly validate SSID lengths. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2019-17133)

Nicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for the Linux kernel performed DMA from a kernel stack. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-17075)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04 LTS
linux-image-4.4.0-1063-kvm - 4.4.0-1063.70
linux-image-4.4.0-1099-aws - 4.4.0-1099.110
linux-image-4.4.0-1126-raspi2 - 4.4.0-1126.135
linux-image-4.4.0-1130-snapdragon - 4.4.0-1130.138
linux-image-4.4.0-170-generic - 4.4.0-170.199
linux-image-4.4.0-170-generic-lpae - 4.4.0-170.199
linux-image-4.4.0-170-lowlatency - 4.4.0-170.199
linux-image-4.4.0-170-powerpc-e500mc - 4.4.0-170.199
linux-image-4.4.0-170-powerpc-smp - 4.4.0-170.199
linux-image-4.4.0-170-powerpc64-emb - 4.4.0-170.199
linux-image-4.4.0-170-powerpc64-smp - 4.4.0-170.199
linux-image-aws - 4.4.0.1099.103
linux-image-generic - 4.4.0.170.178
linux-image-generic-lpae - 4.4.0.170.178
linux-image-kvm - 4.4.0.1063.63
linux-image-lowlatency - 4.4.0.170.178
linux-image-powerpc-e500mc - 4.4.0.170.178
linux-image-powerpc-smp - 4.4.0.170.178
linux-image-powerpc64-emb - 4.4.0.170.178
linux-image-powerpc64-smp - 4.4.0.170.178
linux-image-raspi2 - 4.4.0.1126.126
linux-image-snapdragon - 4.4.0.1130.122
linux-image-virtual - 4.4.0.170.178

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

References
Categories: Linux, Security

USN-4210-1: Linux kernel vulnerabilities

Tue, 03/12/2019 - 03:00
linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

Several security issues were fixed in the Linux kernel.

Software Description
  • linux - Linux kernel
  • linux-aws - Linux kernel for Amazon Web Services (AWS) systems
  • linux-gke-4.15 - Linux kernel for Google Container Engine (GKE) systems
  • linux-kvm - Linux kernel for cloud environments
  • linux-oem - Linux kernel for OEM processors
  • linux-oracle - Linux kernel for Oracle Cloud systems
  • linux-raspi2 - Linux kernel for Raspberry Pi 2
  • linux-snapdragon - Linux kernel for Snapdragon processors
  • linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE) systems
  • linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
  • linux-hwe - Linux hardware enablement (HWE) kernel
Details

It was discovered that a buffer overflow existed in the 802.11 Wi-Fi configuration interface for the Linux kernel when handling beacon settings. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-16746)

Nicolas Waisman discovered that the WiFi driver stack in the Linux kernel did not properly validate SSID lengths. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2019-17133)

It was discovered that the ADIS16400 IIO IMU Driver for the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-19060)

It was discovered that the Intel OPA Gen1 Infiniband Driver for the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-19065)

It was discovered that the Cascoda CA8210 SPI 802.15.4 wireless controller driver for the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-19075)

Nicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for the Linux kernel performed DMA from a kernel stack. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-17075)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04 LTS
linux-image-4.15.0-1030-oracle - 4.15.0-1030.33
linux-image-4.15.0-1049-gke - 4.15.0-1049.52
linux-image-4.15.0-1051-kvm - 4.15.0-1051.51
linux-image-4.15.0-1052-raspi2 - 4.15.0-1052.56
linux-image-4.15.0-1056-aws - 4.15.0-1056.58
linux-image-4.15.0-1065-oem - 4.15.0-1065.75
linux-image-4.15.0-1069-snapdragon - 4.15.0-1069.76
linux-image-4.15.0-72-generic - 4.15.0-72.81
linux-image-4.15.0-72-generic-lpae - 4.15.0-72.81
linux-image-4.15.0-72-lowlatency - 4.15.0-72.81
linux-image-aws - 4.15.0.1056.57
linux-image-aws-lts-18.04 - 4.15.0.1056.57
linux-image-generic - 4.15.0.72.74
linux-image-generic-lpae - 4.15.0.72.74
linux-image-gke - 4.15.0.1049.52
linux-image-gke-4.15 - 4.15.0.1049.52
linux-image-kvm - 4.15.0.1051.51
linux-image-lowlatency - 4.15.0.72.74
linux-image-oem - 4.15.0.1065.69
linux-image-oracle - 4.15.0.1030.35
linux-image-oracle-lts-18.04 - 4.15.0.1030.35
linux-image-powerpc-e500mc - 4.15.0.72.74
linux-image-powerpc-smp - 4.15.0.72.74
linux-image-powerpc64-emb - 4.15.0.72.74
linux-image-powerpc64-smp - 4.15.0.72.74
linux-image-raspi2 - 4.15.0.1052.50
linux-image-snapdragon - 4.15.0.1069.72
linux-image-virtual - 4.15.0.72.74
Ubuntu 16.04 LTS
linux-image-4.15.0-1030-oracle - 4.15.0-1030.33~16.04.1
linux-image-4.15.0-1050-gcp - 4.15.0-1050.53
linux-image-4.15.0-1056-aws - 4.15.0-1056.58~16.04.1
linux-image-4.15.0-72-generic - 4.15.0-72.81~16.04.1
linux-image-4.15.0-72-generic-lpae - 4.15.0-72.81~16.04.1
linux-image-4.15.0-72-lowlatency - 4.15.0-72.81~16.04.1
linux-image-aws-hwe - 4.15.0.1056.56
linux-image-gcp - 4.15.0.1050.64
linux-image-generic-hwe-16.04 - 4.15.0.72.92
linux-image-generic-lpae-hwe-16.04 - 4.15.0.72.92
linux-image-gke - 4.15.0.1050.64
linux-image-lowlatency-hwe-16.04 - 4.15.0.72.92
linux-image-oem - 4.15.0.72.92
linux-image-oracle - 4.15.0.1030.23
linux-image-virtual-hwe-16.04 - 4.15.0.72.92

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

References
Categories: Linux, Security

USN-4209-1: Linux kernel vulnerabilities

Tue, 03/12/2019 - 01:45
linux, linux-aws, linux-aws-5.0, linux-gcp, linux-gke-5.0, linux-hwe, linux-kvm, linux-oem-osp1, linux-oracle, linux-oracle-5.0, linux-raspi2 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
Summary

Several security issues were fixed in the Linux kernel.

Software Description
  • linux - Linux kernel
  • linux-aws - Linux kernel for Amazon Web Services (AWS) systems
  • linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
  • linux-kvm - Linux kernel for cloud environments
  • linux-oracle - Linux kernel for Oracle Cloud systems
  • linux-raspi2 - Linux kernel for Raspberry Pi 2
  • linux-aws-5.0 - Linux kernel for Amazon Web Services (AWS) systems
  • linux-gke-5.0 - Linux kernel for Google Container Engine (GKE) systems
  • linux-hwe - Linux hardware enablement (HWE) kernel
  • linux-oem-osp1 - Linux kernel for OEM processors
  • linux-oracle-5.0 - Linux kernel for Oracle Cloud systems
Details

Jann Horn discovered that the OverlayFS and ShiftFS Drivers in the Linux kernel did not properly handle reference counting during memory mapping operations when used in conjunction with AUFS. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-15794)

It was discovered that a buffer overflow existed in the 802.11 Wi-Fi configuration interface for the Linux kernel when handling beacon settings. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-16746)

It was discovered that there was a memory leak in the Advanced Buffer Management functionality of the Netronome NFP4000/NFP6000 NIC Driver in the Linux kernel during certain error scenarios. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-19076)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
linux-image-5.0.0-1008-oracle - 5.0.0-1008.13
linux-image-5.0.0-1022-aws - 5.0.0-1022.25
linux-image-5.0.0-1023-kvm - 5.0.0-1023.25
linux-image-5.0.0-1023-raspi2 - 5.0.0-1023.24
linux-image-5.0.0-1026-gcp - 5.0.0-1026.27
linux-image-5.0.0-37-generic - 5.0.0-37.40
linux-image-5.0.0-37-generic-lpae - 5.0.0-37.40
linux-image-5.0.0-37-lowlatency - 5.0.0-37.40
linux-image-aws - 5.0.0.1022.24
linux-image-gcp - 5.0.0.1026.51
linux-image-generic - 5.0.0.37.39
linux-image-generic-lpae - 5.0.0.37.39
linux-image-gke - 5.0.0.1026.51
linux-image-kvm - 5.0.0.1023.24
linux-image-lowlatency - 5.0.0.37.39
linux-image-oracle - 5.0.0.1008.34
linux-image-raspi2 - 5.0.0.1023.21
linux-image-virtual - 5.0.0.37.39
Ubuntu 18.04 LTS
linux-image-5.0.0-1008-oracle - 5.0.0-1008.13~18.04.1
linux-image-5.0.0-1022-aws - 5.0.0-1022.25~18.04.1
linux-image-5.0.0-1026-gcp - 5.0.0-1026.27~18.04.1
linux-image-5.0.0-1026-gke - 5.0.0-1026.27~18.04.2
linux-image-5.0.0-1030-oem-osp1 - 5.0.0-1030.34
linux-image-5.0.0-37-generic - 5.0.0-37.40~18.04.1
linux-image-5.0.0-37-generic-lpae - 5.0.0-37.40~18.04.1
linux-image-5.0.0-37-lowlatency - 5.0.0-37.40~18.04.1
linux-image-aws-edge - 5.0.0.1022.36
linux-image-gcp - 5.0.0.1026.30
linux-image-generic-hwe-18.04 - 5.0.0.37.95
linux-image-generic-lpae-hwe-18.04 - 5.0.0.37.95
linux-image-gke-5.0 - 5.0.0.1026.15
linux-image-lowlatency-hwe-18.04 - 5.0.0.37.95
linux-image-oem-osp1 - 5.0.0.1030.34
linux-image-oracle-edge - 5.0.0.1008.7
linux-image-snapdragon-hwe-18.04 - 5.0.0.37.95
linux-image-virtual-hwe-18.04 - 5.0.0.37.95

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

References
Categories: Linux, Security

USN-4208-1: Linux kernel vulnerabilities

Tue, 03/12/2019 - 01:37
linux, linux-aws, linux-gcp, linux-gcp-5.3, linux-kvm, linux-oracle vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.10
  • Ubuntu 18.04 LTS
Summary

Several security issues were fixed in the Linux kernel.

Software Description
  • linux - Linux kernel
  • linux-aws - Linux kernel for Amazon Web Services (AWS) systems
  • linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
  • linux-kvm - Linux kernel for cloud environments
  • linux-oracle - Linux kernel for Oracle Cloud systems
  • linux-gcp-5.3 - Linux kernel for Google Cloud Platform (GCP) systems
Details

Jann Horn discovered that the OverlayFS and ShiftFS Drivers in the Linux kernel did not properly handle reference counting during memory mapping operations when used in conjunction with AUFS. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-15794)

Nicolas Waisman discovered that the WiFi driver stack in the Linux kernel did not properly validate SSID lengths. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2019-17133)

It was discovered that the ARM Komeda display driver for the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-18810)

It was discovered that the VirtualBox guest driver implementation in the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-19048)

It was discovered that the ADIS16400 IIO IMU Driver for the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-19060, CVE-2019-19061)

It was discovered that the Intel OPA Gen1 Infiniband Driver for the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-19065)

It was discovered that the AMD Audio CoProcessor Driver for the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker with the ability to load modules could use this to cause a denial of service (memory exhaustion). (CVE-2019-19067)

It was discovered in the Qualcomm FastRPC Driver for the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-19069)

It was discovered that the Cascoda CA8210 SPI 802.15.4 wireless controller driver for the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-19075)

It was discovered that the AMD Display Engine Driver in the Linux kernel did not properly deallocate memory in certain error conditions. A local attack could use this to cause a denial of service (memory exhaustion). (CVE-2019-19083)

Nicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for the Linux kernel performed DMA from a kernel stack. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-17075)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.10
linux-image-5.3.0-1007-oracle - 5.3.0-1007.8
linux-image-5.3.0-1008-aws - 5.3.0-1008.9
linux-image-5.3.0-1008-kvm - 5.3.0-1008.9
linux-image-5.3.0-1009-gcp - 5.3.0-1009.10
linux-image-5.3.0-24-generic - 5.3.0-24.26
linux-image-5.3.0-24-generic-lpae - 5.3.0-24.26
linux-image-5.3.0-24-lowlatency - 5.3.0-24.26
linux-image-5.3.0-24-snapdragon - 5.3.0-24.26
linux-image-aws - 5.3.0.1008.10
linux-image-gcp - 5.3.0.1009.10
linux-image-generic - 5.3.0.24.28
linux-image-generic-lpae - 5.3.0.24.28
linux-image-gke - 5.3.0.1009.10
linux-image-kvm - 5.3.0.1008.10
linux-image-lowlatency - 5.3.0.24.28
linux-image-oracle - 5.3.0.1007.8
linux-image-snapdragon - 5.3.0.24.28
linux-image-virtual - 5.3.0.24.28
Ubuntu 18.04 LTS
linux-image-5.3.0-1009-gcp - 5.3.0-1009.10~18.04.1
linux-image-gcp-edge - 5.3.0.1009.9

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

References
Categories: Linux, Security

USN-4206-1: GraphicsMagick vulnerabilities

Mon, 02/12/2019 - 21:46
graphicsmagick vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS
Summary

Several security issues were fixed in GraphicsMagick.

Software Description
  • graphicsmagick - collection of image processing tools
Details

It was discovered that GraphicsMagick incorrectly handled certain image files. An attacker could possibly use this issue to cause a denial of service. (CVE-2017-10794, CVE-2017-10799, CVE-2017-11102, CVE-2017-11140, CVE-2017-11403, CVE-2017-11636, CVE-2017-11637, CVE-2017-13147, CVE-2017-14042, CVE-2017-6335)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04 LTS
graphicsmagick - 1.3.23-1ubuntu0.2
libgraphicsmagick++-q16-12 - 1.3.23-1ubuntu0.2
libgraphicsmagick-q16-3 - 1.3.23-1ubuntu0.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Categories: Linux, Security

USN-4205-1: SQLite vulnerabilities

Mon, 02/12/2019 - 14:30
sqlite3 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.10
  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
  • Ubuntu 12.04 ESM
Summary

Several security issues were fixed in SQLite.

Software Description
  • sqlite3 - C library that implements an SQL database engine
Details

It was discovered that SQLite incorrectly handled certain schemas. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 12.04 ESM. (CVE-2018-8740)

It was discovered that SQLite incorrectly handled certain schemas. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 19.04. (CVE-2019-16168)

It was discovered that SQLite incorrectly handled certain schemas. An attacker could possibly use this issue to mishandles some expressions. This issue only affected Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-19242)

It was discovered that SQLite incorrectly handled certain queries. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-19244)

It was discovered that SQLite incorrectly handled certain SQL commands. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 19.04. (CVE-2019-5018)

It was discovered that SQLite incorrectly handled certain commands. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-5827)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.10
libsqlite3-0 - 3.29.0-2ubuntu0.1
sqlite3 - 3.29.0-2ubuntu0.1
Ubuntu 19.04
libsqlite3-0 - 3.27.2-2ubuntu0.2
sqlite3 - 3.27.2-2ubuntu0.2
Ubuntu 18.04 LTS
libsqlite3-0 - 3.22.0-1ubuntu0.2
sqlite3 - 3.22.0-1ubuntu0.2
Ubuntu 16.04 LTS
libsqlite3-0 - 3.11.0-1ubuntu1.3
sqlite3 - 3.11.0-1ubuntu1.3
Ubuntu 12.04 ESM
libsqlite3-0 - 3.7.9-2ubuntu1.4
sqlite3 - 3.7.9-2ubuntu1.4

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Categories: Linux, Security

USN-4204-1: psutil vulnerability

Thu, 28/11/2019 - 14:44
python-psutil vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.10
  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

psutil could be made to crash or run programs.

Software Description
  • python-psutil - module providing convenience functions for managing processes
Details

Riccardo Schirone discovered that psutil incorrectly handled certain reference counting operations. An attacker could use this issue to cause psutil to crash, resulting in a denial of service, or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.10
python-psutil - 5.5.1-1ubuntu0.19.10.1
python3-psutil - 5.5.1-1ubuntu0.19.10.1
Ubuntu 19.04
python-psutil - 5.5.1-1ubuntu0.19.04.1
python3-psutil - 5.5.1-1ubuntu0.19.04.1
Ubuntu 18.04 LTS
python-psutil - 5.4.2-1ubuntu0.1
python3-psutil - 5.4.2-1ubuntu0.1
Ubuntu 16.04 LTS
python-psutil - 3.4.2-1ubuntu0.1
python3-psutil - 3.4.2-1ubuntu0.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Categories: Linux, Security

USN-4203-2: NSS vulnerability

Wed, 27/11/2019 - 20:23
nss vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM
  • Ubuntu 12.04 ESM
Summary

NSS could be made to crash or run programs if it received specially crafted input.

Software Description
  • nss - Network Security Service library
Details

USN-4203-1 fixed a vulnerability in NSS. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that NSS incorrectly handled certain memory operations. A remote attacker could use this issue to cause NSS to crash, resulting in a denial of service, or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM
libnss3 - 2:3.28.4-0ubuntu0.14.04.5+esm2
Ubuntu 12.04 ESM
libnss3 - 2:3.28.4-0ubuntu0.12.04.5

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart any applications that use NSS, such as Evolution, to make all the necessary changes.

References
Categories: Linux, Security

USN-4203-1: NSS vulnerability

Wed, 27/11/2019 - 18:55
nss vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.10
  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

NSS could be made to crash or run programs if it received specially crafted input.

Software Description
  • nss - Network Security Service library
Details

It was discovered that NSS incorrectly handled certain memory operations. A remote attacker could use this issue to cause NSS to crash, resulting in a denial of service, or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.10
libnss3 - 2:3.45-1ubuntu2.1
Ubuntu 19.04
libnss3 - 2:3.42-1ubuntu2.3
Ubuntu 18.04 LTS
libnss3 - 2:3.35-2ubuntu2.5
Ubuntu 16.04 LTS
libnss3 - 2:3.28.4-0ubuntu0.16.04.8

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart any applications that use NSS, such as Evolution, to make all the necessary changes.

References
Categories: Linux, Security

USN-4202-1: Thunderbird vulnerabilities

Wed, 27/11/2019 - 01:47
thunderbird vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.10
  • Ubuntu 18.04 LTS
Summary

Several security issues were fixed in Thunderbird.

Software Description
  • thunderbird - Mozilla Open Source mail and newsgroup client
Details

It was discovered that a specially crafted S/MIME message with an inner encryption layer could be displayed as having a valid signature in some circumstances, even if the signer had no access to the encrypted message. An attacker could potentially exploit this to spoof the message author. (CVE-2019-11755)

Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, bypass security restrictions, bypass same-origin restrictions, conduct cross-site scripting (XSS) attacks, or execute arbitrary code. (CVE-2019-11757, CVE-2019-11758, CVE-2019-11759, CVE-2019-11760, CVE-2019-11761, CVE-2019-11762, CVE-2019-11763, CVE-2019-11764)

A heap overflow was discovered in the expat library in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit this to cause a denial of service, or execute arbitrary code. (CVE-2019-15903)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.10
thunderbird - 1:68.2.1+build1-0ubuntu0.19.10.1
Ubuntu 18.04 LTS
thunderbird - 1:68.2.1+build1-0ubuntu0.18.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Thunderbird to make all the necessary changes.

References
Categories: Linux, Security

USN-4201-1: Ruby vulnerabilities

Tue, 26/11/2019 - 16:48
ruby2.3, ruby2.5 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.10
  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

Several security issues were fixed in Ruby.

Software Description
  • ruby2.5 - Interpreter of object-oriented scripting language Ruby
  • ruby2.3 - Object-oriented scripting language
Details

It was discovered that Ruby incorrectly handled certain files. An attacker could possibly use this issue to pass path matching what can lead to an unauthorized access. (CVE-2019-15845)

It was discovered that Ruby incorrectly handled certain regular expressions. An attacker could use this issue to cause a denial of service. (CVE-2019-16201)

It was discovered that Ruby incorrectly handled certain HTTP headers. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-16254)

It was discovered that Ruby incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-16255)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.10
libruby2.5 - 2.5.5-4ubuntu2.1
ruby2.5 - 2.5.5-4ubuntu2.1
Ubuntu 19.04
libruby2.5 - 2.5.5-1ubuntu1.1
ruby2.5 - 2.5.5-1ubuntu1.1
Ubuntu 18.04 LTS
libruby2.5 - 2.5.1-1ubuntu1.6
ruby2.5 - 2.5.1-1ubuntu1.6
Ubuntu 16.04 LTS
libruby2.3 - 2.3.1-2~ubuntu16.04.14
ruby2.3 - 2.3.1-2~ubuntu16.04.14

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Categories: Linux, Security

USN-4200-1: Redmine vulnerabilities

Tue, 26/11/2019 - 02:49
redmine vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

Several security issues were fixed in redmine.

Software Description
  • redmine - flexible project management web application
Details

It was discovered that Redmine incorrectly handle certain inputs that could cause textile formatting errors. An attacker could possibly use this issue to cause a XSS attack. (CVE-2019-17427)

It was discovered that an SQL injection could allow users to access protected information via a crafted object query. (CVE-2019-18890)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
redmine - 4.0.1-2ubuntu0.1
redmine-mysql - 4.0.1-2ubuntu0.1
redmine-pgsql - 4.0.1-2ubuntu0.1
redmine-sqlite - 4.0.1-2ubuntu0.1
Ubuntu 18.04 LTS
redmine - 3.4.4-1ubuntu0.1
redmine-mysql - 3.4.4-1ubuntu0.1
redmine-pgsql - 3.4.4-1ubuntu0.1
redmine-sqlite - 3.4.4-1ubuntu0.1
Ubuntu 16.04 LTS
redmine - 3.2.1-2ubuntu0.2
redmine-mysql - 3.2.1-2ubuntu0.2
redmine-pgsql - 3.2.1-2ubuntu0.2
redmine-sqlite - 3.2.1-2ubuntu0.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Categories: Linux, Security

Pages