No Image

USN-4214-1: RabbitMQ vulnerability

2019-12-05 KENNETH 0

USN-4214-1: RabbitMQ vulnerability librabbitmq vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.10 Ubuntu 19.04 Ubuntu 14.04 ESM Summary RabbitMQ could be made to execute arbitrary code if it received a specially crafted input. Software Description librabbitmq – Command-line utilities for interacting with AMQP servers Details It was discovered that RabbitMQ incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 19.10 amqp-tools – 0.9.0-0.2ubuntu0.19.10.1 librabbitmq4 – 0.9.0-0.2ubuntu0.19.10.1 Ubuntu 19.04 amqp-tools – 0.9.0-0.2ubuntu0.19.04.1 librabbitmq4 – 0.9.0-0.2ubuntu0.19.04.1 Ubuntu 14.04 ESM amqp-tools – 0.4.1-1ubuntu0.1~esm1 librabbitmq1 – 0.4.1-1ubuntu0.1~esm1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. In general, a standard system update will make all the necessary changes. References CVE-2019-18609 Source: USN-4214-1: RabbitMQ vulnerability

No Image

USN-4213-1: Squid vulnerabilities

2019-12-05 KENNETH 0

USN-4213-1: Squid vulnerabilities squid, squid3 vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.10 Ubuntu 19.04 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Summary Several security issues were fixed in Squid. Software Description squid – Web proxy cache server squid3 – Web proxy cache server Details Jeriko One and Kristoffer Danielsson discovered that Squid incorrectly handled certain URN requests. A remote attacker could possibly use this issue to bypass access checks and access restricted servers. This issue was only addressed in Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-12523) Jeriko One discovered that Squid incorrectly handed URN responses. A remote attacker could use this issue to cause Squid to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2019-12526) Alex Rousskov discovered that Squid incorrectly handled certain strings. A remote attacker could possibly use this [ more… ]

No Image

USN-4212-1: HAProxy vulnerability

2019-12-04 KENNETH 0

USN-4212-1: HAProxy vulnerability haproxy vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.10 Ubuntu 19.04 Ubuntu 18.04 LTS Summary HAProxy could be made to execute arbitrary code if it received a specially crafted HTTP/2 header. Software Description haproxy – fast and reliable load balancing reverse proxy Details Tim Düsterhus discovered that HAProxy incorrectly handled certain HTTP/2 headers. An attacker could possibly use this issue to execute arbitrary code through CRLF injection. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 19.10 haproxy – 2.0.5-1ubuntu0.3 Ubuntu 19.04 haproxy – 1.8.19-1ubuntu1.3 Ubuntu 18.04 LTS haproxy – 1.8.8-1ubuntu0.9 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. In general, a standard system update will make all the necessary changes. References CVE-2019-19330 Source: USN-4212-1: HAProxy vulnerability

No Image

USN-4182-4: Intel Microcode regression

2019-12-04 KENNETH 0

USN-4182-4: Intel Microcode regression intel-microcode regression A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 ESM Summary USN-4182-2 introduced a regression in the Intel Microcode for some Skylake processors. Software Description intel-microcode – Processor microcode for Intel CPUs Details USN-4182-2 provided updated Intel Processor Microcode. A regression was discovered that caused some Skylake processors to hang after a warm reboot. This update reverts the microcode for that specific processor family. We apologize for the inconvenience. Original advisory details: Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel processors using Transactional Synchronization Extensions (TSX) could expose memory contents previously stored in microarchitectural buffers to a malicious process that is executing on the same CPU core. A [ more… ]

No Image

USN-4182-3: Intel Microcode regression

2019-12-04 KENNETH 0

USN-4182-3: Intel Microcode regression intel-microcode regression A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.10 Ubuntu 19.04 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Summary USN-4182-1 introduced a regression in the Intel Microcode for some Skylake processors. Software Description intel-microcode – Processor microcode for Intel CPUs Details USN-4182-1 provided updated Intel Processor Microcode. A regression was discovered that caused some Skylake processors to hang after a warm reboot. This update reverts the microcode for that specific processor family. We apologize for the inconvenience. Original advisory details: Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel processors using Transactional Synchronization Extensions (TSX) could expose memory contents previously stored in microarchitectural buffers to a malicious process that is [ more… ]