No Image

USN-4171-1: Apport vulnerabilities

2019-10-30 KENNETH 0

USN-4171-1: Apport vulnerabilities apport vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.10 Ubuntu 19.04 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Summary Several security issues were fixed in Apport. Software Description apport – automatically generate crash reports for debugging Details Kevin Backhouse discovered Apport would read its user-controlled settings file as the root user. This could be used by a local attacker to possibly crash Apport or have other unspecified consequences. (CVE-2019-11481) Sander Bos discovered a race-condition in Apport during core dump creation. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user. (CVE-2019-11482) Sander Bos discovered Apport mishandled crash dumps originating from containers. This could be used by a local attacker to generate a crash report for a privileged process [ more… ]

No Image

USN-4170-1: Whoopsie vulnerability

2019-10-30 KENNETH 0

USN-4170-1: Whoopsie vulnerability whoopsie vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.10 Ubuntu 19.04 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Summary Whoopsie could be made to crash, expose sensitive information or run programs if it processed a specially crafted crash report. Software Description whoopsie – Ubuntu error tracker submission Details Kevin Backhouse discovered Whoopsie incorrectly handled very large crash reports. A local attacker could possibly use this issue to cause a denial of service, expose sensitive information or execute code as the whoopsie user. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 19.10 libwhoopsie0 – 0.2.66ubuntu0.1 whoopsie – 0.2.66ubuntu0.1 Ubuntu 19.04 libwhoopsie0 – 0.2.64ubuntu0.2 whoopsie – 0.2.64ubuntu0.2 Ubuntu 18.04 LTS libwhoopsie0 – 0.2.62ubuntu0.2 whoopsie – 0.2.62ubuntu0.2 Ubuntu 16.04 LTS libwhoopsie0 – 0.2.52.5ubuntu0.2 whoopsie – 0.2.52.5ubuntu0.2 [ more… ]

No Image

USN-4169-1: libarchive vulnerability

2019-10-30 KENNETH 0

USN-4169-1: libarchive vulnerability libarchive vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.04 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Ubuntu 14.04 ESM Summary libarchive could be made to execute arbitrary code if it received specially crafted archive file. Software Description libarchive – Library to read/write archive files Details It was discovered that libarchive incorrectly handled certain archive files. An attacker could possibly execute arbitrary code. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 19.04 libarchive13 – 3.3.3-4ubuntu0.1 Ubuntu 18.04 LTS libarchive13 – 3.2.2-3.1ubuntu0.5 Ubuntu 16.04 LTS libarchive13 – 3.1.2-11ubuntu0.16.04.7 Ubuntu 14.04 ESM libarchive13 – 3.1.2-7ubuntu2.8+esm1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. In general, a standard system update will make all the necessary changes. References CVE-2019-18408 Source: USN-4169-1: libarchive vulnerability

No Image

USN-4167-2: Samba vulnerabilities

2019-10-30 KENNETH 0

USN-4167-2: Samba vulnerabilities samba vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 ESM Ubuntu 12.04 ESM Summary Several security issues were fixed in Samba. Software Description samba – SMB/CIFS file, print, and login server for Unix Details USN-4167-1 fixed several vulnerabilities in Samba. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: Michael Hanselmann discovered that the Samba client code incorrectly handled path separators. If a user were tricked into connecting to a malicious server, a remote attacker could use this issue to cause the client to access local pathnames instead of network pathnames. (CVE-2019-10218) Adam Xu discovered that Samba incorrectly handled the dirsync LDAP control. A remote attacker with "get changes" permissions could possibly use this issue to cause Samba to crash, resulting in a [ more… ]

No Image

USN-4168-1: Libidn2 vulnerabilities

2019-10-29 KENNETH 0

USN-4168-1: Libidn2 vulnerabilities libidn2 vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.04 Ubuntu 18.04 LTS Summary Several security issues were fixed in Libidn2. Software Description libidn2 – Internationalized domain names (IDNA2008/TR46) command line tool Details It was discovered that Libidn2 incorrectly handled certain inputs. A attacker could possibly use this issue to impersonate domains. (CVE-2019-12290) It was discovered that Libidn2 incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-18224) Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 19.04 idn2 – 2.0.5-1ubuntu0.3 libidn2-0 – 2.0.5-1ubuntu0.3 Ubuntu 18.04 LTS idn2 – 2.0.4-1.1ubuntu0.2 libidn2-0 – 2.0.4-1.1ubuntu0.2 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. In general, a standard system update will make all the necessary changes. References CVE-2019-12290 CVE-2019-18224 Source: [ more… ]