No Image

USN-4315-1: Apport vulnerabilities

2020-04-02 KENNETH 0

USN-4315-1: Apport vulnerabilities apport vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.10 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Summary Several security issues were fixed in Apport. Software Description apport – automatically generate crash reports for debugging Details Maximilien Bourgeteau discovered that the Apport lock file was created with insecure permissions. This could allow a local attacker to escalate their privileges via a symlink attack. (CVE-2020-8831) Maximilien Bourgeteau discovered a race condition in Apport when setting crash report permissions. This could allow a local attacker to read arbitrary files via a symlink attack. (CVE-2020-8833) Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 19.10 apport – 2.20.11-0ubuntu8.8 python-apport – 2.20.11-0ubuntu8.8 python3-apport – 2.20.11-0ubuntu8.8 Ubuntu 18.04 LTS apport – 2.20.9-0ubuntu7.14 python-apport – 2.20.9-0ubuntu7.14 python3-apport – 2.20.9-0ubuntu7.14 Ubuntu 16.04 [ more… ]

No Image

USN-4314-1: pam-krb5 vulnerability

2020-03-31 KENNETH 0

USN-4314-1: pam-krb5 vulnerability libpam-krb5 vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.10 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Ubuntu 14.04 ESM Ubuntu 12.04 ESM Summary pam-krb5 could be made to execute arbitrary code if it received a specially crafted response. Software Description libpam-krb5 – PAM module for MIT Kerberos Details Russ Allbery discovered that pam-krb5 incorrectly handled some responses. An attacker could possibly use this issue to execute arbitrary code. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 19.10 libpam-krb5 – 4.8-2ubuntu0.1 Ubuntu 18.04 LTS libpam-krb5 – 4.8-1ubuntu0.1 Ubuntu 16.04 LTS libpam-krb5 – 4.7-2ubuntu0.1 Ubuntu 14.04 ESM libpam-krb5 – 4.6-2ubuntu0.1~esm1 Ubuntu 12.04 ESM libpam-krb5 – 4.5-3ubuntu0.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. In general, a standard system update will make all the [ more… ]

No Image

USN-4313-1: Linux kernel vulnerability

2020-03-31 KENNETH 0

USN-4313-1: Linux kernel vulnerability linux, linux-aws, linux-azure, linux-azure-5.3, linux-gcp, linux-gcp-5.3, linux-gke-5.3, linux-hwe, linux-kvm, linux-oracle, linux-oracle-5.3, linux-raspi2, linux-raspi2-5.3 vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.10 Ubuntu 18.04 LTS Summary The system could be made to expose sensitive information or run programs as an administrator. Software Description linux – Linux kernel linux-aws – Linux kernel for Amazon Web Services (AWS) systems linux-azure – Linux kernel for Microsoft Azure Cloud systems linux-gcp – Linux kernel for Google Cloud Platform (GCP) systems linux-kvm – Linux kernel for cloud environments linux-oracle – Linux kernel for Oracle Cloud systems linux-raspi2 – Linux kernel for Raspberry Pi 2 linux-azure-5.3 – Linux kernel for Microsoft Azure Cloud systems linux-gcp-5.3 – Linux kernel for Google Cloud Platform (GCP) systems linux-gke-5.3 – Linux kernel for Google Container Engine (GKE) systems linux-hwe – Linux [ more… ]

No Image

USN-4311-1: BlueZ vulnerabilities

2020-03-31 KENNETH 0

USN-4311-1: BlueZ vulnerabilities bluez vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.10 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Summary Several security issues were fixed in BlueZ. Software Description bluez – Bluetooth tools and daemons Details It was discovered that BlueZ incorrectly handled bonding HID and HOGP devices. A local attacker could possibly use this issue to impersonate non-bonded devices. (CVE-2020-0556) It was discovered that BlueZ incorrectly handled certain commands. A local attacker could use this issue to cause BlueZ to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-7837) Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 19.10 bluez – 5.50-0ubuntu5.1 libbluetooth3 – 5.50-0ubuntu5.1 Ubuntu 18.04 LTS bluez – 5.48-0ubuntu3.4 libbluetooth3 – 5.48-0ubuntu3.4 Ubuntu [ more… ]

No Image

USN-4312-1: Timeshift vulnerability

2020-03-30 KENNETH 0

USN-4312-1: Timeshift vulnerability Timeshift vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 19.10 Summary Timeshift could be made to run programs as an administrator. Software Description timeshift – System restore utility Details Matthias Gerstner discovered that Timeshift did not securely create temporary files. An attacker could exploit a race condition in Timeshift and potentially execute arbitrary commands as root. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 19.10 timeshift – 19.01+ds-2ubuntu0.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. In general, a standard system update will make all the necessary changes. References CVE-2020-10174 Source: USN-4312-1: Timeshift vulnerability