You are here

Hírolvasó

USN-3485-3: Linux kernel (AWS) vulnerabilities

Ubuntu security notices - 2017.11.21, k - 22:24
Ubuntu Security Notice USN-3485-3

21st November, 2017

linux-aws vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS
Summary

Several security issues were fixed in the Linux kernel.

Software description
  • linux-aws - Linux kernel for Amazon Web Services (AWS) systems
Details

It was discovered that a race condition existed in the ALSA subsystem of
the Linux kernel when creating and deleting a port via ioctl(). A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2017-15265)

Eric Biggers discovered that the key management subsystem in the Linux
kernel did not properly restrict adding a key that already exists but is
uninstantiated. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2017-15299)

It was discovered that a race condition existed in the packet fanout
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-15649)

Eric Biggers discovered a race condition in the key management subsystem of
the Linux kernel around keys in a negative state. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-15951)

Andrey Konovalov discovered a use-after-free vulnerability in the USB
serial console driver in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2017-16525)

Andrey Konovalov discovered that the Ultra Wide Band driver in the Linux
kernel did not properly check for an error condition. A physically
proximate attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2017-16526)

Andrey Konovalov discovered that the ALSA subsystem in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-16527)

Andrey Konovalov discovered that the ALSA subsystem in the Linux kernel did
not properly validate USB audio buffer descriptors. A physically proximate
attacker could use this cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2017-16529)

Andrey Konovalov discovered that the USB unattached storage driver in the
Linux kernel contained out-of-bounds error when handling alternative
settings. A physically proximate attacker could use to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2017-16530)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate USB interface association descriptors. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2017-16531)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate USB HID descriptors. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2017-16533)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate CDC metadata. A physically proximate attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-16534)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate USB BOS metadata. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2017-16535)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 14.04 LTS:
linux-image-aws 4.4.0.1003.3
linux-image-4.4.0-1003-aws 4.4.0-1003.3

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2017-15265, CVE-2017-15299, CVE-2017-15649, CVE-2017-15951, CVE-2017-16525, CVE-2017-16526, CVE-2017-16527, CVE-2017-16529, CVE-2017-16530, CVE-2017-16531, CVE-2017-16533, CVE-2017-16534, CVE-2017-16535

Kategóriák: Securiy

USN-3484-3: Linux kernel (GCP) vulnerability

Ubuntu security notices - 2017.11.21, k - 22:24
Ubuntu Security Notice USN-3484-3

21st November, 2017

linux-gcp vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS
Summary

The system could be made to crash or run programs as an administrator.

Software description
  • linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
Details

It was discovered that the KVM subsystem in the Linux kernel did not
properly keep track of nested levels in guest page tables. A local attacker
in a guest VM could use this to cause a denial of service (host OS crash)
or possibly execute arbitrary code in the host OS.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 16.04 LTS:
linux-image-4.10.0-1009-gcp 4.10.0-1009.9
linux-image-gcp 4.10.0.1009.11

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2017-12188

Kategóriák: Securiy

USN-3488-1: Linux kernel (Azure) vulnerability

Ubuntu security notices - 2017.11.21, k - 22:24
Ubuntu Security Notice USN-3488-1

21st November, 2017

linux-azure vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS
Summary

The system could be made to crash or run programs as an administrator.

Software description
  • linux-azure - Linux kernel for Microsoft Azure Cloud systems
Details

It was discovered that the KVM subsystem in the Linux kernel did not
properly keep track of nested levels in guest page tables. A local attacker
in a guest VM could use this to cause a denial of service (host OS crash)
or possibly execute arbitrary code in the host OS.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 16.04 LTS:
linux-image-4.11.0-1015-azure 4.11.0-1015.15
linux-image-azure 4.11.0.1015.15

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2017-12188

Kategóriák: Securiy

USN-3487-1: Linux kernel vulnerabilities

Ubuntu security notices - 2017.11.21, k - 22:24
Ubuntu Security Notice USN-3487-1

21st November, 2017

linux, linux-raspi2 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
Summary

Several security issues were fixed in the Linux kernel.

Software description
  • linux - Linux kernel
  • linux-raspi2 - Linux kernel for Raspberry Pi 2
Details

It was discovered that the KVM subsystem in the Linux kernel did not
properly keep track of nested levels in guest page tables. A local attacker
in a guest VM could use this to cause a denial of service (host OS crash)
or possibly execute arbitrary code in the host OS. (CVE-2017-12188)

It was discovered that on the PowerPC architecture, the kernel did not
properly sanitize the signal stack when handling sigreturn(). A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2017-1000255)

Bo Zhang discovered that the netlink wireless configuration interface in
the Linux kernel did not properly validate attributes when handling certain
requests. A local attacker with the CAP_NET_ADMIN could use this to cause a
denial of service (system crash). (CVE-2017-12153)

It was discovered that the nested KVM implementation in the Linux kernel in
some situations did not properly prevent second level guests from reading
and writing the hardware CR8 register. A local attacker in a guest could
use this to cause a denial of service (system crash). (CVE-2017-12154)

Vitaly Mayatskikh discovered that the SCSI subsystem in the Linux kernel
did not properly track reference counts when merging buffers. A local
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2017-12190)

It was discovered that the key management subsystem in the Linux kernel did
not properly restrict key reads on negatively instantiated keys. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2017-12192)

It was discovered that the ATI Radeon framebuffer driver in the Linux
kernel did not properly initialize a data structure returned to user space.
A local attacker could use this to expose sensitive information (kernel
memory). (CVE-2017-14156)

ChunYu Wang discovered that the iSCSI transport implementation in the Linux
kernel did not properly validate data structures. A local attacker could
use this to cause a denial of service (system crash). (CVE-2017-14489)

Alexander Potapenko discovered an information leak in the waitid
implementation of the Linux kernel. A local attacker could use this to
expose sensitive information (kernel memory). (CVE-2017-14954)

It was discovered that a race condition existed in the ALSA subsystem of
the Linux kernel when creating and deleting a port via ioctl(). A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2017-15265)

Dmitry Vyukov discovered that the Floating Point Unit (fpu) subsystem in
the Linux kernel did not properly handle attempts to set reserved bits in a
task's extended state (xstate) area. A local attacker could use this to
cause a denial of service (system crash). (CVE-2017-15537)

It was discovered that a race condition existed in the packet fanout
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-15649)

Andrey Konovalov discovered a use-after-free vulnerability in the USB
serial console driver in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2017-16525)

Andrey Konovalov discovered that the Ultra Wide Band driver in the Linux
kernel did not properly check for an error condition. A physically
proximate attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2017-16526)

Andrey Konovalov discovered that the ALSA subsystem in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-16527)

Andrey Konovalov discovered that the ALSA subsystem in the Linux kernel did
not properly validate USB audio buffer descriptors. A physically proximate
attacker could use this cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2017-16529)

Andrey Konovalov discovered that the USB unattached storage driver in the
Linux kernel contained out-of-bounds error when handling alternative
settings. A physically proximate attacker could use to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2017-16530)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate USB interface association descriptors. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2017-16531)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate USB HID descriptors. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2017-16533)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate CDC metadata. A physically proximate attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-16534)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2017-1000255, CVE-2017-12153, CVE-2017-12154, CVE-2017-12188, CVE-2017-12190, CVE-2017-12192, CVE-2017-14156, CVE-2017-14489, CVE-2017-14954, CVE-2017-15265, CVE-2017-15537, CVE-2017-15649, CVE-2017-16525, CVE-2017-16526, CVE-2017-16527, CVE-2017-16529, CVE-2017-16530, CVE-2017-16531, CVE-2017-16533, CVE-2017-16534

Kategóriák: Securiy

USN-3486-2: Samba vulnerability

Ubuntu security notices - 2017.11.21, k - 22:24
Ubuntu Security Notice USN-3486-2

21st November, 2017

samba vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 LTS
Summary

Samba could be made to expose sensitive information over the network.

Software description
  • samba - SMB/CIFS file, print, and login server for Unix
Details

USN-3486-1 fixed a vulnerability in Samba. This update provides the
corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

Volker Lendecke discovered that Samba incorrectly cleared memory when
returning data to a client. A remote attacker could possibly use this issue
to obtain sensitive information. (CVE-2017-15275)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 12.04 LTS:
samba 2:3.6.25-0ubuntu0.12.04.14

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-15275

Kategóriák: Securiy

USN-3483-2: procmail vulnerability

Ubuntu security notices - 2017.11.21, k - 19:02
Ubuntu Security Notice USN-3483-2

21st November, 2017

procmail vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 LTS
Summary

formail could be made to crash or run programs if it processed specially crafted mail.

Software description
  • procmail - Versatile e-mail processor
Details

USN-3483-1 fixed a vulnerability in procmail. This update provides the
corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

Jakub Wilk discovered that the formail tool incorrectly handled certain
malformed mail messages. An attacker could use this flaw to cause formail
to crash, resulting in a denial of service, or possibly execute arbitrary
code.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 12.04 LTS:
procmail 3.22-19ubuntu0.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-16844

Kategóriák: Securiy

USN-3486-1: Samba vulnerabilities

Ubuntu security notices - 2017.11.21, k - 19:02
Ubuntu Security Notice USN-3486-1

21st November, 2017

samba vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

Several security issues were fixed in Samba.

Software description
  • samba - SMB/CIFS file, print, and login server for Unix
Details

Yihan Lian and Zhibin Hu discovered that Samba incorrectly handled memory
when processing certain SMB1 requests. A remote attacker could possibly use
this issue to execute arbitrary code. (CVE-2017-14746)

Volker Lendecke discovered that Samba incorrectly cleared memory when
returning data to a client. A remote attacker could possibly use this issue
to obtain sensitive information. (CVE-2017-15275)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
samba 2:4.6.7+dfsg-1ubuntu3.1
Ubuntu 17.04:
samba 2:4.5.8+dfsg-0ubuntu0.17.04.8
Ubuntu 16.04 LTS:
samba 2:4.3.11+dfsg-0ubuntu0.16.04.12
Ubuntu 14.04 LTS:
samba 2:4.3.11+dfsg-0ubuntu0.14.04.13

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-14746, CVE-2017-15275

Kategóriák: Securiy

USN-3485-2: Linux kernel (Xenial HWE) vulnerabilities

Ubuntu security notices - 2017.11.21, k - 09:24
Ubuntu Security Notice USN-3485-2

21st November, 2017

linux-lts-xenial vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS
Summary

Several security issues were fixed in the Linux kernel.

Software description
  • linux-lts-xenial - Linux hardware enablement kernel from Xenial for Trusty
Details

USN-3485-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu
14.04 LTS.

It was discovered that a race condition existed in the ALSA subsystem of
the Linux kernel when creating and deleting a port via ioctl(). A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2017-15265)

Eric Biggers discovered that the key management subsystem in the Linux
kernel did not properly restrict adding a key that already exists but is
uninstantiated. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2017-15299)

It was discovered that a race condition existed in the packet fanout
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-15649)

Eric Biggers discovered a race condition in the key management subsystem of
the Linux kernel around keys in a negative state. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-15951)

Andrey Konovalov discovered a use-after-free vulnerability in the USB
serial console driver in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2017-16525)

Andrey Konovalov discovered that the Ultra Wide Band driver in the Linux
kernel did not properly check for an error condition. A physically
proximate attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2017-16526)

Andrey Konovalov discovered that the ALSA subsystem in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-16527)

Andrey Konovalov discovered that the ALSA subsystem in the Linux kernel did
not properly validate USB audio buffer descriptors. A physically proximate
attacker could use this cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2017-16529)

Andrey Konovalov discovered that the USB unattached storage driver in the
Linux kernel contained out-of-bounds error when handling alternative
settings. A physically proximate attacker could use to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2017-16530)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate USB interface association descriptors. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2017-16531)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate USB HID descriptors. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2017-16533)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate CDC metadata. A physically proximate attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-16534)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate USB BOS metadata. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2017-16535)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 14.04 LTS:
linux-image-powerpc-smp-lts-xenial 4.4.0.101.84
linux-image-generic-lpae-lts-xenial 4.4.0.101.84
linux-image-4.4.0-101-generic-lpae 4.4.0-101.124~14.04.1
linux-image-4.4.0-101-powerpc-smp 4.4.0-101.124~14.04.1
linux-image-4.4.0-101-powerpc64-emb 4.4.0-101.124~14.04.1
linux-image-4.4.0-101-powerpc-e500mc 4.4.0-101.124~14.04.1
linux-image-lowlatency-lts-xenial 4.4.0.101.84
linux-image-generic-lts-xenial 4.4.0.101.84
linux-image-4.4.0-101-generic 4.4.0-101.124~14.04.1
linux-image-powerpc64-smp-lts-xenial 4.4.0.101.84
linux-image-powerpc64-emb-lts-xenial 4.4.0.101.84
linux-image-4.4.0-101-lowlatency 4.4.0-101.124~14.04.1
linux-image-powerpc-e500mc-lts-xenial 4.4.0.101.84
linux-image-4.4.0-101-powerpc64-smp 4.4.0-101.124~14.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2017-15265, CVE-2017-15299, CVE-2017-15649, CVE-2017-15951, CVE-2017-16525, CVE-2017-16526, CVE-2017-16527, CVE-2017-16529, CVE-2017-16530, CVE-2017-16531, CVE-2017-16533, CVE-2017-16534, CVE-2017-16535

Kategóriák: Securiy

USN-3484-2: Linux kernel (HWE) vulnerability

Ubuntu security notices - 2017.11.21, k - 09:24
Ubuntu Security Notice USN-3484-2

21st November, 2017

linux-hwe vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS
Summary

The system could be made to crash or run programs as an administrator.

Software description
  • linux-hwe - Linux hardware enablement (HWE) kernel
Details

USN-3484-1 fixed vulnerabilities in the Linux kernel for Ubuntu 17.04.
This update provides the corresponding updates for the Linux Hardware
Enablement (HWE) kernel from Ubuntu 17.04 for Ubuntu 16.04 LTS.

It was discovered that the KVM subsystem in the Linux kernel did not
properly keep track of nested levels in guest page tables. A local attacker
in a guest VM could use this to cause a denial of service (host OS crash)
or possibly execute arbitrary code in the host OS.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 16.04 LTS:
linux-image-4.10.0-40-generic 4.10.0-40.44~16.04.1
linux-image-4.10.0-40-lowlatency 4.10.0-40.44~16.04.1
linux-image-generic-hwe-16.04 4.10.0.40.42
linux-image-4.10.0-40-generic-lpae 4.10.0-40.44~16.04.1
linux-image-lowlatency-hwe-16.04 4.10.0.40.42
linux-image-generic-lpae-hwe-16.04 4.10.0.40.42

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2017-12188

Kategóriák: Securiy

USN-3485-1: Linux kernel vulnerabilities

Ubuntu security notices - 2017.11.21, k - 09:24
Ubuntu Security Notice USN-3485-1

20th November, 2017

linux, linux-aws, linux-gke, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS
Summary

Several security issues were fixed in the Linux kernel.

Software description
  • linux - Linux kernel
  • linux-aws - Linux kernel for Amazon Web Services (AWS) systems
  • linux-gke - Linux kernel for Google Container Engine (GKE) systems
  • linux-kvm - Linux kernel for cloud environments
  • linux-raspi2 - Linux kernel for Raspberry Pi 2
  • linux-snapdragon - Linux kernel for Snapdragon processors
Details

It was discovered that a race condition existed in the ALSA subsystem of
the Linux kernel when creating and deleting a port via ioctl(). A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2017-15265)

Eric Biggers discovered that the key management subsystem in the Linux
kernel did not properly restrict adding a key that already exists but is
uninstantiated. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2017-15299)

It was discovered that a race condition existed in the packet fanout
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-15649)

Eric Biggers discovered a race condition in the key management subsystem of
the Linux kernel around keys in a negative state. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-15951)

Andrey Konovalov discovered a use-after-free vulnerability in the USB
serial console driver in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2017-16525)

Andrey Konovalov discovered that the Ultra Wide Band driver in the Linux
kernel did not properly check for an error condition. A physically
proximate attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2017-16526)

Andrey Konovalov discovered that the ALSA subsystem in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-16527)

Andrey Konovalov discovered that the ALSA subsystem in the Linux kernel did
not properly validate USB audio buffer descriptors. A physically proximate
attacker could use this cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2017-16529)

Andrey Konovalov discovered that the USB unattached storage driver in the
Linux kernel contained out-of-bounds error when handling alternative
settings. A physically proximate attacker could use to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2017-16530)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate USB interface association descriptors. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2017-16531)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate USB HID descriptors. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2017-16533)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate CDC metadata. A physically proximate attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-16534)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate USB BOS metadata. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2017-16535)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 16.04 LTS:
linux-image-powerpc-e500mc 4.4.0.101.106
linux-image-4.4.0-101-generic-lpae 4.4.0-101.124
linux-image-4.4.0-1010-kvm 4.4.0-1010.15
linux-image-4.4.0-1079-snapdragon 4.4.0-1079.84
linux-image-4.4.0-101-powerpc64-smp 4.4.0-101.124
linux-image-4.4.0-1041-aws 4.4.0-1041.50
linux-image-4.4.0-101-powerpc64-emb 4.4.0-101.124
linux-image-snapdragon 4.4.0.1079.71
linux-image-powerpc64-emb 4.4.0.101.106
linux-image-gke 4.4.0.1034.35
linux-image-generic 4.4.0.101.106
linux-image-4.4.0-101-powerpc-e500mc 4.4.0-101.124
linux-image-4.4.0-101-generic 4.4.0-101.124
linux-image-aws 4.4.0.1041.43
linux-image-kvm 4.4.0.1010.10
linux-image-4.4.0-101-lowlatency 4.4.0-101.124
linux-image-raspi2 4.4.0.1077.77
linux-image-powerpc-smp 4.4.0.101.106
linux-image-4.4.0-101-powerpc-smp 4.4.0-101.124
linux-image-generic-lpae 4.4.0.101.106
linux-image-4.4.0-1034-gke 4.4.0-1034.34
linux-image-powerpc64-smp 4.4.0.101.106
linux-image-4.4.0-1077-raspi2 4.4.0-1077.85
linux-image-lowlatency 4.4.0.101.106

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2017-15265, CVE-2017-15299, CVE-2017-15649, CVE-2017-15951, CVE-2017-16525, CVE-2017-16526, CVE-2017-16527, CVE-2017-16529, CVE-2017-16530, CVE-2017-16531, CVE-2017-16533, CVE-2017-16534, CVE-2017-16535

Kategóriák: Securiy

USN-3484-1: Linux kernel vulnerability

Ubuntu security notices - 2017.11.21, k - 09:24
Ubuntu Security Notice USN-3484-1

20th November, 2017

linux, linux-raspi2 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.04
Summary

The system could be made to crash or run programs as an administrator.

Software description
  • linux - Linux kernel
  • linux-raspi2 - Linux kernel for Raspberry Pi 2
Details

It was discovered that the KVM subsystem in the Linux kernel did not
properly keep track of nested levels in guest page tables. A local attacker
in a guest VM could use this to cause a denial of service (host OS crash)
or possibly execute arbitrary code in the host OS.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.04:
linux-image-4.10.0-40-generic 4.10.0-40.44
linux-image-4.10.0-40-lowlatency 4.10.0-40.44
linux-image-generic 4.10.0.40.40
linux-image-4.10.0-40-generic-lpae 4.10.0-40.44
linux-image-generic-lpae 4.10.0.40.40
linux-image-lowlatency 4.10.0.40.40
linux-image-raspi2 4.10.0.1021.22
linux-image-4.10.0-1021-raspi2 4.10.0-1021.24

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2017-12188

Kategóriák: Securiy

USN-3480-2: Apport regressions

Ubuntu security notices - 2017.11.21, k - 02:13
Ubuntu Security Notice USN-3480-2

20th November, 2017

apport regressions

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
Summary

USN-3480-1 introduced regressions in Apport.

Software description
  • apport - automatically generate crash reports for debugging
Details

USN-3480-1 fixed vulnerabilities in Apport. The fix for CVE-2017-14177
introduced a regression in the ability to handle crashes for users that
configured their systems to use the Upstart init system in Ubuntu 16.04
LTS and Ubuntu 17.04. The fix for CVE-2017-14180 temporarily disabled
crash forwarding to containers. This update addresses the problems.

We apologize for the inconvenience.

Original advisory details:

Sander Bos discovered that Apport incorrectly handled core dumps for setuid
binaries. A local attacker could use this issue to perform a denial of service
via resource exhaustion or possibly gain root privileges. (CVE-2017-14177)

Sander Bos discovered that Apport incorrectly handled core dumps for processes
in a different PID namespace. A local attacker could use this issue to perform
a denial of service via resource exhaustion or possibly gain root privileges.
(CVE-2017-14180)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
apport 2.20.7-0ubuntu3.5
Ubuntu 17.04:
apport 2.20.4-0ubuntu4.8
Ubuntu 16.04 LTS:
apport 2.20.1-0ubuntu2.13

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

LP: 1726372, LP: 1732518

Kategóriák: Securiy

USN-3483-1: procmail vulnerability

Ubuntu security notices - 2017.11.20, h - 23:12
Ubuntu Security Notice USN-3483-1

20th November, 2017

procmail vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

formail could be made to crash or run programs if it processed specially crafted mail.

Software description
  • procmail - Versatile e-mail processor
Details

Jakub Wilk discovered that the formail tool incorrectly handled certain
malformed mail messages. An attacker could use this flaw to cause formail
to crash, resulting in a denial of service, or possibly execute arbitrary
code.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
procmail 3.22-25ubuntu0.17.10.1
Ubuntu 17.04:
procmail 3.22-25ubuntu0.17.04.1
Ubuntu 16.04 LTS:
procmail 3.22-25ubuntu0.16.04.1
Ubuntu 14.04 LTS:
procmail 3.22-21ubuntu0.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-16844

Kategóriák: Securiy

USN-3482-1: ipsec-tools vulnerability

Ubuntu security notices - 2017.11.16, cs - 21:23
Ubuntu Security Notice USN-3482-1

16th November, 2017

ipsec-tools vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 LTS
Summary

ipsec-tools could be made to crash if it received specially crafted network traffic.

Software description
  • ipsec-tools - IPsec tools for Linux
Details

It was discovered that racoon, the ipsec-tools IKE daemon, incorrectly
handled certain ISAKMP fragments. A remote attacker could use this issue to
cause racoon to crash, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 12.04 LTS:
racoon 1:0.8.0-9ubuntu1.2
ipsec-tools 1:0.8.0-9ubuntu1.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-10396

Kategóriák: Securiy

USN-3477-1: Firefox vulnerabilities

Ubuntu security notices - 2017.11.16, cs - 17:51
Ubuntu Security Notice USN-3477-1

16th November, 2017

firefox vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

Firefox could be made to crash or run programs as your login if it opened a malicious website.

Software description
  • firefox - Mozilla Open Source web browser
Details

Multiple security issues were discovered in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, read uninitialized
memory, obtain sensitive information, bypass same-origin restrictions,
bypass CSP protections, bypass mixed content blocking, spoof the
addressbar, or execute arbitrary code. (CVE-2017-7826, CVE-2017-7827,
CVE-2017-7828, CVE-2017-7830, CVE-2017-7831, CVE-2017-7832, CVE-2017-7833,
CVE-2017-7834, CVE-2017-7835, CVE-2017-7837, CVE-2017-7838, CVE-2017-7842)

It was discovered that javascript: URLs pasted in to the addressbar
would be executed instead of being blocked in some circumstances. If a
user were tricked in to copying a specially crafted URL in to the
addressbar, an attacker could potentially exploit this to conduct
cross-site scripting (XSS) attacks. (CVE-2017-7839)

It was discovered that exported bookmarks do not strip script elements
from user-supplied tags. If a user were tricked in to adding specially
crafted tags to bookmarks, exporting them and then opening the resulting
HTML file, an attacker could potentially exploit this to conduct
cross-site scripting (XSS) attacks. (CVE-2017-7840)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
firefox 57.0+build4-0ubuntu0.17.10.5
Ubuntu 17.04:
firefox 57.0+build4-0ubuntu0.17.04.5
Ubuntu 16.04 LTS:
firefox 57.0+build4-0ubuntu0.16.04.5
Ubuntu 14.04 LTS:
firefox 57.0+build4-0ubuntu0.14.04.4

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make
all the necessary changes.

References

CVE-2017-7826, CVE-2017-7827, CVE-2017-7828, CVE-2017-7830, CVE-2017-7831, CVE-2017-7832, CVE-2017-7833, CVE-2017-7834, CVE-2017-7835, CVE-2017-7837, CVE-2017-7838, CVE-2017-7839, CVE-2017-7840, CVE-2017-7842

Kategóriák: Securiy

USN-3481-1: WebKitGTK+ vulnerabilities

Ubuntu security notices - 2017.11.16, cs - 17:51
Ubuntu Security Notice USN-3481-1

16th November, 2017

webkit2gtk vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
Summary

Several security issues were fixed in WebKitGTK+.

Software description
  • webkit2gtk - Web content engine library for GTK+
Details

A large number of security issues were discovered in the WebKitGTK+ Web and
JavaScript engines. If a user were tricked into viewing a malicious
website, a remote attacker could exploit a variety of issues related to web
browser security, including cross-site scripting attacks, denial of service
attacks, and arbitrary code execution.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
libwebkit2gtk-4.0-37 2.18.3-0ubuntu0.17.10.1
libjavascriptcoregtk-4.0-18 2.18.3-0ubuntu0.17.10.1
Ubuntu 17.04:
libwebkit2gtk-4.0-37 2.18.3-0ubuntu0.17.04.1
libjavascriptcoregtk-4.0-18 2.18.3-0ubuntu0.17.04.1
Ubuntu 16.04 LTS:
libwebkit2gtk-4.0-37 2.18.3-0ubuntu0.16.04.1
libjavascriptcoregtk-4.0-18 2.18.3-0ubuntu0.16.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use WebKitGTK+, such as Epiphany, to make all the necessary changes.

References

CVE-2017-13783, CVE-2017-13784, CVE-2017-13785, CVE-2017-13788, CVE-2017-13791, CVE-2017-13792, CVE-2017-13793, CVE-2017-13794, CVE-2017-13795, CVE-2017-13796, CVE-2017-13798, CVE-2017-13802, CVE-2017-13803

Kategóriák: Securiy

USN-3480-1: Apport vulnerabilities

Ubuntu security notices - 2017.11.16, cs - 00:51
Ubuntu Security Notice USN-3480-1

15th November, 2017

apport vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

Apport could be tricked into creating files as an administrator, resulting in denial of service or privilege escalation.

Software description
  • apport - automatically generate crash reports for debugging
Details

Sander Bos discovered that Apport incorrectly handled core dumps for setuid
binaries. A local attacker could use this issue to perform a denial of service
via resource exhaustion or possibly gain root privileges. (CVE-2017-14177)

Sander Bos discovered that Apport incorrectly handled core dumps for processes
in a different PID namespace. A local attacker could use this issue to perform
a denial of service via resource exhaustion or possibly gain root privileges.
(CVE-2017-14180)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
apport 2.20.7-0ubuntu3.4
Ubuntu 17.04:
apport 2.20.4-0ubuntu4.7
Ubuntu 16.04 LTS:
apport 2.20.1-0ubuntu2.12
Ubuntu 14.04 LTS:
apport 2.14.1-0ubuntu3.27

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-14177, CVE-2017-14180

Kategóriák: Securiy

USN-3276-3: shadow vulnerability

Ubuntu security notices - 2017.11.14, k - 22:42
Ubuntu Security Notice USN-3276-3

14th November, 2017

shadow vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 LTS
Summary

su could be made to crash or stop programs as an administrator.

Software description
  • shadow - system login tools
Details

USN-3276-1 and USN-3276-2 fixed vulnerabilities in shadow. This update
provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

Sebastian Krahmer discovered integer overflows in shadow utilities.
A local attacker could possibly cause them to crash or potentially
gain privileges via crafted input. (CVE-2016-6252)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 12.04 LTS:
passwd 1:4.1.4.2+svn3283-3ubuntu5.2
login 1:4.1.4.2+svn3283-3ubuntu5.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-2616

Kategóriák: Securiy

USN-3479-1: PostgreSQL vulnerabilities

Ubuntu security notices - 2017.11.14, k - 16:02
Ubuntu Security Notice USN-3479-1

14th November, 2017

postgresql-9.3, postgresql-9.5, postgresql-9.6 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

Several security issues were fixed in PostgreSQL.

Software description
  • postgresql-9.3 - Object-relational SQL database
  • postgresql-9.5 - Object-relational SQL database
  • postgresql-9.6 - Object-relational SQL database
Details

David Rowley discovered that PostgreSQL incorrectly handled memory when
processing certain JSON functions. A remote attacker could possibly use
this issue to obtain sensitive information. (CVE-2017-15098)

Dean Rasheed discovered that PostgreSQL incorrectly enforced SELECT
privileges when processing INSERT ... ON CONFLICT DO UPDATE commands. A
remote attacker could possibly use this issue to obtain sensitive
information. This issue only affected Ubuntu 16.04 LTS, Ubuntu 17.04 and
Ubuntu 17.10.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.10:
postgresql-9.6 9.6.6-0ubuntu0.17.10
Ubuntu 17.04:
postgresql-9.6 9.6.6-0ubuntu0.17.04
Ubuntu 16.04 LTS:
postgresql-9.5 9.5.10-0ubuntu0.16.04
Ubuntu 14.04 LTS:
postgresql-9.3 9.3.20-0ubuntu0.14.04

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart PostgreSQL to
make all the necessary changes.

References

CVE-2017-15098, CVE-2017-15099

Kategóriák: Securiy

USN-3478-2: Perl vulnerability

Ubuntu security notices - 2017.11.13, h - 23:31
Ubuntu Security Notice USN-3478-2

13th November, 2017

perl vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 LTS
Summary

Perl could be made to crash if it received specially crafted input.

Software description
  • perl - Practical Extraction and Report Language
Details

USN-3478-1 fixed two vulnerabilities in Perl. This update
provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

Jakub Wilk discovered that Perl incorrectly handled certain regular
expressions. An attacker could use this issue to cause Perl to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2017-12883)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 12.04 LTS:
perl 5.14.2-6ubuntu2.6

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-12883

Kategóriák: Securiy

Oldalak

Subscribe to Informatikai megoldások hírolvasó