USN-2667-1: Linux kernel vulnerabilities

Ubuntu Security Notice USN-2667-1

7th July, 2015

linux vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.04

Summary

Several security issues were fixed in the kernel.

Software description

  • linux
    – Linux kernel

Details

A race condition was discovered in the Linux kernel’s file_handle size
verification. A local user could exploit this flaw to read potentially
sensative memory locations. (CVE-2015-1420)

A underflow error was discovered in the Linux kernel’s Ozmo Devices USB
over WiFi host controller driver. A remote attacker could exploit this flaw
to cause a denial of service (system crash) or potentially execute
arbitrary code via a specially crafted packet. (CVE-2015-4001)

A bounds check error was discovered in the Linux kernel’s Ozmo Devices USB
over WiFi host controller driver. A remote attacker could exploit this flaw
to cause a denial of service (system crash) or potentially execute
arbitrary code via a specially crafted packet. (CVE-2015-4002)

A division by zero error was discovered in the Linux kernel’s Ozmo Devices
USB over WiFi host controller driver. A remote attacker could exploit this
flaw to cause a denial of service (system crash). (CVE-2015-4003)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.04:
linux-image-3.19.0-22-generic

3.19.0-22.22
linux-image-3.19.0-22-powerpc-e500mc

3.19.0-22.22
linux-image-3.19.0-22-lowlatency

3.19.0-22.22
linux-image-3.19.0-22-powerpc-smp

3.19.0-22.22
linux-image-3.19.0-22-generic-lpae

3.19.0-22.22
linux-image-3.19.0-22-powerpc64-smp

3.19.0-22.22
linux-image-3.19.0-22-powerpc64-emb

3.19.0-22.22

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2015-1420,

CVE-2015-4001,

CVE-2015-4002,

CVE-2015-4003

USN-2668-1: HAProxy vulnerability

Ubuntu Security Notice USN-2668-1

7th July, 2015

haproxy vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.10

Summary

HAProxy could be made to expose sensitive information over the network.

Software description

  • haproxy
    – fast and reliable load balancing reverse proxy

Details

It was discovered that HAProxy incorrectly handled certain buffers. A
remote attacker could possibly use this issue to obtain sensitive
information belonging to previous requests.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.04:
haproxy

1.5.10-1ubuntu0.1
Ubuntu 14.10:
haproxy

1.5.4-1ubuntu2.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-3281

USN-2669-1: Bind vulnerability

Ubuntu Security Notice USN-2669-1

7th July, 2015

bind9 vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Bind could be made to crash if it received specially crafted network
traffic.

Software description

  • bind9
    – Internet Domain Name Server

Details

Breno Silveira Soares discovered that Bind incorrectly handled certain
zone data when configured to perform DNSSEC validation. A remote attacker
could use this issue with specially crafted zone data to cause Bind to
crash, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.04:
bind9

1:9.9.5.dfsg-9ubuntu0.1
Ubuntu 14.10:
bind9

1:9.9.5.dfsg-4.3ubuntu0.3
Ubuntu 14.04 LTS:
bind9

1:9.9.5.dfsg-3ubuntu0.3
Ubuntu 12.04 LTS:
bind9

1:9.8.1.dfsg.P1-4ubuntu0.11

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-4620

Adobe Flash Player ByteArray Use After Free

This Metasploit module exploits a use after free on Adobe Flash Player. The vulnerability, discovered by Hacking Team and made public on its July 2015 data leak, was described as a Use After Free while handling ByteArray objects. This Metasploit module has been tested successfully on: Windows 7 SP1 (32-bit), IE11 and Adobe Flash 18.0.0.194, Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 18.0.0.194, Windows 8.1 (32-bit), Firefox and Adobe Flash 18.0.0.194, Windows 8.1 (32-bit), IE11 and Flash 17.0.0.169, and Linux Mint “Rebecca” (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.468.

Ubuntu Security Notice USN-2669-1

Ubuntu Security Notice 2669-1 – Breno Silveira Soares discovered that Bind incorrectly handled certain zone data when configured to perform DNSSEC validation. A remote attacker could use this issue with specially crafted zone data to cause Bind to crash, resulting in a denial of service.

HP Security Bulletin HPSBGN03354 1

HP Security Bulletin HPSBGN03354 1 – A potential security vulnerability has been identified with HP Connect-IT. The vulnerability could be exploited remotely to allow disclosure of information. Note: This is the RC4 vulnerability known as Bar Mitzvah, which could be exploited remotely to allow disclosure of information. Revision 1 of this advisory.