USN-3210-1: LibreOffice vulnerability

Ubuntu Security Notice USN-3210-1

23rd February, 2017

LibreOffice vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

LibreOffice could be made to disclose files if it opened a specially crafted
file.

Software description

  • libreoffice
    – Office productivity suite

Details

Ben Hayak discovered that it was possible to make LibreOffice Calc and Writer
disclose arbitrary files to an attacker if a user opened a specially crafted
file with embedded links.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.04 LTS:
libreoffice-base

1:5.1.6~rc2-0ubuntu1~xenial1
libreoffice-calc

1:5.1.6~rc2-0ubuntu1~xenial1
libreoffice-common

1:5.1.6~rc2-0ubuntu1~xenial1
libreoffice-math

1:5.1.6~rc2-0ubuntu1~xenial1
libreoffice-writer

1:5.1.6~rc2-0ubuntu1~xenial1
libreoffice

1:5.1.6~rc2-0ubuntu1~xenial1
libreoffice-base-core

1:5.1.6~rc2-0ubuntu1~xenial1
libreoffice-core

1:5.1.6~rc2-0ubuntu1~xenial1
Ubuntu 14.04 LTS:
libreoffice-base

1:4.2.8-0ubuntu5
libreoffice-calc

1:4.2.8-0ubuntu5
libreoffice-common

1:4.2.8-0ubuntu5
libreoffice-math

1:4.2.8-0ubuntu5
libreoffice-writer

1:4.2.8-0ubuntu5
libreoffice

1:4.2.8-0ubuntu5
libreoffice-base-core

1:4.2.8-0ubuntu5
libreoffice-core

1:4.2.8-0ubuntu5
Ubuntu 12.04 LTS:
libreoffice-base

1:3.5.7-0ubuntu13
libreoffice-calc

1:3.5.7-0ubuntu13
libreoffice-common

1:3.5.7-0ubuntu13
libreoffice-math

1:3.5.7-0ubuntu13
libreoffice-writer

1:3.5.7-0ubuntu13
libreoffice

1:3.5.7-0ubuntu13
libreoffice-base-core

1:3.5.7-0ubuntu13
libreoffice-core

1:3.5.7-0ubuntu13

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-3157

USN-3211-1: PHP vulnerabilities

Ubuntu Security Notice USN-3211-1

23rd February, 2017

php7.0 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS

Summary

Several security issues were fixed in PHP.

Software description

  • php7.0
    – HTML-embedded scripting language interpreter

Details

It was discovered that PHP incorrectly handled certain invalid objects when
unserializing data. A remote attacker could use this issue to cause PHP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2016-7479)

It was discovered that PHP incorrectly handled certain invalid objects when
unserializing data. A remote attacker could use this issue to cause PHP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2016-9137)

It was discovered that PHP incorrectly handled unserializing certain
wddxPacket XML documents. A remote attacker could use this issue to cause
PHP to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2016-9935)

It was discovered that PHP incorrectly handled certain invalid objects when
unserializing data. A remote attacker could use this issue to cause PHP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2016-9936)

It was discovered that PHP incorrectly handled certain EXIF data. A remote
attacker could use this issue to cause PHP to crash, resulting in a denial
of service. (CVE-2016-10158)

It was discovered that PHP incorrectly handled certain PHAR archives. A
remote attacker could use this issue to cause PHP to crash or consume
resources, resulting in a denial of service. (CVE-2016-10159)

It was discovered that PHP incorrectly handled certain PHAR archives. A
remote attacker could use this issue to cause PHP to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2016-10160)

It was discovered that PHP incorrectly handled certain invalid objects when
unserializing data. A remote attacker could use this issue to cause PHP to
crash, resulting in a denial of service. (CVE-2016-10161)

It was discovered that PHP incorrectly handled unserializing certain
wddxPacket XML documents. A remote attacker could use this issue to cause
PHP to crash, resulting in a denial of service. (CVE-2016-10162)

It was discovered that PHP incorrectly handled certain invalid objects when
unserializing data. A remote attacker could use this issue to cause PHP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2017-5340)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
php7.0-fpm

7.0.15-0ubuntu0.16.10.2
libapache2-mod-php7.0

7.0.15-0ubuntu0.16.10.2
php7.0-cli

7.0.15-0ubuntu0.16.10.2
php7.0-cgi

7.0.15-0ubuntu0.16.10.2
Ubuntu 16.04 LTS:
php7.0-fpm

7.0.15-0ubuntu0.16.04.2
libapache2-mod-php7.0

7.0.15-0ubuntu0.16.04.2
php7.0-cli

7.0.15-0ubuntu0.16.04.2
php7.0-cgi

7.0.15-0ubuntu0.16.04.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.

References

CVE-2016-10158,

CVE-2016-10159,

CVE-2016-10160,

CVE-2016-10161,

CVE-2016-10162,

CVE-2016-7479,

CVE-2016-9137,

CVE-2016-9935,

CVE-2016-9936,

CVE-2017-5340

CVE-2014-9916

Multiple cross-site scripting (XSS) vulnerabilities in Bilboplanet 2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) tribe_name or (2) tags parameter in a tribes page request to user/ or the (3) user_id or (4) fullname parameter to signup.php.

CVE-2017-6099

Cross-site scripting (XSS) vulnerability in GetAuthDetails.html.php in PayPal PHP Merchant SDK (aka merchant-sdk-php) 3.9.1 allows remote attackers to inject arbitrary web script or HTML via the token parameter.