Category Archives: Ubuntu

Ubuntu Security Notices

USN-2456-1: GNU cpio vulnerabilities

Ubuntu Security Notice USN-2456-1

8th January, 2015

cpio vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

The GNU cpio program could be made to crash or run programs if it
opened a specially crafted file or received specially crafted input.

Software description

  • cpio
    – a program to manage archives of files

Details

Michal Zalewski discovered an out of bounds write issue in the
process_copy_in function of GNU cpio. An attacker could specially
craft a cpio archive that could create a denial of service or possibly
execute arbitrary code. (CVE-2014-9112)

Jakob Lell discovered a heap-based buffer overflow in the rmt_read__
function of GNU cpio’s rmt client functionality. An attacker
controlling a remote rmt server could use this to cause a denial of
service or possibly execute arbitrary code. This issue only affected
Ubuntu 10.04 LTS. (CVE-2010-0624)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
cpio

2.11+dfsg-2ubuntu1.1
Ubuntu 14.04 LTS:
cpio

2.11+dfsg-1ubuntu1.1
Ubuntu 12.04 LTS:
cpio

2.11-7ubuntu3.1
Ubuntu 10.04 LTS:
cpio

2.10-1ubuntu2.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2010-0624,

CVE-2014-9112

USN-2455-1: bsd-mailx vulnerability

Ubuntu Security Notice USN-2455-1

7th January, 2015

bsd-mailx vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

bsd-mailx could be made to run programs if it parsed a specially crafted
email address.

Software description

  • bsd-mailx
    – simple mail user agent

Details

It was discovered that bsd-mailx contained a feature that allowed
syntactically valid email addresses to be treated as shell commands. A
remote attacker could possibly use this issue with a valid email address to
execute arbitrary commands.

This functionality has now been disabled by default, and can be re-enabled
with the “expandaddr” configuration option. This update alone does not
remove all possibilities of command execution. In environments where
scripts use mailx to process arbitrary email addresses, it is recommended
to modify them to use a “–” separator before the address to properly
handle those that begin with “-“.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
bsd-mailx

8.1.2-0.20131005cvs-1ubuntu0.14.10.1
Ubuntu 14.04 LTS:
bsd-mailx

8.1.2-0.20131005cvs-1ubuntu0.14.04.1
Ubuntu 12.04 LTS:
bsd-mailx

8.1.2-0.20111106cvs-1ubuntu0.1
Ubuntu 10.04 LTS:
bsd-mailx

8.1.2-0.20090911cvs-2ubuntu1.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-7844

USN-2454-1: Exiv2 vulnerability

Ubuntu Security Notice USN-2454-1

7th January, 2015

exiv2 vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10

Summary

Exiv2 could be made to crash if it opened a specially crafted file.

Software description

  • exiv2
    – EXIF/IPTC metadata manipulation tool

Details

It was discovered that Exiv2 incorrectly handled certain tag values in
video files. If a user or automated system were tricked into opening a
specially-crafted video file, a remote attacker could cause Exiv2 to crash,
resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
libexiv2-13

0.24-2ubuntu1.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-9449

USN-2453-1: mime-support vulnerability

Ubuntu Security Notice USN-2453-1

7th January, 2015

mime-support vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

run-mailcap could be made to run programs as your login if it opened a
specially crafted file.

Software description

  • mime-support
    – MIME support programs

Details

Timothy D. Morgan discovered that the run-mailcap tool incorrectly filtered
certain shell metacharacters in filenames. If a user or automated system
were tricked into opening a file with a specially-crafted filename, a
remote attacker could possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
mime-support

3.55ubuntu1.1
Ubuntu 14.04 LTS:
mime-support

3.54ubuntu1.1
Ubuntu 12.04 LTS:
mime-support

3.51-1ubuntu1.1
Ubuntu 10.04 LTS:
mime-support

3.48-1ubuntu1.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-7209

USN-2452-1: NSS vulnerability

Ubuntu Security Notice USN-2452-1

7th January, 2015

nss vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

NSS could be made to expose sensitive information over the network.

Software description

  • nss
    – Network Security Service library

Details

It was discovered that NSS incorrectly handled certain ASN.1 lengths. A
remote attacker could possibly use this issue to perform a data-smuggling
attack.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
libnss3

2:3.17.1-0ubuntu1.1
Ubuntu 14.04 LTS:
libnss3

2:3.17.1-0ubuntu0.14.04.2
Ubuntu 12.04 LTS:
libnss3

3.17.1-0ubuntu0.12.04.2
Ubuntu 10.04 LTS:
libnss3-1d

3.17.1-0ubuntu0.10.04.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart any applications
that use NSS, such as Evolution and Chromium, to make all the necessary
changes.

References

CVE-2014-1569

USN-2450-1: strongSwan vulnerability

Ubuntu Security Notice USN-2450-1

5th January, 2015

strongswan vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS

Summary

strongSwan could be made to crash if it received specially
crafted network traffic.

Software description

  • strongswan
    – IPsec VPN solution

Details

Mike Daskalakis discovered that strongSwan incorrectly handled IKEv2
payloads that contained the Diffie-Hellman group 1025. A remote attacker
could use this issue to cause the IKE daemon to crash, resulting in a
denial of service.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
strongswan-ike

5.1.2-0ubuntu3.2
Ubuntu 14.04 LTS:
strongswan-ike

5.1.2-0ubuntu2.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-9221

USN-2451-1: cgmanager vulnerability

Ubuntu Security Notice USN-2451-1

5th January, 2015

cgmanager vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS

Summary

cgmanager could be made to expose sensitive information or devices to
containers running on the system.

Software description

  • cgmanager
    – Central cgroup manager daemon

Details

Serge Hallyn discovered that cgmanager did not consistently enforce
proper nesting when modifying cgroup properties. A local attacker in a
privileged container could use this to set cgroup values for all cgroups.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
cgmanager

0.32-4ubuntu1.1
Ubuntu 14.04 LTS:
cgmanager

0.24-0ubuntu7.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2014-1425

USN-2449-1: NTP vulnerabilities

Ubuntu Security Notice USN-2449-1

22nd December, 2014

ntp vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

Several security issues were fixed in NTP.

Software description

  • ntp
    – Network Time Protocol daemon and utility programs

Details

Neel Mehta discovered that NTP generated weak authentication keys. A remote
attacker could possibly use this issue to brute force the authentication
key and send requests if permitted by IP restrictions. (CVE-2014-9293)

Stephen Roettger discovered that NTP generated weak MD5 keys. A remote
attacker could possibly use this issue to brute force the MD5 key and spoof
a client or server. (CVE-2014-9294)

Stephen Roettger discovered that NTP contained buffer overflows in the
crypto_recv(), ctl_putdata() and configure() functions. In non-default
configurations, a remote attacker could use these issues to cause NTP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. The default compiler options for affected releases should reduce the
vulnerability to a denial of service. In addition, attackers would be
isolated by the NTP AppArmor profile. (CVE-2014-9295)

Stephen Roettger discovered that NTP incorrectly continued processing when
handling certain errors. (CVE-2014-9296)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
ntp

1:4.2.6.p5+dfsg-3ubuntu2.14.10.1
Ubuntu 14.04 LTS:
ntp

1:4.2.6.p5+dfsg-3ubuntu2.14.04.1
Ubuntu 12.04 LTS:
ntp

1:4.2.6.p3+dfsg-1ubuntu3.2
Ubuntu 10.04 LTS:
ntp

1:4.2.4p8+dfsg-1ubuntu2.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to regenerate any MD5 keys that
were manually created with ntp-keygen.

References

CVE-2014-9293,

CVE-2014-9294,

CVE-2014-9295,

CVE-2014-9296

USN-2447-2: Linux kernel (Utopic HWE) regression

Ubuntu Security Notice USN-2447-2

19th December, 2014

linux-lts-utopic regression

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

USN-2447-1 introduced a regression in the Linux kernel.

Software description

  • linux-lts-utopic
    – Linux hardware enablement kernel from Utopic

Details

USN-2447-1 fixed vulnerabilities in the Linux kernel. Due to an unrelated
regression TCP Throughput drops to zero for several drivers after upgrading.
This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

An information leak in the Linux kernel was discovered that could leak the
high 16 bits of the kernel stack address on 32-bit Kernel Virtual Machine
(KVM) paravirt guests. A user in the guest OS could exploit this leak to
obtain information that could potentially be used to aid in attacking the
kernel. (CVE-2014-8134)

Rabin Vincent, Robert Swiecki, Russell King discovered that the ftrace
subsystem of the Linux kernel does not properly handle private syscall
numbers. A local user could exploit this flaw to cause a denial of service
(OOPS). (CVE-2014-7826)

A flaw in the handling of malformed ASCONF chunks by SCTP (Stream Control
Transmission Protocol) implementation in the Linux kernel was discovered. A
remote attacker could exploit this flaw to cause a denial of service
(system crash). (CVE-2014-3673)

A flaw in the handling of duplicate ASCONF chunks by SCTP (Stream Control
Transmission Protocol) implementation in the Linux kernel was discovered. A
remote attacker could exploit this flaw to cause a denial of service
(panic). (CVE-2014-3687)

It was discovered that excessive queuing by SCTP (Stream Control
Transmission Protocol) implementation in the Linux kernel can cause memory
pressure. A remote attacker could exploit this flaw to cause a denial of
service. (CVE-2014-3688)

Rabin Vincent, Robert Swiecki, Russell Kinglaw discovered a flaw in how the
perf subsystem of the Linux kernel handles private systecall numbers. A
local user could exploit this to cause a denial of service (OOPS) or bypass
ASLR protections via a crafted application. (CVE-2014-7825)

Andy Lutomirski discovered a flaw in how the Linux kernel handles
pivot_root when used with a chroot directory. A local user could exploit
this flaw to cause a denial of service (mount-tree loop). (CVE-2014-7970)

Dmitry Monakhov discovered a race condition in the ext4_file_write_iter
function of the Linux kernel’s ext4 filesystem. A local user could exploit
this flaw to cause a denial of service (file unavailability).
(CVE-2014-8086)

The KVM (kernel virtual machine) subsystem of the Linux kernel
miscalculates the number of memory pages during the handling of a mapping
failure. A guest OS user could exploit this to cause a denial of service
(host OS page unpinning) or possibly have unspecified other impact by
leveraging guest OS privileges. (CVE-2014-8369)

Andy Lutomirski discovered that the Linux kernel does not properly handle
faults associated with the Stack Segment (SS) register on the x86
architecture. A local attacker could exploit this flaw to cause a denial of
service (panic). (CVE-2014-9090)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
linux-image-3.16.0-28-lowlatency

3.16.0-28.38~14.04.1
linux-image-3.16.0-28-powerpc64-emb

3.16.0-28.38~14.04.1
linux-image-3.16.0-28-generic

3.16.0-28.38~14.04.1
linux-image-3.16.0-28-powerpc-e500mc

3.16.0-28.38~14.04.1
linux-image-3.16.0-28-powerpc64-smp

3.16.0-28.38~14.04.1
linux-image-3.16.0-28-generic-lpae

3.16.0-28.38~14.04.1
linux-image-3.16.0-28-powerpc-smp

3.16.0-28.38~14.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

http://bugs.launchpad.net/bugs/1390604

USN-2448-2: Linux kernel regression

Ubuntu Security Notice USN-2448-2

19th December, 2014

linux regression

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10

Summary

USN-2448-1 introduced a regression in the Linux kernel.

Software description

  • linux
    – Linux kernel

Details

USN-2448-1 fixed vulnerabilities in the Linux kernel. Due to an unrelated
regression TCP Throughput drops to zero for several drivers after upgrading.
This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

An information leak in the Linux kernel was discovered that could leak the
high 16 bits of the kernel stack address on 32-bit Kernel Virtual Machine
(KVM) paravirt guests. A user in the guest OS could exploit this leak to
obtain information that could potentially be used to aid in attacking the
kernel. (CVE-2014-8134)

Rabin Vincent, Robert Swiecki, Russell King discovered that the ftrace
subsystem of the Linux kernel does not properly handle private syscall
numbers. A local user could exploit this flaw to cause a denial of service
(OOPS). (CVE-2014-7826)

A flaw in the handling of malformed ASCONF chunks by SCTP (Stream Control
Transmission Protocol) implementation in the Linux kernel was discovered. A
remote attacker could exploit this flaw to cause a denial of service
(system crash). (CVE-2014-3673)

A flaw in the handling of duplicate ASCONF chunks by SCTP (Stream Control
Transmission Protocol) implementation in the Linux kernel was discovered. A
remote attacker could exploit this flaw to cause a denial of service
(panic). (CVE-2014-3687)

It was discovered that excessive queuing by SCTP (Stream Control
Transmission Protocol) implementation in the Linux kernel can cause memory
pressure. A remote attacker could exploit this flaw to cause a denial of
service. (CVE-2014-3688)

Rabin Vincent, Robert Swiecki, Russell Kinglaw discovered a flaw in how the
perf subsystem of the Linux kernel handles private systecall numbers. A
local user could exploit this to cause a denial of service (OOPS) or bypass
ASLR protections via a crafted application. (CVE-2014-7825)

Andy Lutomirski discovered a flaw in how the Linux kernel handles
pivot_root when used with a chroot directory. A local user could exploit
this flaw to cause a denial of service (mount-tree loop). (CVE-2014-7970)

Dmitry Monakhov discovered a race condition in the ext4_file_write_iter
function of the Linux kernel’s ext4 filesystem. A local user could exploit
this flaw to cause a denial of service (file unavailability).
(CVE-2014-8086)

The KVM (kernel virtual machine) subsystem of the Linux kernel
miscalculates the number of memory pages during the handling of a mapping
failure. A guest OS user could exploit this to cause a denial of service
(host OS page unpinning) or possibly have unspecified other impact by
leveraging guest OS privileges. (CVE-2014-8369)

Andy Lutomirski discovered that the Linux kernel does not properly handle
faults associated with the Stack Segment (SS) register on the x86
architecture. A local attacker could exploit this flaw to cause a denial of
service (panic). (CVE-2014-9090)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
linux-image-3.16.0-28-lowlatency

3.16.0-28.38
linux-image-3.16.0-28-powerpc64-emb

3.16.0-28.38
linux-image-3.16.0-28-generic

3.16.0-28.38
linux-image-3.16.0-28-powerpc-e500mc

3.16.0-28.38
linux-image-3.16.0-28-powerpc64-smp

3.16.0-28.38
linux-image-3.16.0-28-generic-lpae

3.16.0-28.38
linux-image-3.16.0-28-powerpc-smp

3.16.0-28.38

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

http://bugs.launchpad.net/bugs/1390604