Category Archives: Ubuntu

Ubuntu Security Notices

USN-2410-1: Oxide vulnerabilities

Ubuntu Security Notice USN-2410-1

19th November, 2014

oxide-qt vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in Oxide.

Software description

  • oxide-qt
    – Web browser engine library for Qt (QML plugin)

Details

A buffer overflow was discovered in Skia. If a user were tricked in to
opening a specially crafted website, an attacked could potentially exploit
this to cause a denial of service via renderer crash or execute arbitrary
code with the privileges of the sandboxed render process. (CVE-2014-7904)

Multiple use-after-frees were discovered in Blink. If a user were tricked
in to opening a specially crafted website, an attacked could potentially
exploit these to cause a denial of service via renderer crash or execute
arbitrary code with the privileges of the sandboxed render process.
(CVE-2014-7907)

An integer overflow was discovered in media. If a user were tricked in to
opening a specially crafted website, an attacked could potentially exploit
this to cause a denial of service via renderer crash or execute arbitrary
code with the privileges of the sandboxed render process. (CVE-2014-7908)

An uninitialized memory read was discovered in Skia. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via renderer crash.
(CVE-2014-7909)

Multiple security issues were discovered in Chromium. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to read uninitialized memory, cause a denial of
service via application crash or execute arbitrary code with the
privileges of the user invoking the program. (CVE-2014-7910)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
liboxideqtcore0

1.3.4-0ubuntu0.14.10.1
oxideqt-codecs

1.3.4-0ubuntu0.14.10.1
oxideqt-codecs-extra

1.3.4-0ubuntu0.14.10.1
Ubuntu 14.04 LTS:
liboxideqtcore0

1.3.4-0ubuntu0.14.04.1
oxideqt-codecs

1.3.4-0ubuntu0.14.04.1
oxideqt-codecs-extra

1.3.4-0ubuntu0.14.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-7904,

CVE-2014-7907,

CVE-2014-7908,

CVE-2014-7909,

CVE-2014-7910

USN-2411-1: mountall vulnerability

Ubuntu Security Notice USN-2411-1

18th November, 2014

mountall vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10

Summary

mountall could mount certain filesystems with the wrong permissions.

Software description

  • mountall
    – filesystem mounting tool

Details

Saurav Sengupta discovered that mountall incorrectly handled umask when
calling the mount utility, resulting in certain filesystems possibly being
mounted with incorrect permissions.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
mountall

2.54ubuntu0.14.10.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2014-1421

USN-2409-1: QEMU vulnerabilities

Ubuntu Security Notice USN-2409-1

13th November, 2014

qemu, qemu-kvm vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

Several security issues were fixed in QEMU.

Software description

  • qemu
    – Machine emulator and virtualizer

  • qemu-kvm
    – Machine emulator and virtualizer

Details

Laszlo Ersek discovered that QEMU incorrectly handled memory in the vga
device. A malicious guest could possibly use this issue to read arbitrary
host memory. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10.
(CVE-2014-3615)

Xavier Mehrenberger and Stephane Duverger discovered that QEMU incorrectly
handled certain udp packets when using guest networking. A malicious guest
could possibly use this issue to cause a denial of service. (CVE-2014-3640)

It was discovered that QEMU incorrectly handled parameter validation in
the vmware_vga device. A malicious guest could possibly use this issue to
write into memory of the host, leading to privilege escalation.
(CVE-2014-3689)

It was discovered that QEMU incorrectly handled USB xHCI controller live
migration. An attacker could possibly use this issue to cause a denial of
service, or possibly execute arbitrary code. This issue only affected
Ubuntu 14.04 LTS. (CVE-2014-5263)

Michael S. Tsirkin discovered that QEMU incorrectly handled memory in the
ACPI PCI hotplug interface. A malicious guest could possibly use this issue
to access memory of the host, leading to information disclosure or
privilege escalation. This issue only affected Ubuntu 14.04 LTS.
(CVE-2014-5388)

James Spadaro discovered that QEMU incorrectly handled certain VNC
bytes_per_pixel values. An attacker having access to a VNC console could
possibly use this issue to cause a guest to crash, resulting in a denial of
service. (CVE-2014-7815)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
qemu-system-misc

2.1+dfsg-4ubuntu6.1
qemu-system

2.1+dfsg-4ubuntu6.1
qemu-system-aarch64

2.1+dfsg-4ubuntu6.1
qemu-system-x86

2.1+dfsg-4ubuntu6.1
qemu-system-sparc

2.1+dfsg-4ubuntu6.1
qemu-system-arm

2.1+dfsg-4ubuntu6.1
qemu-system-ppc

2.1+dfsg-4ubuntu6.1
qemu-system-mips

2.1+dfsg-4ubuntu6.1
Ubuntu 14.04 LTS:
qemu-system-misc

2.0.0+dfsg-2ubuntu1.7
qemu-system

2.0.0+dfsg-2ubuntu1.7
qemu-system-aarch64

2.0.0+dfsg-2ubuntu1.7
qemu-system-x86

2.0.0+dfsg-2ubuntu1.7
qemu-system-sparc

2.0.0+dfsg-2ubuntu1.7
qemu-system-arm

2.0.0+dfsg-2ubuntu1.7
qemu-system-ppc

2.0.0+dfsg-2ubuntu1.7
qemu-system-mips

2.0.0+dfsg-2ubuntu1.7
Ubuntu 12.04 LTS:
qemu-kvm

1.0+noroms-0ubuntu14.19
Ubuntu 10.04 LTS:
qemu-kvm

0.12.3+noroms-0ubuntu9.25

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2014-3615,

CVE-2014-3640,

CVE-2014-3689,

CVE-2014-5263,

CVE-2014-5388,

CVE-2014-7815

USN-2405-1: OpenStack Cinder vulnerabilities

Ubuntu Security Notice USN-2405-1

11th November, 2014

cinder vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

OpenStack Cinder could be made to expose sensitive information over the
network.

Software description

  • cinder
    – OpenStack storage service

Details

Duncan Thomas discovered that OpenStack Cinder did not properly track the
file format when using the GlusterFS of Smbfs drivers. A remote
authenticated user could exploit this to potentially obtain file contents
from the compute host. (CVE-2014-3641)

Amrith Kumar discovered that OpenStack Cinder did not properly sanitize log
message contents. Under certain circumstances, a local attacker with read
access to Cinder log files could obtain access to sensitive information.
(CVE-2014-7230)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
python-cinder

1:2014.1.3-0ubuntu1.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-3641,

CVE-2014-7230

USN-2408-1: OpenStack Neutron vulnerability

Ubuntu Security Notice USN-2408-1

11th November, 2014

neutron vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

OpenStack Neutron would allow unintended access to configuration over the
network.

Software description

  • neutron
    – OpenStack Virtual Network Service

Details

Elena Ezhova discovered that OpenStack Neutron did not properly perform
access control checks for attributes. A remote authenticated attacker could
exploit this to bypass intended access controls and reset admin-only
attributes to default values.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
python-neutron

1:2014.1.3-0ubuntu1.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-6414

USN-2407-1: OpenStack Nova vulnerabilities

Ubuntu Security Notice USN-2407-1

11th November, 2014

nova vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

OpenStack Nova could be made to expose sensitive information.

Software description

  • nova
    – OpenStack Compute cloud infrastructure

Details

Garth Mollett discovered that OpenStack Nova did not properly clean up an
instance when using rescue mode with the VMWare driver. A remove
authenticated user could exploit this to bypass intended quota limits. By
default, Ubuntu does not use the VMWare driver. (CVE-2014-3608)

Amrith Kumar discovered that OpenStack Nova did not properly sanitize log
message contents. Under certain circumstances, a local attacker with read
access to Nova log files could obtain access to sensitive information.
(CVE-2014-7230)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
python-nova

1:2014.1.3-0ubuntu1.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-3608,

CVE-2014-7230

USN-2406-1: OpenStack Keystone vulnerability

Ubuntu Security Notice USN-2406-1

11th November, 2014

keystone vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

OpenStack Keystone could be made to expose sensitive information over the
network.

Software description

  • keystone
    – OpenStack identity service

Details

Brant Knudson discovered that OpenStack Keystone did not properly perform
input sanitization when performing endpoint catalog substitution. A remote
attacker with privileged access for creating endpoints could exploit this
to obtain sensitive information.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
python-keystone

1:2014.1.3-0ubuntu2.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-3621

USN-2402-1: KDE workspace vulnerability

Ubuntu Security Notice USN-2402-1

10th November, 2014

kde-workspace vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

KDE workspace could be made to crash or run programs as an administrator.

Software description

  • kde-workspace
    – KDE Plasma Workspace components

Details

David Edmundson discovered that the KDE Clock KCM policykit helper did not
properly guard against untrusted input. Under certain circumstances, a
process running under the user’s session could exploit this to run
programs as the administrator.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
kde-workspace-bin

4:4.8.5-0ubuntu0.4

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-8651

USN-2401-1: Konversation vulnerability

Ubuntu Security Notice USN-2401-1

10th November, 2014

konversation vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

Konversation could be made to crash if it received specially crafted
network traffic.

Software description

  • konversation
    – Internet Relay Chat (IRC) client for KDE

Details

Manuel Nickschas discovered that Konversation did not properly perform
input sanitization when using Blowfish ECB encryption. A remote attacker
could exploit this to cause a denial of service.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
konversation

1.4-1ubuntu2.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Konversation to make
all the necessary changes.

References

CVE-2014-8483

USN-2403-1: GnuTLS vulnerability

Ubuntu Security Notice USN-2403-1

11th November, 2014

gnutls28 vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10

Summary

GnuTLS could be made to crash or run programs if it processed a specially
crafted certificate.

Software description

  • gnutls28
    – GNU TLS library – commandline utilities

Details

Sean Burford discovered that GnuTLS incorrectly handled printing certain
elliptic curve parameters. A malicious remote server or client could use
this issue to cause GnuTLS to crash, resulting in a denial of service, or
possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
gnutls-bin

3.2.16-1ubuntu2.1
libgnutls-openssl27

3.2.16-1ubuntu2.1
libgnutls-deb0-28

3.2.16-1ubuntu2.1
libgnutlsxx28

3.2.16-1ubuntu2.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-8564