Category Archives: Ubuntu

Ubuntu Security Notices

USN-2911-2: Linux kernel (OMAP4) vulnerability

Ubuntu Security Notice USN-2911-2

22nd February, 2016

linux-ti-omap4 vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

The system could be made to crash under certain conditions.

Software description

  • linux-ti-omap4
    – Linux kernel for OMAP4

Details

It was discovered that the Linux kernel keyring subsystem contained a race
between read and revoke operations. A local attacker could use this to
cause a denial of service (system crash).

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
linux-image-3.2.0-1477-omap4

3.2.0-1477.100

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2015-7550

USN-2911-1: Linux kernel vulnerability

Ubuntu Security Notice USN-2911-1

22nd February, 2016

linux vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

The system could be made to crash under certain conditions.

Software description

  • linux
    – Linux kernel

Details

It was discovered that the Linux kernel keyring subsystem contained a race
between read and revoke operations. A local attacker could use this to
cause a denial of service (system crash).

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
linux-image-3.2.0-99-generic-pae

3.2.0-99.139
linux-image-3.2.0-99-powerpc64-smp

3.2.0-99.139
linux-image-3.2.0-99-generic

3.2.0-99.139
linux-image-3.2.0-99-virtual

3.2.0-99.139
linux-image-3.2.0-99-highbank

3.2.0-99.139
linux-image-3.2.0-99-powerpc-smp

3.2.0-99.139
linux-image-3.2.0-99-omap

3.2.0-99.139

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2015-7550

USN-2895-1: Oxide vulnerabilities

Ubuntu Security Notice USN-2895-1

18th February, 2016

oxide-qt vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in Oxide.

Software description

  • oxide-qt
    – Web browser engine library for Qt (QML plugin)

Details

The DOM implementation in Chromium did not properly restrict frame-attach
operations from occurring during or after frame-detach operations. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to bypass same-origin restrictions.
(CVE-2016-1623)

An integer underflow was discovered in Brotli. If a user were tricked in
to opening a specially crafted website, an attacker could potentially
exploit this to cause a denial of service via application crash, or
execute arbitrary code with the privileges of the user invoking the
program. (CVE-2016-1624)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
liboxideqtcore0

1.12.6-0ubuntu0.15.10.1
Ubuntu 14.04 LTS:
liboxideqtcore0

1.12.6-0ubuntu0.14.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-1623,

CVE-2016-1624

USN-2901-1: xdelta3 vulnerability

Ubuntu Security Notice USN-2901-1

17th February, 2016

xdelta3 vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 14.04 LTS

Summary

xdelta3 could be made to crash or run programs if it opened a specially
crafted file.

Software description

  • xdelta3
    – Diff utility which works with binary files

Details

It was discovered that xdelta3 incorrectly handled certain files. If a user
or automated system were tricked into processing a specially-crafted file,
a remote attacker could use this issue to cause xdelta3 to crash, resulting
in a denial of service, or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
xdelta3

3.0.8-dfsg-1ubuntu0.15.10.2
Ubuntu 14.04 LTS:
xdelta3

3.0.7-dfsg-2ubuntu0.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-9765

USN-2903-1: NSS vulnerability

Ubuntu Security Notice USN-2903-1

17th February, 2016

nss vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

NSS could be made to expose sensitive information.

Software description

  • nss
    – Network Security Service library

Details

Hanno Böck discovered that NSS incorrectly handled certain division
functions, possibly leading to cryptographic weaknesses. (CVE-2015-1938)

This update also refreshes the NSS package to version 3.21 which includes
the latest CA certificate bundle, and removes the SPI CA.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
libnss3

2:3.21-0ubuntu0.15.10.1
Ubuntu 14.04 LTS:
libnss3

2:3.21-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
libnss3

2:3.21-0ubuntu0.12.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use NSS, such as Evolution and Chromium, to make all the necessary
changes.

References

CVE-2016-1938

USN-2902-1: graphite2 vulnerabilities

Ubuntu Security Notice USN-2902-1

17th February, 2016

graphite2 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 14.04 LTS

Summary

graphite2 could be made to crash or run programs as your login if it
opened a specially crafted font.

Software description

  • graphite2
    – Font rendering engine for Complex Scripts

Details

Yves Younan discovered that graphite2 incorrectly handled certain malformed
fonts. If a user or automated system were tricked into opening a specially-
crafted font file, a remote attacker could use this issue to cause
graphite2 to crash, resulting in a denial of service, or possibly execute
arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
libgraphite2-3

1.2.4-3ubuntu1.1
Ubuntu 14.04 LTS:
libgraphite2-3

1.2.4-1ubuntu1.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart applications using
graphite2, such as LibreOffice, to make all the necessary changes.

References

CVE-2016-1521,

CVE-2016-1522,

CVE-2016-1523,

CVE-2016-1526

USN-2899-1: LibreOffice vulnerabilities

Ubuntu Security Notice USN-2899-1

16th February, 2016

libreoffice vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

LibreOffice could be made to crash or run programs as your login if it
opened a specially crafted file.

Software description

  • libreoffice
    – Office productivity suite

Details

It was discovered that LibreOffice incorrectly handled LWP document files.
If a user were tricked into opening a specially crafted LWP document, a
remote attacker could cause LibreOffice to crash, and possibly execute
arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
libreoffice-core

1:5.0.5~rc2-0ubuntu2
Ubuntu 14.04 LTS:
libreoffice-core

1:4.2.8-0ubuntu4
Ubuntu 12.04 LTS:
libreoffice-core

1:3.5.7-0ubuntu10

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart LibreOffice to make all
the necessary changes.

References

CVE-2016-0794,

CVE-2016-0795

USN-2855-2: Samba regression

Ubuntu Security Notice USN-2855-2

16th February, 2016

samba regression

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

USN-2855-1 introduced a regression in Samba.

Software description

  • samba
    – SMB/CIFS file, print, and login server for Unix

Details

USN-2855-1 fixed vulnerabilities in Samba. The upstream fix for
CVE-2015-5252 introduced a regression in certain specific environments.
This update fixes the problem.

Original advisory details:

Thilo Uttendorfer discovered that the Samba LDAP server incorrectly handled
certain packets. A remote attacker could use this issue to cause the LDAP
server to stop responding, resulting in a denial of service. This issue
only affected Ubuntu 14.04 LTS, Ubuntu 15.04 and Ubuntu 15.10.
(CVE-2015-3223)

Jan Kasprzak discovered that Samba incorrectly handled certain symlinks. A
remote attacker could use this issue to access files outside the exported
share path. (CVE-2015-5252)

Stefan Metzmacher discovered that Samba did not enforce signing when
creating encrypted connections. If a remote attacker were able to perform a
man-in-the-middle attack, this flaw could be exploited to view sensitive
information. (CVE-2015-5296)

It was discovered that Samba incorrectly performed access control when
using the VFS shadow_copy2 module. A remote attacker could use this issue
to access snapshots, contrary to intended permissions. (CVE-2015-5299)

Douglas Bagnall discovered that Samba incorrectly handled certain string
lengths. A remote attacker could use this issue to possibly access
sensitive information. (CVE-2015-5330)

It was discovered that the Samba LDAP server incorrectly handled certain
packets. A remote attacker could use this issue to cause the LDAP server to
stop responding, resulting in a denial of service. This issue only affected
Ubuntu 14.04 LTS, Ubuntu 15.04 and Ubuntu 15.10. (CVE-2015-7540)

Andrew Bartlett discovered that Samba incorrectly checked administrative
privileges during creation of machine accounts. A remote attacker could
possibly use this issue to bypass intended access restrictions in certain
environments. This issue only affected Ubuntu 14.04 LTS, Ubuntu 15.04 and
Ubuntu 15.10. (CVE-2015-8467)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
samba

2:4.1.17+dfsg-4ubuntu3.2
Ubuntu 14.04 LTS:
samba

2:4.1.6+dfsg-1ubuntu2.14.04.12
Ubuntu 12.04 LTS:
samba

2:3.6.3-2ubuntu2.14

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

LP: 1545750

USN-2900-1: GNU C Library vulnerability

Ubuntu Security Notice USN-2900-1

16th February, 2016

eglibc, glibc vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

GNU C Library could be made to crash or run programs if it received
specially crafted network traffic.

Software description

  • eglibc
    – GNU C Library

  • glibc
    – GNU C Library

Details

It was discovered that the GNU C Library incorrectly handled receiving
responses while performing DNS resolution. A remote attacker could use this
issue to cause the GNU C Library to crash, resulting in a denial of
service, or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
libc6

2.21-0ubuntu4.1
Ubuntu 14.04 LTS:
libc6

2.19-0ubuntu6.7
Ubuntu 12.04 LTS:
libc6

2.15-0ubuntu10.13

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2015-7547

USN-2896-1: Libgcrypt vulnerability

Ubuntu Security Notice USN-2896-1

15th February, 2016

libgcrypt11, libgcrypt20 vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Libgcrypt could be made to expose sensitive information.

Software description

  • libgcrypt11
    – LGPL Crypto library

  • libgcrypt20
    – LGPL Crypto library

Details

Daniel Genkin, Lev Pachmanov, Itamar Pipman and Eran Tromer discovered
that Libgcrypt was susceptible to an attack via physical side channels. A
local attacker could use this attack to possibly recover private keys.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
libgcrypt20

1.6.3-2ubuntu1.1
Ubuntu 14.04 LTS:
libgcrypt11

1.5.3-2ubuntu4.3
Ubuntu 12.04 LTS:
libgcrypt11

1.5.0-3ubuntu0.5

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-7511