Category Archives: Ubuntu

Ubuntu Security Notices

USN-2833-1: Firefox vulnerabilities

Ubuntu Security Notice USN-2833-1

15th December, 2015

firefox vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Firefox could be made to crash or run programs as your login if it
opened a malicious website.

Software description

  • firefox
    – Mozilla Open Source web browser

Details

Andrei Vaida, Jesse Ruderman, Bob Clary, Christian Holler, Jesse Ruderman,
Eric Rahm, Robert Kaiser, Harald Kirschner, and Michael Henretty
discovered multiple memory safety issues in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invoking
Firefox. (CVE-2015-7201, CVE-2015-7202)

Ronald Crane discovered three buffer overflows through code inspection.
If a user were tricked in to opening a specially crafted website, an
attacker could potentially exploit these to cause a denial of service via
application crash, or execute arbitrary code with the privileges of the
user invoking Firefox. (CVE-2015-7203, CVE-2015-7220, CVE-2015-7221)

Cajus Pollmeier discovered a crash during javascript variable assignments
in some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to execute
arbitrary code with the privileges of the user invoking Firefox.
(CVE-2015-7204)

Ronald Crane discovered a buffer overflow through code inspection. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to cause a denial of service via
application crash, or execute arbitrary code with the privileges of the
user invoking Firefox. (CVE-2015-7205)

It was discovered that it is possible to read cross-origin URLs following
a redirect if performance.getEntries() is used with an iframe to host a
page. If a user were tricked in to opening a specially crafted website, an
attacker could potentially exploit this to bypass same-origin
restrictions. (CVE-2015-7207)

It was discovered that Firefox allows for control characters to be set in
cookies. An attacker could potentially exploit this to conduct cookie
injection attacks on some web servers. (CVE-2015-7208)

Looben Yang discovered a use-after-free in WebRTC when closing channels in
some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to cause a
denial of service via application crash, or execute arbitrary code with
the privileges of the user invoking Firefox. (CVE-2015-7210)

Abdulrahman Alqabandi discovered that hash symbol is incorrectly handled
when parsing data: URLs. An attacker could potentially exploit this to
conduct URL spoofing attacks. (CVE-2015-7211)

Abhishek Arya discovered an integer overflow when allocating large
textures. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to cause a denial of
service via application crash, or execute arbitrary code with the
privileges of the user invoking Firefox. (CVE-2015-7212)

Ronald Crane dicovered an integer overflow when processing MP4 format
video in some circumstances. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to
cause a denial of service via application crash, or execute arbitrary code
with the privileges of the user invoking Firefox. (CVE-2015-7213)

Tsubasa Iinuma discovered a way to bypass same-origin restrictions using
data: and view-source: URLs. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to
obtain sensitive information and read local files. (CVE-2015-7214)

Masato Kinugawa discovered a cross-origin information leak in error events
in web workers. An attacker could potentially exploit this to obtain
sensitive information. (CVE-2015-7215)

Gustavo Grieco discovered that the file chooser crashed on malformed
images due to flaws in the Jasper library. If a user were tricked in to
opening a specially crafted website, an attacker could potentially
exploit this to cause a denial of service.
(CVE-2015-7216, CVE-2015-7217)

Stuart Larsen discoverd two integer underflows when handling malformed
HTTP/2 frames in some circumstances. If a user were tricked in to opening
a specially crafted website, an attacker could potentially exploit these
to cause a denial of service via application crash. (CVE-2015-7218,
CVE-2015-7219)

Gerald Squelart discovered an integer underflow in the libstagefright
library when parsing MP4 format video in some circumstances. If a user
were tricked in to opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invoking
Firefox. (CVE-2015-7222)

Kris Maglione discovered a mechanism where web content could use
WebExtension APIs to execute code with the privileges of a particular
WebExtension. If a user were tricked in to opening a specially crafted
website with a vulnerable extension installed, an attacker could
potentially exploit this to obtain sensitive information or conduct
cross-site scripting (XSS) attacks. (CVE-2015-7223)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
firefox

43.0+build1-0ubuntu0.15.10.1
Ubuntu 15.04:
firefox

43.0+build1-0ubuntu0.15.04.1
Ubuntu 14.04 LTS:
firefox

43.0+build1-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
firefox

43.0+build1-0ubuntu0.12.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make
all the necessary changes.

References

CVE-2015-7201,

CVE-2015-7202,

CVE-2015-7203,

CVE-2015-7204,

CVE-2015-7205,

CVE-2015-7207,

CVE-2015-7208,

CVE-2015-7210,

CVE-2015-7211,

CVE-2015-7212,

CVE-2015-7213,

CVE-2015-7214,

CVE-2015-7215,

CVE-2015-7216,

CVE-2015-7217,

CVE-2015-7218,

CVE-2015-7219,

CVE-2015-7220,

CVE-2015-7221,

CVE-2015-7222,

CVE-2015-7223

USN-2837-1: Bind vulnerability

Ubuntu Security Notice USN-2837-1

15th December, 2015

bind9 vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Bind could be made to crash if it received specially crafted network
traffic.

Software description

  • bind9
    – Internet Domain Name Server

Details

It was discovered that Bind incorrectly handled responses with malformed
class attributes. A remote attacker could use this issue to cause Bind to
crash, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
bind9

1:9.9.5.dfsg-11ubuntu1.1
Ubuntu 15.04:
bind9

1:9.9.5.dfsg-9ubuntu0.4
Ubuntu 14.04 LTS:
bind9

1:9.9.5.dfsg-3ubuntu0.6
Ubuntu 12.04 LTS:
bind9

1:9.8.1.dfsg.P1-4ubuntu0.14

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-8000

USN-2836-1: GRUB vulnerability

Ubuntu Security Notice USN-2836-1

15th December, 2015

grub2 vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

GRUB password protection can be bypassed.

Software description

  • grub2
    – GRand Unified Bootloader

Details

Hector Marco and Ismael Ripoll discovered that GRUB incorrectly handled
the backspace key when configured to use authentication. A local attacker
could use this issue to bypass GRUB password protection.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
grub2-common

2.02~beta2-29ubuntu0.2
Ubuntu 15.04:
grub2-common

2.02~beta2-22ubuntu1.4
Ubuntu 14.04 LTS:
grub2-common

2.02~beta2-9ubuntu1.6
Ubuntu 12.04 LTS:
grub2-common

1.99-21ubuntu3.19

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2015-8370

USN-2834-1: libxml2 vulnerabilities

Ubuntu Security Notice USN-2834-1

14th December, 2015

libxml2 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

libxml2 could be made to crash if it opened a specially crafted file.

Software description

  • libxml2
    – GNOME XML library

Details

Kostya Serebryany discovered that libxml2 incorrectly handled certain
malformed documents. If a user or automated system were tricked into
opening a specially crafted document, an attacker could possibly cause
libxml2 to crash, resulting in a denial of service. (CVE-2015-5312,
CVE-2015-7497, CVE-2015-7498, CVE-2015-7499,CVE-2015-7500)

Hugh Davenport discovered that libxml2 incorrectly handled certain
malformed documents. If a user or automated system were tricked into
opening a specially crafted document, an attacker could possibly cause
libxml2 to crash, resulting in a denial of service. (CVE-2015-8241,
CVE-2015-8242)

Hanno Boeck discovered that libxml2 incorrectly handled certain
malformed documents. If a user or automated system were tricked into
opening a specially crafted document, an attacker could possibly cause
libxml2 to crash, resulting in a denial of service. This issue only applied
to Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-8317)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
libxml2

2.9.2+zdfsg1-4ubuntu0.2
Ubuntu 15.04:
libxml2

2.9.2+dfsg1-3ubuntu0.2
Ubuntu 14.04 LTS:
libxml2

2.9.1+dfsg1-3ubuntu4.6
Ubuntu 12.04 LTS:
libxml2

2.7.8.dfsg-5.1ubuntu4.13

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2015-5312,

CVE-2015-7497,

CVE-2015-7498,

CVE-2015-7499,

CVE-2015-7500,

CVE-2015-8241,

CVE-2015-8242,

CVE-2015-8317

USN-2825-1: Oxide vulnerabilities

Ubuntu Security Notice USN-2825-1

10th December, 2015

oxide-qt vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in Oxide.

Software description

  • oxide-qt
    – Web browser engine library for Qt (QML plugin)

Details

Multiple use-after-free bugs were discovered in the application cache
implementation in Chromium. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit these to
cause a denial of service via application crash, or execute arbitrary code
with the privileges of the user invoking the program. (CVE-2015-6765,
CVE-2015-6766, CVE-2015-6767)

Several security issues were discovered in the DOM implementation in
Chromium. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit these to bypass same
origin restrictions. (CVE-2015-6768, CVE-2015-6770)

A security issue was discovered in the provisional-load commit
implementation in Chromium. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to
bypass same origin restrictions. (CVE-2015-6769)

An out-of-bounds read was discovered in the array map and filter
operations in V8 in some circumstances. If a user were tricked in to
opening a specially crafted website, an attacker could potentially
exploit this to cause a denial of service via renderer crash.
(CVE-2015-6771)

It was discovered that the DOM implementation in Chromium does not prevent
javascript: URL navigation while a document is being detached. If a user
were tricked in to opening a specially crafted website, an attacker could
potentially exploit this to bypass same origin restrictions.
(CVE-2015-6772)

An out-of bounds read was discovered in Skia in some cirumstances. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to cause a denial of service via renderer
crash. (CVE-2015-6773)

A use-after-free was discovered in the DOM implementation in Chromium. If
a user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to cause a denial of service via renderer
crash or execute arbitrary code with the privileges of the sandboxed
render process. (CVE-2015-6777)

It was discovered that the Document::open function in Chromium did not
ensure that page-dismissal event handling is compatible with modal dialog
blocking. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to spoof application
UI content. (CVE-2015-6782)

It was discovered that the page serializer in Chromium mishandled MOTW
comments for URLs in some circumstances. An attacker could potentially
exploit this to inject HTML content. (CVE-2015-6784)

It was discovered that the Content Security Policy (CSP) implementation
in Chromium accepted an x.y hostname as a match for a *.x.y pattern. An
attacker could potentially exploit this to bypass intended access
restrictions. (CVE-2015-6785)

It was discovered that the Content Security Policy (CSP) implementation
in Chromium accepted blob:, data: and filesystem: URLs as a match for a
* pattern. An attacker could potentially exploit this to bypass intended
access restrictions. (CVE-2015-6786)

Multiple security issues were discovered in Chromium. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to read uninitialized memory, cause a denial
of service via application crash or execute arbitrary code with the
privileges of the user invoking the program. (CVE-2015-6787)

Multiple security issues were discovered in V8. If a user were tricked
in to opening a specially crafted website, an attacker could potentially
exploit these to read uninitialized memory, cause a denial of service via
renderer crash or execute arbitrary code with the privileges of the
sandboxed render process. (CVE-2015-8478)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
liboxideqtcore0

1.11.3-0ubuntu0.15.10.1
Ubuntu 15.04:
liboxideqtcore0

1.11.3-0ubuntu0.15.04.1
Ubuntu 14.04 LTS:
liboxideqtcore0

1.11.3-0ubuntu0.14.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-6765,

CVE-2015-6766,

CVE-2015-6767,

CVE-2015-6768,

CVE-2015-6769,

CVE-2015-6770,

CVE-2015-6771,

CVE-2015-6772,

CVE-2015-6773,

CVE-2015-6777,

CVE-2015-6782,

CVE-2015-6784,

CVE-2015-6785,

CVE-2015-6786,

CVE-2015-6787,

CVE-2015-8478

USN-2831-2: foomatic-filters vulnerability

Ubuntu Security Notice USN-2831-2

7th December, 2015

foomatic-filters vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

foomatic-filters could be made to run programs as the lp user if it
processed a specially crafted print job.

Software description

  • foomatic-filters
    – OpenPrinting printer support – filters

Details

Michal Kowalczyk discovered that the foomatic-filters foomatic-rip filter
incorrectly stripped shell escape characters. A remote attacker could
possibly use this issue to execute arbitrary code as the lp user.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
foomatic-filters

4.0.16-0ubuntu0.3

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-8327

USN-2831-1: cups-filters vulnerability

Ubuntu Security Notice USN-2831-1

7th December, 2015

cups-filters vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS

Summary

cups-filters could be made to run programs as the lp user if it processed a
specially crafted print job.

Software description

  • cups-filters
    – OpenPrinting CUPS Filters

Details

Michal Kowalczyk discovered that the cups-filters foomatic-rip filter
incorrectly stripped shell escape characters. A remote attacker could
possibly use this issue to execute arbitrary code as the lp user.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
cups-filters

1.0.76-1ubuntu0.1
Ubuntu 15.04:
cups-filters

1.0.67-0ubuntu2.5
Ubuntu 14.04 LTS:
cups-filters

1.0.52-0ubuntu1.6

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-8327

USN-2830-1: OpenSSL vulnerabilities

Ubuntu Security Notice USN-2830-1

7th December, 2015

openssl vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in OpenSSL.

Software description

  • openssl
    – Secure Socket Layer (SSL) cryptographic library and tools

Details

Guy Leaver discovered that OpenSSL incorrectly handled a ServerKeyExchange
for an anonymous DH ciphersuite with the value of p set to 0. A remote
attacker could possibly use this issue to cause OpenSSL to crash, resulting
in a denial of service. This issue only applied to Ubuntu 15.10.
(CVE-2015-1794)

Hanno Böck discovered that the OpenSSL Montgomery squaring procedure
algorithm may produce incorrect results when being used on x86_64. A remote
attacker could possibly use this issue to break encryption. This issue only
applied to Ubuntu 15.10. (CVE-2015-3193)

Loïc Jonas Etienne discovered that OpenSSL incorrectly handled ASN.1
signatures with a missing PSS parameter. A remote attacker could possibly
use this issue to cause OpenSSL to crash, resulting in a denial of service.
(CVE-2015-3194)

Adam Langley discovered that OpenSSL incorrectly handled malformed
X509_ATTRIBUTE structures. A remote attacker could possibly use this issue
to cause OpenSSL to consume resources, resulting in a denial of service.
(CVE-2015-3195)

It was discovered that OpenSSL incorrectly handled PSK identity hints. A
remote attacker could possibly use this issue to cause OpenSSL to crash,
resulting in a denial of service. This issue only applied to Ubuntu 12.04
LTS, Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-3196)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
libssl1.0.0

1.0.2d-0ubuntu1.2
Ubuntu 15.04:
libssl1.0.0

1.0.1f-1ubuntu11.5
Ubuntu 14.04 LTS:
libssl1.0.0

1.0.1f-1ubuntu2.16
Ubuntu 12.04 LTS:
libssl1.0.0

1.0.1-4ubuntu5.32

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2015-1794,

CVE-2015-3193,

CVE-2015-3194,

CVE-2015-3195,

CVE-2015-3196

USN-2832-1: libsndfile vulnerabilities

Ubuntu Security Notice USN-2832-1

7th December, 2015

libsndfile vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

libsndfile could be made to crash or run programs as your login if it
opened a specially crafted file.

Software description

  • libsndfile
    – Library for reading/writing audio files

Details

It was discovered that libsndfile incorrectly handled memory when parsing
malformed files. A remote attacker could use this issue to cause
libsndfile to crash, resulting in a denial of service. This issue only
applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-9496)

Joshua Rogers discovered that libsndfile incorrectly handled division when
parsing malformed files. A remote attacker could use this issue to cause
libsndfile to crash, resulting in a denial of service. (CVE-2014-9756)

Marco Romano discovered that libsndfile incorrectly handled certain
malformed AIFF files. A remote attacker could use this issue to cause
libsndfile to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2015-7805)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
libsndfile1

1.0.25-9.1ubuntu0.15.10.1
Ubuntu 15.04:
libsndfile1

1.0.25-9.1ubuntu0.15.04.1
Ubuntu 14.04 LTS:
libsndfile1

1.0.25-7ubuntu2.1
Ubuntu 12.04 LTS:
libsndfile1

1.0.25-4ubuntu0.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart your session to make
all the necessary changes.

References

CVE-2014-9496,

CVE-2014-9756,

CVE-2015-7805

USN-2829-2: Linux kernel (Vivid HWE) vulnerabilities

Ubuntu Security Notice USN-2829-2

4th December, 2015

linux-lts-vivid vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in the kernel.

Software description

  • linux-lts-vivid
    – Linux hardware enablement kernel from Vivid

Details

It was discovered that the SCTP protocol implementation in the Linux kernel
performed an incorrect sequence of protocol-initialization steps. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2015-5283)

Dmitry Vyukov discovered that the Linux kernel’s keyring handler attempted
to garbage collect incompletely instantiated keys. A local unprivileged
attacker could use this to cause a denial of service (system crash).
(CVE-2015-7872)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
linux-image-3.19.0-39-powerpc64-emb

3.19.0-39.44~14.04.1
linux-image-3.19.0-39-powerpc64-smp

3.19.0-39.44~14.04.1
linux-image-3.19.0-39-generic

3.19.0-39.44~14.04.1
linux-image-3.19.0-39-powerpc-smp

3.19.0-39.44~14.04.1
linux-image-3.19.0-39-generic-lpae

3.19.0-39.44~14.04.1
linux-image-3.19.0-39-powerpc-e500mc

3.19.0-39.44~14.04.1
linux-image-3.19.0-39-lowlatency

3.19.0-39.44~14.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2015-5283,

CVE-2015-7872