Category Archives: Ubuntu

Ubuntu Security Notices

USN-2789-1: XScreenSaver vulnerability

Ubuntu Security Notice USN-2789-1

3rd November, 2015

xscreensaver vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

The system could be made to expose sensitive information.

Software description

  • xscreensaver
    – Automatic screensaver for X

Details

It was discovered that XScreenSaver incorrectly handled unplugging an
external monitor. An attacker with physical access could use this flaw to
gain access to a locked session.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
xscreensaver

5.15-2ubuntu1.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart your session to make
all the necessary changes.

References

CVE-2015-8025

USN-2788-1: unzip vulnerabilities

Ubuntu Security Notice USN-2788-1

29th October, 2015

unzip vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

unzip could be made to crash or run programs as your login if it opened a
specially crafted file.

Software description

  • unzip
    – De-archiver for .zip files

Details

Gustavo Grieco discovered that unzip incorrectly handled certain password
protected archives. If a user or automated system were tricked into
processing a specially crafted zip archive, an attacker could possibly
execute arbitrary code. (CVE-2015-7696)

Gustavo Grieco discovered that unzip incorrectly handled certain malformed
archives. If a user or automated system were tricked into processing a
specially crafted zip archive, an attacker could possibly cause unzip to
hang, resulting in a denial of service. (CVE-2015-7697)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
unzip

6.0-17ubuntu1.1
Ubuntu 15.04:
unzip

6.0-13ubuntu3.1
Ubuntu 14.04 LTS:
unzip

6.0-9ubuntu1.4
Ubuntu 12.04 LTS:
unzip

6.0-4ubuntu2.4

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-7696,

CVE-2015-7697

USN-2784-1: OpenJDK 7 vulnerabilities

Ubuntu Security Notice USN-2784-1

28th October, 2015

openjdk-7 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in OpenJDK 7.

Software description

  • openjdk-7
    – Open Source Java implementation

Details

Multiple vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure, data integrity and availability. An attacker
could exploit these to cause a denial of service or expose sensitive
data over the network. (CVE-2015-4805, CVE-2015-4835, CVE-2015-4843,
CVE-2015-4844, CVE-2015-4860, CVE-2015-4868, CVE-2015-4881,
CVE-2015-4883)

A vulnerability was discovered in the OpenJDK JRE related to
information disclosure and data integrity. An attacker could exploit
this to expose sensitive data over the network. (CVE-2015-4806)

A vulnerability was discovered in the OpenJDK JRE related to data
integrity. An attacker could exploit this expose sensitive data over
the network. (CVE-2015-4872)

Multiple vulnerabilities were discovered in the OpenJDK JRE related
to information disclosure. An attacker could exploit these to expose
sensitive data over the network. (CVE-2015-4734, CVE-2015-4840,
CVE-2015-4842, CVE-2015-4903)

Multiple vulnerabilities were discovered in the OpenJDK JRE related
to availability. An attacker could exploit these to cause a denial of
service. (CVE-2015-4803, CVE-2015-4882, CVE-2015-4893, CVE-2015-4911)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
openjdk-7-jre-lib

7u85-2.6.1-5ubuntu0.15.10.1
openjdk-7-jre-zero

7u85-2.6.1-5ubuntu0.15.10.1
icedtea-7-jre-jamvm

7u85-2.6.1-5ubuntu0.15.10.1
openjdk-7-jre-headless

7u85-2.6.1-5ubuntu0.15.10.1
openjdk-7-jre

7u85-2.6.1-5ubuntu0.15.10.1
Ubuntu 15.04:
openjdk-7-jre-lib

7u85-2.6.1-5ubuntu0.15.04.1
openjdk-7-jre-zero

7u85-2.6.1-5ubuntu0.15.04.1
icedtea-7-jre-jamvm

7u85-2.6.1-5ubuntu0.15.04.1
openjdk-7-jre-headless

7u85-2.6.1-5ubuntu0.15.04.1
openjdk-7-jre

7u85-2.6.1-5ubuntu0.15.04.1
Ubuntu 14.04 LTS:
openjdk-7-jre-lib

7u85-2.6.1-5ubuntu0.14.04.1
openjdk-7-jre-zero

7u85-2.6.1-5ubuntu0.14.04.1
icedtea-7-jre-jamvm

7u85-2.6.1-5ubuntu0.14.04.1
openjdk-7-jre-headless

7u85-2.6.1-5ubuntu0.14.04.1
openjdk-7-jre

7u85-2.6.1-5ubuntu0.14.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional
bug fixes. After a standard system update you need to restart any
Java applications or applets to make all the necessary changes.

References

CVE-2015-4734,

CVE-2015-4803,

CVE-2015-4805,

CVE-2015-4806,

CVE-2015-4835,

CVE-2015-4840,

CVE-2015-4842,

CVE-2015-4843,

CVE-2015-4844,

CVE-2015-4860,

CVE-2015-4868,

CVE-2015-4872,

CVE-2015-4881,

CVE-2015-4882,

CVE-2015-4883,

CVE-2015-4893,

CVE-2015-4903,

CVE-2015-4911

USN-2787-1: audiofile vulnerability

Ubuntu Security Notice USN-2787-1

28th October, 2015

audiofile vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

audiofile could be made to crash or run programs as your login if it
opened a specially crafted file.

Software description

  • audiofile
    – Open-source version of the SGI audiofile library

Details

Fabrizio Gennari discovered that audiofile incorrectly handled changing
both the sample format and the number of channels. If a user or automated
system were tricked into processing a specially crafted file, audiofile
could be made to crash, leading to a denial of service, or possibly execute
arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
libaudiofile1

0.3.6-2ubuntu0.15.10.1
Ubuntu 15.04:
libaudiofile1

0.3.6-2ubuntu0.15.04.1
Ubuntu 14.04 LTS:
libaudiofile1

0.3.6-2ubuntu0.14.04.1
Ubuntu 12.04 LTS:
libaudiofile1

0.3.3-2ubuntu0.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-7747

USN-2786-1: PHP vulnerabilities

Ubuntu Security Notice USN-2786-1

28th October, 2015

php5 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

PHP could be made to crash if it processed a specially crafted file.

Software description

  • php5
    – HTML-embedded scripting language interpreter

Details

It was discovered that the PHP phar extension incorrectly handled certain
files. A remote attacker could use this issue to cause PHP to crash,
resulting in a denial of service. (CVE-2015-7803, CVE-2015-7804)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
php5-cli

5.6.11+dfsg-1ubuntu3.1
php5-cgi

5.6.11+dfsg-1ubuntu3.1
libapache2-mod-php5

5.6.11+dfsg-1ubuntu3.1
php5-fpm

5.6.11+dfsg-1ubuntu3.1
Ubuntu 15.04:
php5-cli

5.6.4+dfsg-4ubuntu6.4
php5-cgi

5.6.4+dfsg-4ubuntu6.4
libapache2-mod-php5

5.6.4+dfsg-4ubuntu6.4
php5-fpm

5.6.4+dfsg-4ubuntu6.4
Ubuntu 14.04 LTS:
php5-cli

5.5.9+dfsg-1ubuntu4.14
php5-cgi

5.5.9+dfsg-1ubuntu4.14
libapache2-mod-php5

5.5.9+dfsg-1ubuntu4.14
php5-fpm

5.5.9+dfsg-1ubuntu4.14
Ubuntu 12.04 LTS:
php5-cli

5.3.10-1ubuntu3.21
php5-cgi

5.3.10-1ubuntu3.21
libapache2-mod-php5

5.3.10-1ubuntu3.21
php5-fpm

5.3.10-1ubuntu3.21

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-7803,

CVE-2015-7804

USN-2782-1: Apport vulnerability

Ubuntu Security Notice USN-2782-1

27th October, 2015

apport vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Apport could be made to run programs as an administrator.

Software description

  • apport
    – automatically generate crash reports for debugging

Details

Gabriel Campana discovered that Apport incorrectly handled Python module
imports. A local attacker could use this issue to elevate privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
apport

2.19.1-0ubuntu4
Ubuntu 15.04:
apport

2.17.2-0ubuntu1.7
Ubuntu 14.04 LTS:
apport

2.14.1-0ubuntu3.18
Ubuntu 12.04 LTS:
apport

2.0.1-0ubuntu17.13

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-1341

USN-2783-1: NTP vulnerabilities

Ubuntu Security Notice USN-2783-1

27th October, 2015

ntp vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in NTP.

Software description

  • ntp
    – Network Time Protocol daemon and utility programs

Details

Aleksis Kauppinen discovered that NTP incorrectly handled certain remote
config packets. In a non-default configuration, a remote authenticated
attacker could possibly use this issue to cause NTP to crash, resulting in
a denial of service. (CVE-2015-5146)

Miroslav Lichvar discovered that NTP incorrectly handled logconfig
directives. In a non-default configuration, a remote authenticated attacker
could possibly use this issue to cause NTP to crash, resulting in a denial
of service. (CVE-2015-5194)

Miroslav Lichvar discovered that NTP incorrectly handled certain statistics
types. In a non-default configuration, a remote authenticated attacker
could possibly use this issue to cause NTP to crash, resulting in a denial
of service. (CVE-2015-5195)

Miroslav Lichvar discovered that NTP incorrectly handled certain file
paths. In a non-default configuration, a remote authenticated attacker
could possibly use this issue to cause NTP to crash, resulting in a denial
of service, or overwrite certain files. (CVE-2015-5196, CVE-2015-7703)

Miroslav Lichvar discovered that NTP incorrectly handled certain packets.
A remote attacker could possibly use this issue to cause NTP to hang,
resulting in a denial of service. (CVE-2015-5219)

Aanchal Malhotra, Isaac E. Cohen, and Sharon Goldberg discovered that NTP
incorrectly handled restarting after hitting a panic threshold. A remote
attacker could possibly use this issue to alter the system time on clients.
(CVE-2015-5300)

It was discovered that NTP incorrectly handled autokey data packets. A
remote attacker could possibly use this issue to cause NTP to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2015-7691, CVE-2015-7692, CVE-2015-7702)

It was discovered that NTP incorrectly handled memory when processing
certain autokey messages. A remote attacker could possibly use this issue
to cause NTP to consume memory, resulting in a denial of service.
(CVE-2015-7701)

Aanchal Malhotra, Isaac E. Cohen, and Sharon Goldberg discovered that NTP
incorrectly handled rate limiting. A remote attacker could possibly use
this issue to cause clients to stop updating their clock. (CVE-2015-7704,
CVE-2015-7705)

Yves Younan discovered that NTP incorrectly handled logfile and keyfile
directives. In a non-default configuration, a remote authenticated attacker
could possibly use this issue to cause NTP to enter a loop, resulting in a
denial of service. (CVE-2015-7850)

Yves Younan and Aleksander Nikolich discovered that NTP incorrectly handled
ascii conversion. A remote attacker could possibly use this issue to cause
NTP to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2015-7852)

Yves Younan discovered that NTP incorrectly handled reference clock memory.
A malicious refclock could possibly use this issue to cause NTP to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2015-7853)

John D “Doug” Birdwell discovered that NTP incorrectly handled decoding
certain bogus values. An attacker could possibly use this issue to cause
NTP to crash, resulting in a denial of service. (CVE-2015-7855)

Stephen Gray discovered that NTP incorrectly handled symmetric association
authentication. A remote attacker could use this issue to possibly bypass
authentication and alter the system clock. (CVE-2015-7871)

In the default installation, attackers would be isolated by the NTP
AppArmor profile.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
ntp

1:4.2.6.p5+dfsg-3ubuntu8.1
Ubuntu 15.04:
ntp

1:4.2.6.p5+dfsg-3ubuntu6.2
Ubuntu 14.04 LTS:
ntp

1:4.2.6.p5+dfsg-3ubuntu2.14.04.5
Ubuntu 12.04 LTS:
ntp

1:4.2.6.p3+dfsg-1ubuntu3.6

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-5146,

CVE-2015-5194,

CVE-2015-5195,

CVE-2015-5196,

CVE-2015-5219,

CVE-2015-5300,

CVE-2015-7691,

CVE-2015-7692,

CVE-2015-7701,

CVE-2015-7702,

CVE-2015-7703,

CVE-2015-7704,

CVE-2015-7705,

CVE-2015-7850,

CVE-2015-7852,

CVE-2015-7853,

CVE-2015-7855,

CVE-2015-7871

USN-2781-1: MySQL vulnerabilities

Ubuntu Security Notice USN-2781-1

26th October, 2015

mysql-5.5, mysql-5.6 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in MySQL.

Software description

  • mysql-5.5
    – MySQL database

  • mysql-5.6
    – MySQL database

Details

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 5.5.46 in Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
Ubuntu 15.04 and Ubuntu 15.10 have been updated to MySQL 5.6.27.

In addition to security fixes, the updated packages contain bug fixes,
new features, and possibly incompatible changes.

Please see the following for more information:
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-45.html
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-46.html
http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-26.html
http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-27.html
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
mysql-server-5.6

5.6.27-0ubuntu1
Ubuntu 15.04:
mysql-server-5.6

5.6.27-0ubuntu0.15.04.1
Ubuntu 14.04 LTS:
mysql-server-5.5

5.5.46-0ubuntu0.14.04.2
Ubuntu 12.04 LTS:
mysql-server-5.5

5.5.46-0ubuntu0.12.04.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-4730,

CVE-2015-4766,

CVE-2015-4792,

CVE-2015-4800,

CVE-2015-4802,

CVE-2015-4815,

CVE-2015-4816,

CVE-2015-4819,

CVE-2015-4826,

CVE-2015-4830,

CVE-2015-4833,

CVE-2015-4836,

CVE-2015-4858,

CVE-2015-4861,

CVE-2015-4862,

CVE-2015-4864,

CVE-2015-4866,

CVE-2015-4870,

CVE-2015-4879,

CVE-2015-4890,

CVE-2015-4895,

CVE-2015-4904,

CVE-2015-4910,

CVE-2015-4913

USN-2770-2: Oxide vulnerabilities

Ubuntu Security Notice USN-2770-2

22nd October, 2015

oxide-qt vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10

Summary

Several security issues were fixed in Oxide.

Software description

  • oxide-qt
    – Web browser engine library for Qt (QML plugin)

Details

USN-2770-1 fixed vulnerabilities in Oxide in Ubuntu 14.04 LTS and Ubuntu
15.04. This update provides the corresponding updates for Ubuntu 15.10.

Original advisory details:

It was discovered that ContainerNode::parserInsertBefore in Blink would
incorrectly proceed with a DOM tree insertion in some circumstances. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to bypass same origin restrictions.
(CVE-2015-6755)

A use-after-free was discovered in the service worker implementation in
Chromium. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to cause a denial of
service via application crash, or execute arbitrary code with the
privileges of the user invoking the program. (CVE-2015-6757)

It was discovered that Blink did not ensure that the origin of
LocalStorage resources are considered unique. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to obtain sensitive information. (CVE-2015-6759)

A race condition and memory corruption was discovered in FFmpeg. If a user
were tricked in to opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via renderer crash,
or execute arbitrary code with the privileges of the sandboxed render
process. (CVE-2015-6761)

It was discovered that CSSFontFaceSrcValue::fetch in Blink did not use
CORS in some circumstances. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to
bypass same origin restrictions. (CVE-2015-6762)

Multiple security issues were discovered in Chromium. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to read uninitialized memory, cause a denial
of service via application crash or execute arbitrary code with the
privileges of the user invoking the program. (CVE-2015-6763)

Multiple security issues were discovered in V8. If a user were tricked
in to opening a specially crafted website, an attacker could potentially
exploit these to read uninitialized memory, cause a denial of service via
renderer crash or execute arbitrary code with the privileges of the
sandboxed render process. (CVE-2015-7834)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
liboxideqtcore0

1.10.3-0ubuntu0.15.10.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-6755,

CVE-2015-6757,

CVE-2015-6759,

CVE-2015-6761,

CVE-2015-6762,

CVE-2015-6763,

CVE-2015-7834

USN-2780-2: MiniUPnP vulnerability

Ubuntu Security Notice USN-2780-2

23rd October, 2015

miniupnpc vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10

Summary

An application using the MiniUPnP library could be made to crash or run
programs as your login if it received specially crafted network traffic.

Software description

  • miniupnpc
    – UPnP IGD client lightweight library

Details

USN-2780-1 fixed a vulnerability in the MiniUPnP library in Ubuntu
12.04 LTS, Ubuntu 14.04 LTS, and Ubuntu 15.04. This update provides
the corresponding update for Ubuntu 15.10.

Original advisory details:

Aleksandar Nikolic discovered a buffer overflow vulnerability in the
XML parser functionality of the MiniUPnP library. A remote attacker
could use this to cause a denial of service (application crash) or
possibly execute arbitrary code with privileges of the user running
an application that uses the MiniUPnP library.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
libminiupnpc10

1.9.20140610-2ubuntu2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart applications using
the MiniUPnP library to make all the necessary changes.

References

CVE-2015-6031