Category Archives: Ubuntu

Ubuntu Security Notices

USN-2735-1: Oxide vulnerabilities

Ubuntu Security Notice USN-2735-1

8th September, 2015

oxide-qt vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in Oxide.

Software description

  • oxide-qt
    – Web browser engine library for Qt (QML plugin)

Details

It was discovered that the DOM tree could be corrupted during parsing in
some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to bypass
same-origin restrictions or cause a denial of service. (CVE-2015-1291)

An issue was discovered in NavigatorServiceWorker::serviceWorker in Blink.
If a user were tricked in to opening a specially crafted website, an
attacker could potentially exploit this to bypass same-origin
restrictions. (CVE-2015-1292)

An issue was discovered in the DOM implementation in Blink. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to bypass same-origin restrictions.
(CVE-2015-1293)

A use-after-free was discovered in Skia. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to cause a denial of service via renderer crash, or execute arbitrary
code with the privileges of the sandboxed render process. (CVE-2015-1294)

A use-after-free was discovered in the shared-timer implementation in
Blink. If a user were tricked in to opening a specially crafted website,
an attacker could potentially exploit this to cause a denial of service
via renderer crash, or execute arbitrary code with the privileges of the
sandboxed render process. (CVE-2015-1299)

It was discovered that the availability of iframe Resource Timing API
times was not properly restricted in some circumstances. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to obtain sensitive information. (CVE-2015-1300)

Multiple security issues were discovered in Chromium. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to read uninitialized memory, cause a denial
of service via application crash or execute arbitrary code with the
privileges of the user invoking the program. (CVE-2015-1301)

A heap corruption issue was discovered in oxide::JavaScriptDialogManager.
If a user were tricked in to opening a specially crafted website, an
attacker could potentially exploit this to cause a denial of service via
application crash, or execute arbitrary code with the privileges of the
user invoking the program. (CVE-2015-1332)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.04:
liboxideqtcore0

1.9.1-0ubuntu0.15.04.1
Ubuntu 14.04 LTS:
liboxideqtcore0

1.9.1-0ubuntu0.14.04.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-1291,

CVE-2015-1292,

CVE-2015-1293,

CVE-2015-1294,

CVE-2015-1299,

CVE-2015-1300,

CVE-2015-1301,

CVE-2015-1332,

LP: 1470905

USN-2738-1: Linux kernel vulnerability

Ubuntu Security Notice USN-2738-1

9th September, 2015

linux vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.04

Summary

The system could be made to crash or run programs as an administrator.

Software description

  • linux
    – Linux kernel

Details

It was discovered that an integer overflow error existed in the SCSI
generic (sg) driver in the Linux kernel. A local attacker with write
permission to a SCSI generic device could use this to cause a denial of
service (system crash) or potentially escalate their privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.04:
linux-image-3.19.0-28-lowlatency

3.19.0-28.30
linux-image-3.19.0-28-powerpc64-emb

3.19.0-28.30
linux-image-3.19.0-28-powerpc-smp

3.19.0-28.30
linux-image-3.19.0-28-generic-lpae

3.19.0-28.30
linux-image-3.19.0-28-generic

3.19.0-28.30
linux-image-3.19.0-28-powerpc-e500mc

3.19.0-28.30
linux-image-3.19.0-28-powerpc64-smp

3.19.0-28.30

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2015-5707

USN-2736-1: Spice vulnerability

Ubuntu Security Notice USN-2736-1

8th September, 2015

spice vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.04 LTS

Summary

Spice could be made to crash or run programs.

Software description

  • spice
    – SPICE protocol client and server library

Details

Frediano Ziglio discovered that Spice incorrectly handled monitor configs.
A malicious guest could use this issue to cause a denial of service, or
possibly execute arbitrary code on the host as the user running the QEMU
process. In the default installation, when QEMU is used with libvirt,
attackers would be isolated by the libvirt AppArmor profile.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.04:
libspice-server1

0.12.5-1ubuntu0.1
Ubuntu 14.04 LTS:
libspice-server1

0.12.4-0nocelt2ubuntu1.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart all QEMU virtual
machines using Spice to make the necessary changes.

References

CVE-2015-3247

USN-2731-1: Linux kernel vulnerability

Ubuntu Security Notice USN-2731-1

3rd September, 2015

linux vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

The system could be made to expose sensitive information.

Software description

  • linux
    – Linux kernel

Details

Benjamin Randazzo discovered an information leak in the md (multiple
device) driver when the bitmap_info.file is disabled. A local privileged
attacker could use this to obtain sensitive information from the kernel.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
linux-image-3.2.0-90-powerpc64-smp

3.2.0-90.128
linux-image-3.2.0-90-powerpc-smp

3.2.0-90.128
linux-image-3.2.0-90-generic-pae

3.2.0-90.128
linux-image-3.2.0-90-virtual

3.2.0-90.128
linux-image-3.2.0-90-highbank

3.2.0-90.128
linux-image-3.2.0-90-omap

3.2.0-90.128
linux-image-3.2.0-90-generic

3.2.0-90.128

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2015-5697

USN-2733-1: Linux kernel (Trusty HWE) vulnerability

Ubuntu Security Notice USN-2733-1

3rd September, 2015

linux-lts-trusty vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

The system could be made to crash or run programs as an administrator.

Software description

  • linux-lts-trusty
    – Linux hardware enablement kernel from Trusty

Details

It was discovered that an integer overflow error existed in the SCSI
generic (sg) driver in the Linux kernel. A local attacker with write
permission to a SCSI generic device could use this to cause a denial of
service (system crash) or potentially escalate their privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
linux-image-3.13.0-63-generic

3.13.0-63.104~precise1
linux-image-3.13.0-63-generic-lpae

3.13.0-63.104~precise1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2015-5707

USN-2732-1: Linux kernel (OMAP4) vulnerability

Ubuntu Security Notice USN-2732-1

3rd September, 2015

linux-ti-omap4 vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

The system could be made to expose sensitive information.

Software description

  • linux-ti-omap4
    – Linux kernel for OMAP4

Details

Benjamin Randazzo discovered an information leak in the md (multiple
device) driver when the bitmap_info.file is disabled. A local privileged
attacker could use this to obtain sensitive information from the kernel.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
linux-image-3.2.0-1470-omap4

3.2.0-1470.91

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2015-5697

USN-2734-1: Linux kernel vulnerability

Ubuntu Security Notice USN-2734-1

3rd September, 2015

linux vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

The system could be made to crash or run programs as an administrator.

Software description

  • linux
    – Linux kernel

Details

It was discovered that an integer overflow error existed in the SCSI
generic (sg) driver in the Linux kernel. A local attacker with write
permission to a SCSI generic device could use this to cause a denial of
service (system crash) or potentially escalate their privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
linux-image-3.13.0-63-powerpc64-emb

3.13.0-63.103
linux-image-3.13.0-63-lowlatency

3.13.0-63.103
linux-image-3.13.0-63-generic

3.13.0-63.103
linux-image-3.13.0-63-generic-lpae

3.13.0-63.103
linux-image-3.13.0-63-powerpc-e500mc

3.13.0-63.103
linux-image-3.13.0-63-powerpc-e500

3.13.0-63.103
linux-image-3.13.0-63-powerpc64-smp

3.13.0-63.103
linux-image-3.13.0-63-powerpc-smp

3.13.0-63.103

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2015-5707

USN-2729-1: libvdpau vulnerabilities

Ubuntu Security Notice USN-2729-1

3rd September, 2015

libvdpau vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

libvdpau could be made to run programs as an administrator.

Software description

  • libvdpau
    – Video Decode and Presentation API for Unix

Details

Florian Weimer discovered that libvdpau incorrectly handled certain
environment variables. A local attacker could possibly use this issue to
gain privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.04:
libvdpau1

0.9-1ubuntu0.1
Ubuntu 14.04 LTS:
libvdpau1

0.7-1ubuntu0.1
Ubuntu 12.04 LTS:
libvdpau1

0.4.1-3ubuntu1.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-5198,

CVE-2015-5199,

CVE-2015-5200

USN-2728-1: Bind vulnerability

Ubuntu Security Notice USN-2728-1

2nd September, 2015

bind9 vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Bind could be made to crash if it received specially crafted network
traffic.

Software description

  • bind9
    – Internet Domain Name Server

Details

Hanno Böck discovered that Bind incorrectly handled certain malformed keys
when configured to perform DNSSEC validation. A remote attacker could use
this issue with specially crafted zone data to cause Bind to crash,
resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.04:
bind9

1:9.9.5.dfsg-9ubuntu0.3
Ubuntu 14.04 LTS:
bind9

1:9.9.5.dfsg-3ubuntu0.5
Ubuntu 12.04 LTS:
bind9

1:9.8.1.dfsg.P1-4ubuntu0.13

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-5722

USN-2730-1: OpenSLP vulnerabilities

Ubuntu Security Notice USN-2730-1

3rd September, 2015

openslp-dfsg vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

OpenSLP could be made to crash if it received specially crafted network
traffic.

Software description

  • openslp-dfsg
    – OpenSLP development files

Details

Georgi Geshev discovered that OpenSLP incorrectly handled processing
certain service requests. A remote attacker could possibly use this issue
to cause OpenSLP to crash, resulting in a denial of service. This issue
only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2012-4428)

Qinghao Tang discovered that OpenSLP incorrectly handled processing certain
messages. A remote attacker could possibly use this issue to cause
OpenSLP to crash, resulting in a denial of service. (CVE-2015-5177)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.04:
libslp1

1.2.1-10ubuntu0.1
Ubuntu 14.04 LTS:
libslp1

1.2.1-9ubuntu0.2
Ubuntu 12.04 LTS:
libslp1

1.2.1-7.8ubuntu1.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2012-4428,

CVE-2015-5177