Category Archives: Ubuntu

Ubuntu Security Notices

USN-2633-1: Linux kernel (Trusty HWE) vulnerabilities

Ubuntu Security Notice USN-2633-1

10th June, 2015

linux-lts-trusty vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in the kernel.

Software description

  • linux-lts-trusty
    – Linux hardware enablement kernel from Trusty

Details

Wen Xu discovered a use-after-free flaw in the Linux kernel’s ipv4 ping
support. A local user could exploit this flaw to cause a denial of service
(system crash) or gain administrative privileges on the system.
(CVE-2015-3636)

A memory corruption flaw was discovered in the Linux kernel’s scsi
subsystem. A local attacker could potentially exploit this flaw to cause a
denial of service (system crash). (CVE-2015-4036)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
linux-image-3.13.0-54-generic-lpae

3.13.0-54.91~precise1
linux-image-3.13.0-54-generic

3.13.0-54.91~precise1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2015-3636,

CVE-2015-4036

USN-2632-1: Linux kernel (OMAP4) vulnerabilities

Ubuntu Security Notice USN-2632-1

10th June, 2015

linux-ti-omap4 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in the kernel.

Software description

  • linux-ti-omap4
    – Linux kernel for OMAP4

Details

Jan Beulich discovered the Xen virtual machine subsystem of the Linux
kernel did not properly restrict access to PCI command registers. A local
guest user could exploit this flaw to cause a denial of service (host
crash). (CVE-2015-2150)

A privilege escalation was discovered in the fork syscall via the int80
entry on 64 bit kernels with 32 bit emulation support. An unprivileged
local attacker could exploit this flaw to increase their privileges on the
system. (CVE-2015-2830)

A memory corruption issue was discovered in AES decryption when using the
Intel AES-NI accelerated code path. A remote attacker could exploit this
flaw to cause a denial of service (system crash) or potentially escalate
privileges on Intel base machines with AEC-GCM mode IPSec security
association. (CVE-2015-3331)

Wen Xu discovered a use-after-free flaw in the Linux kernel’s ipv4 ping
support. A local user could exploit this flaw to cause a denial of service
(system crash) or gain administrative privileges on the system.
(CVE-2015-3636)

Carl H Lunde discovered missing sanity checks in the the Linux kernel’s UDF
file system(CONFIG_UDF_FS). A local attack could exploit this flaw to cause
a denial of service (system crash) by using a corrupted filesystem image.
(CVE-2015-4167)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
linux-image-3.2.0-1465-omap4

3.2.0-1465.85

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2015-2150,

CVE-2015-2830,

CVE-2015-3331,

CVE-2015-3636,

CVE-2015-4167

USN-2631-1: Linux kernel vulnerabilities

Ubuntu Security Notice USN-2631-1

10th June, 2015

linux vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in the kernel.

Software description

  • linux
    – Linux kernel

Details

Jan Beulich discovered the Xen virtual machine subsystem of the Linux
kernel did not properly restrict access to PCI command registers. A local
guest user could exploit this flaw to cause a denial of service (host
crash). (CVE-2015-2150)

A privilege escalation was discovered in the fork syscall via the int80
entry on 64 bit kernels with 32 bit emulation support. An unprivileged
local attacker could exploit this flaw to increase their privileges on the
system. (CVE-2015-2830)

A memory corruption issue was discovered in AES decryption when using the
Intel AES-NI accelerated code path. A remote attacker could exploit this
flaw to cause a denial of service (system crash) or potentially escalate
privileges on Intel base machines with AEC-GCM mode IPSec security
association. (CVE-2015-3331)

Wen Xu discovered a use-after-free flaw in the Linux kernel’s ipv4 ping
support. A local user could exploit this flaw to cause a denial of service
(system crash) or gain administrative privileges on the system.
(CVE-2015-3636)

Carl H Lunde discovered missing sanity checks in the the Linux kernel’s UDF
file system(CONFIG_UDF_FS). A local attack could exploit this flaw to cause
a denial of service (system crash) by using a corrupted filesystem image.
(CVE-2015-4167)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
linux-image-3.2.0-85-virtual

3.2.0-85.122
linux-image-3.2.0-85-generic-pae

3.2.0-85.122
linux-image-3.2.0-85-powerpc-smp

3.2.0-85.122
linux-image-3.2.0-85-powerpc64-smp

3.2.0-85.122
linux-image-3.2.0-85-omap

3.2.0-85.122
linux-image-3.2.0-85-generic

3.2.0-85.122
linux-image-3.2.0-85-highbank

3.2.0-85.122

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2015-2150,

CVE-2015-2830,

CVE-2015-3331,

CVE-2015-3636,

CVE-2015-4167

USN-2635-1: Linux kernel (Utopic HWE) vulnerabilities

Ubuntu Security Notice USN-2635-1

10th June, 2015

linux-lts-utopic vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in the kernel.

Software description

  • linux-lts-utopic
    – Linux hardware enablement kernel from Utopic

Details

Xiong Zhou discovered a bug in the way the EXT4 filesystem handles
fallocate zero range functionality when the page size is greater than the
block size. A local attacker could exploit this flaw to cause a denial of
service (system crash). (CVE-2015-0275)

Wen Xu discovered a use-after-free flaw in the Linux kernel’s ipv4 ping
support. A local user could exploit this flaw to cause a denial of service
(system crash) or gain administrative privileges on the system.
(CVE-2015-3636)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
linux-image-3.16.0-39-generic

3.16.0-39.53~14.04.1
linux-image-3.16.0-39-powerpc64-smp

3.16.0-39.53~14.04.1
linux-image-3.16.0-39-lowlatency

3.16.0-39.53~14.04.1
linux-image-3.16.0-39-powerpc-smp

3.16.0-39.53~14.04.1
linux-image-3.16.0-39-powerpc-e500mc

3.16.0-39.53~14.04.1
linux-image-3.16.0-39-generic-lpae

3.16.0-39.53~14.04.1
linux-image-3.16.0-39-powerpc64-emb

3.16.0-39.53~14.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2015-0275,

CVE-2015-3636

USN-2637-1: Linux kernel vulnerabilities

Ubuntu Security Notice USN-2637-1

10th June, 2015

linux vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10

Summary

Several security issues were fixed in the kernel.

Software description

  • linux
    – Linux kernel

Details

Xiong Zhou discovered a bug in the way the EXT4 filesystem handles
fallocate zero range functionality when the page size is greater than the
block size. A local attacker could exploit this flaw to cause a denial of
service (system crash). (CVE-2015-0275)

Wen Xu discovered a use-after-free flaw in the Linux kernel’s ipv4 ping
support. A local user could exploit this flaw to cause a denial of service
(system crash) or gain administrative privileges on the system.
(CVE-2015-3636)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
linux-image-3.16.0-39-generic

3.16.0-39.53
linux-image-3.16.0-39-powerpc64-smp

3.16.0-39.53
linux-image-3.16.0-39-lowlatency

3.16.0-39.53
linux-image-3.16.0-39-powerpc-smp

3.16.0-39.53
linux-image-3.16.0-39-powerpc-e500mc

3.16.0-39.53
linux-image-3.16.0-39-generic-lpae

3.16.0-39.53
linux-image-3.16.0-39-powerpc64-emb

3.16.0-39.53

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2015-0275,

CVE-2015-3636

USN-2636-1: Linux kernel (Vivid HWE) vulnerabilities

Ubuntu Security Notice USN-2636-1

10th June, 2015

linux-lts-vivid vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in the kernel.

Software description

  • linux-lts-vivid
    – Linux hardware enablement kernel from Vivid

Details

Xiong Zhou discovered a bug in the way the EXT4 filesystem handles
fallocate zero range functionality when the page size is greater than the
block size. A local attacker could exploit this flaw to cause a denial of
service (system crash). (CVE-2015-0275)

Wen Xu discovered a use-after-free flaw in the Linux kernel’s ipv4 ping
support. A local user could exploit this flaw to cause a denial of service
(system crash) or gain administrative privileges on the system.
(CVE-2015-3636)

A memory corruption flaw was discovered in the Linux kernel’s scsi
subsystem. A local attacker could potentially exploit this flaw to cause a
denial of service (system crash). (CVE-2015-4036)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
linux-image-3.19.0-20-powerpc-smp

3.19.0-20.20~14.04.1
linux-image-3.19.0-20-powerpc-e500mc

3.19.0-20.20~14.04.1
linux-image-3.19.0-20-generic-lpae

3.19.0-20.20~14.04.1
linux-image-3.19.0-20-generic

3.19.0-20.20~14.04.1
linux-image-3.19.0-20-powerpc64-smp

3.19.0-20.20~14.04.1
linux-image-3.19.0-20-lowlatency

3.19.0-20.20~14.04.1
linux-image-3.19.0-20-powerpc64-emb

3.19.0-20.20~14.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2015-0275,

CVE-2015-3636,

CVE-2015-4036

USN-2638-1: Linux kernel vulnerabilities

Ubuntu Security Notice USN-2638-1

10th June, 2015

linux vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.04

Summary

Several security issues were fixed in the kernel.

Software description

  • linux
    – Linux kernel

Details

Xiong Zhou discovered a bug in the way the EXT4 filesystem handles
fallocate zero range functionality when the page size is greater than the
block size. A local attacker could exploit this flaw to cause a denial of
service (system crash). (CVE-2015-0275)

Wen Xu discovered a use-after-free flaw in the Linux kernel’s ipv4 ping
support. A local user could exploit this flaw to cause a denial of service
(system crash) or gain administrative privileges on the system.
(CVE-2015-3636)

A memory corruption flaw was discovered in the Linux kernel’s scsi
subsystem. A local attacker could potentially exploit this flaw to cause a
denial of service (system crash). (CVE-2015-4036)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.04:
linux-image-3.19.0-20-powerpc-smp

3.19.0-20.20
linux-image-3.19.0-20-powerpc-e500mc

3.19.0-20.20
linux-image-3.19.0-20-generic-lpae

3.19.0-20.20
linux-image-3.19.0-20-generic

3.19.0-20.20
linux-image-3.19.0-20-powerpc64-smp

3.19.0-20.20
linux-image-3.19.0-20-lowlatency

3.19.0-20.20
linux-image-3.19.0-20-powerpc64-emb

3.19.0-20.20

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2015-0275,

CVE-2015-3636,

CVE-2015-4036

USN-2628-1: strongSwan vulnerability

Ubuntu Security Notice USN-2628-1

8th June, 2015

strongswan vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.10
  • Ubuntu 14.04 LTS

Summary

strongSwan could be made to expose sensitive information over the network.

Software description

  • strongswan
    – IPsec VPN solution

Details

Alexander E. Patrakov discovered that strongSwan incorrectly handled
certain IKEv2 setups. A malicious server could possibly use this issue to
obtain user credentials.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.04:
strongswan-ike

5.1.2-0ubuntu5.2
Ubuntu 14.10:
strongswan-ike

5.1.2-0ubuntu3.3
Ubuntu 14.04 LTS:
strongswan-ike

5.1.2-0ubuntu2.3

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-4171

USN-2627-1: t1utils vulnerability

Ubuntu Security Notice USN-2627-1

3rd June, 2015

t1utils vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS

Summary

t1utils could be made to crash or run programs as your login if it
opened a specially crafted file.

Software description

  • t1utils
    – Collection of simple Type 1 font manipulation programs

Details

Jakub Wilk discovered that t1utils incorrectly handled certain malformed fonts.
If a user or automated system were tricked into opening a specially crafted
font, a remote attacker could crash the application, leading to a denial of
service, or possibly execute arbitrary code with user privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
t1utils

1.37-2.1ubuntu0.1
Ubuntu 14.04 LTS:
t1utils

1.37-2ubuntu1.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-3905

USN-2626-1: Qt vulnerabilities

Ubuntu Security Notice USN-2626-1

3rd June, 2015

qt4-x11, qtbase-opensource-src vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Qt could be made to crash or run programs as your login if it opened a
specially crafted file.

Software description

  • qt4-x11
    – Qt 4 libraries

  • qtbase-opensource-src
    – Qt 5 libraries

Details

Wolfgang Schenk discovered that Qt incorrectly handled certain malformed
GIF images. If a user or automated system were tricked into opening a
specially crafted GIF image, a remote attacker could use this issue to
cause Qt to crash, resulting in a denial of service. This issue only
applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-0190)

Fabian Vogt discovered that Qt incorrectly handled certain malformed BMP
images. If a user or automated system were tricked into opening a specially
crafted BMP image, a remote attacker could use this issue to cause Qt to
crash, resulting in a denial of service. (CVE-2015-0295)

Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed BMP images. If a user or automated system were tricked
into opening a specially crafted BMP image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1858)

Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed ICO images. If a user or automated system were tricked
into opening a specially crafted ICO image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1859)

Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed GIF images. If a user or automated system were tricked
into opening a specially crafted GIF image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1860)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.04:
libqtgui4

4:4.8.6+git64-g5dc8b2b+dfsg-3~ubuntu6.1
libqt5gui5

5.4.1+dfsg-2ubuntu4.1
Ubuntu 14.10:
libqtgui4

4:4.8.6+git49-gbc62005+dfsg-1ubuntu1.1
libqt5gui5

5.3.0+dfsg-2ubuntu9.1
Ubuntu 14.04 LTS:
libqtgui4

4:4.8.5+git192-g085f851+dfsg-2ubuntu4.1
libqt5gui5

5.2.1+dfsg-1ubuntu14.3
Ubuntu 12.04 LTS:
libqtgui4

4:4.8.1-0ubuntu4.9

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart your session to make
all the necessary changes.

References

CVE-2014-0190,

CVE-2015-0295,

CVE-2015-1858,

CVE-2015-1859,

CVE-2015-1860