Category Archives: Ubuntu

Ubuntu Security Notices

USN-2518-1: Linux kernel vulnerabilities

Ubuntu Security Notice USN-2518-1

26th February, 2015

linux vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10

Summary

Several security issues were fixed in the kernel.

Software description

  • linux
    – Linux kernel

Details

A flaw was discovered in the Kernel Virtual Machine’s (KVM) emulation of
the SYSTENTER instruction when the guest OS does not initialize the
SYSENTER MSRs. A guest OS user could exploit this flaw to cause a denial of
service of the guest OS (crash) or potentially gain privileges on the guest
OS. (CVE-2015-0239)

Andy Lutomirski discovered an information leak in the Linux kernel’s Thread
Local Storage (TLS) implementation allowing users to bypass the espfix to
obtain information that could be used to bypass the Address Space Layout
Randomization (ASLR) protection mechanism. A local user could exploit this
flaw to obtain potentially sensitive information from kernel memory.
(CVE-2014-8133)

A restriction bypass was discovered in iptables when conntrack rules are
specified and the conntrack protocol handler module is not loaded into the
Linux kernel. This flaw can cause the firewall rules on the system to be
bypassed when conntrack rules are used. (CVE-2014-8160)

A flaw was discovered with file renaming in the linux kernel. A local user
could exploit this flaw to cause a denial of service (deadlock and system
hang). (CVE-2014-8559)

A flaw was discovered in how supplemental group memberships are handled in
certain namespace scenarios. A local user could exploit this flaw to bypass
file permission restrictions. (CVE-2014-8989)

A flaw was discovered in how Thread Local Storage (TLS) is handled by the
task switching function in the Linux kernel for x86_64 based machines. A
local user could exploit this flaw to bypass the Address Space Layout
Radomization (ASLR) protection mechanism. (CVE-2014-9419)

Prasad J Pandit reported a flaw in the rock_continue function of the Linux
kernel’s ISO 9660 CDROM file system. A local user could exploit this flaw
to cause a denial of service (system crash or hang). (CVE-2014-9420)

A flaw was discovered in the fragment handling of the B.A.T.M.A.N. Advanced
Meshing Protocol in the Linux kernel. A remote attacker could exploit this
flaw to cause a denial of service (mesh-node system crash) via fragmented
packets. (CVE-2014-9428)

A race condition was discovered in the Linux kernel’s key ring. A local
user could cause a denial of service (memory corruption or panic) or
possibly have unspecified impact via the keyctl commands. (CVE-2014-9529)

A memory leak was discovered in the ISO 9660 CDROM file system when parsing
rock ridge ER records. A local user could exploit this flaw to obtain
sensitive information from kernel memory via a crafted iso9660 image.
(CVE-2014-9584)

A flaw was discovered in the Address Space Layout Randomization (ASLR) of
the Virtual Dynamically linked Shared Objects (vDSO) location. This flaw
makes it easier for a local user to bypass the ASLR protection mechanism.
(CVE-2014-9585)

Dmitry Chernenkov discovered a buffer overflow in eCryptfs’ encrypted file
name decoding. A local unprivileged user could exploit this flaw to cause a
denial of service (system crash) or potentially gain administrative
privileges. (CVE-2014-9683)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
linux-image-3.16.0-31-powerpc64-smp

3.16.0-31.41
linux-image-3.16.0-31-generic

3.16.0-31.41
linux-image-3.16.0-31-powerpc64-emb

3.16.0-31.41
linux-image-3.16.0-31-powerpc-smp

3.16.0-31.41
linux-image-3.16.0-31-generic-lpae

3.16.0-31.41
linux-image-3.16.0-31-lowlatency

3.16.0-31.41
linux-image-3.16.0-31-powerpc-e500mc

3.16.0-31.41

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2014-8133,

CVE-2014-8160,

CVE-2014-8559,

CVE-2014-8989,

CVE-2014-9419,

CVE-2014-9420,

CVE-2014-9428,

CVE-2014-9529,

CVE-2014-9584,

CVE-2014-9585,

CVE-2014-9683,

CVE-2015-0239

USN-2517-1: Linux kernel (Utopic HWE) vulnerabilities

Ubuntu Security Notice USN-2517-1

26th February, 2015

linux-lts-utopic vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in the kernel.

Software description

  • linux-lts-utopic
    – Linux hardware enablement kernel from Utopic

Details

A flaw was discovered in the Kernel Virtual Machine’s (KVM) emulation of
the SYSTENTER instruction when the guest OS does not initialize the
SYSENTER MSRs. A guest OS user could exploit this flaw to cause a denial of
service of the guest OS (crash) or potentially gain privileges on the guest
OS. (CVE-2015-0239)

Andy Lutomirski discovered an information leak in the Linux kernel’s Thread
Local Storage (TLS) implementation allowing users to bypass the espfix to
obtain information that could be used to bypass the Address Space Layout
Randomization (ASLR) protection mechanism. A local user could exploit this
flaw to obtain potentially sensitive information from kernel memory.
(CVE-2014-8133)

A restriction bypass was discovered in iptables when conntrack rules are
specified and the conntrack protocol handler module is not loaded into the
Linux kernel. This flaw can cause the firewall rules on the system to be
bypassed when conntrack rules are used. (CVE-2014-8160)

A flaw was discovered with file renaming in the linux kernel. A local user
could exploit this flaw to cause a denial of service (deadlock and system
hang). (CVE-2014-8559)

A flaw was discovered in how supplemental group memberships are handled in
certain namespace scenarios. A local user could exploit this flaw to bypass
file permission restrictions. (CVE-2014-8989)

A flaw was discovered in how Thread Local Storage (TLS) is handled by the
task switching function in the Linux kernel for x86_64 based machines. A
local user could exploit this flaw to bypass the Address Space Layout
Radomization (ASLR) protection mechanism. (CVE-2014-9419)

Prasad J Pandit reported a flaw in the rock_continue function of the Linux
kernel’s ISO 9660 CDROM file system. A local user could exploit this flaw
to cause a denial of service (system crash or hang). (CVE-2014-9420)

A flaw was discovered in the fragment handling of the B.A.T.M.A.N. Advanced
Meshing Protocol in the Linux kernel. A remote attacker could exploit this
flaw to cause a denial of service (mesh-node system crash) via fragmented
packets. (CVE-2014-9428)

A race condition was discovered in the Linux kernel’s key ring. A local
user could cause a denial of service (memory corruption or panic) or
possibly have unspecified impact via the keyctl commands. (CVE-2014-9529)

A memory leak was discovered in the ISO 9660 CDROM file system when parsing
rock ridge ER records. A local user could exploit this flaw to obtain
sensitive information from kernel memory via a crafted iso9660 image.
(CVE-2014-9584)

A flaw was discovered in the Address Space Layout Randomization (ASLR) of
the Virtual Dynamically linked Shared Objects (vDSO) location. This flaw
makes it easier for a local user to bypass the ASLR protection mechanism.
(CVE-2014-9585)

Dmitry Chernenkov discovered a buffer overflow in eCryptfs’ encrypted file
name decoding. A local unprivileged user could exploit this flaw to cause a
denial of service (system crash) or potentially gain administrative
privileges. (CVE-2014-9683)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
linux-image-3.16.0-31-powerpc64-smp

3.16.0-31.41~14.04.1
linux-image-3.16.0-31-generic

3.16.0-31.41~14.04.1
linux-image-3.16.0-31-powerpc-smp

3.16.0-31.41~14.04.1
linux-image-3.16.0-31-powerpc64-emb

3.16.0-31.41~14.04.1
linux-image-3.16.0-31-generic-lpae

3.16.0-31.41~14.04.1
linux-image-3.16.0-31-lowlatency

3.16.0-31.41~14.04.1
linux-image-3.16.0-31-powerpc-e500mc

3.16.0-31.41~14.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2014-8133,

CVE-2014-8160,

CVE-2014-8559,

CVE-2014-8989,

CVE-2014-9419,

CVE-2014-9420,

CVE-2014-9428,

CVE-2014-9529,

CVE-2014-9584,

CVE-2014-9585,

CVE-2014-9683,

CVE-2015-0239

USN-2510-1: FreeType vulnerabilities

Ubuntu Security Notice USN-2510-1

24th February, 2015

freetype vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

FreeType could be made to crash or run programs as your login if it opened
a specially crafted file.

Software description

  • freetype
    – FreeType 2 is a font engine library

Details

Mateusz Jurczyk discovered that FreeType did not correctly handle certain
malformed font files. If a user were tricked into using a specially crafted
font file, a remote attacker could cause FreeType to crash or possibly
execute arbitrary code with user privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
libfreetype6

2.5.2-2ubuntu1.1
Ubuntu 14.04 LTS:
libfreetype6

2.5.2-1ubuntu2.4
Ubuntu 12.04 LTS:
libfreetype6

2.4.8-1ubuntu2.2
Ubuntu 10.04 LTS:
libfreetype6

2.3.11-1ubuntu2.8

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart your session to make
all the necessary changes.

References

CVE-2014-9656,

CVE-2014-9657,

CVE-2014-9658,

CVE-2014-9659,

CVE-2014-9660,

CVE-2014-9661,

CVE-2014-9662,

CVE-2014-9663,

CVE-2014-9664,

CVE-2014-9665,

CVE-2014-9666,

CVE-2014-9667,

CVE-2014-9668,

CVE-2014-9669,

CVE-2014-9670,

CVE-2014-9671,

CVE-2014-9672,

CVE-2014-9673,

CVE-2014-9674,

CVE-2014-9675

USN-2507-1: e2fsprogs vulnerabilities

Ubuntu Security Notice USN-2507-1

23rd February, 2015

e2fsprogs vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

e2fsprogs could be made to crash or run programs as an administrator
if it processed a specially crafted filesystem image.

Software description

  • e2fsprogs
    – ext2/ext3/ext4 file system utilities

Details

Jose Duart discovered that e2fsprogs incorrectly handled invalid block
group descriptor data. A local attacker could use this issue with a
crafted filesystem image to possibly execute arbitrary code.
(CVE-2015-0247, CVE-2015-1572)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
e2fsprogs

1.42.10-1.1ubuntu1.2
Ubuntu 14.04 LTS:
e2fsprogs

1.42.9-3ubuntu1.2
Ubuntu 12.04 LTS:
e2fsprogs

1.42-1ubuntu2.2
Ubuntu 10.04 LTS:
e2fsprogs

1.41.11-1ubuntu2.3

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-0247,

CVE-2015-1572

USN-2509-1: ca-certificates update

Ubuntu Security Notice USN-2509-1

23rd February, 2015

ca-certificates update

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

ca-certificates was updated to the 20141019 package.

Software description

  • ca-certificates
    – Common CA certificates

Details

The ca-certificates package contained outdated CA certificates. This update
refreshes the included certificates to those contained in the 20141019
package.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
ca-certificates

20141019ubuntu0.14.10.1
Ubuntu 14.04 LTS:
ca-certificates

20141019ubuntu0.14.04.1
Ubuntu 12.04 LTS:
ca-certificates

20141019ubuntu0.12.04.1
Ubuntu 10.04 LTS:
ca-certificates

20141019ubuntu0.10.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

LP: 1423904

USN-2508-1: Samba vulnerability

Ubuntu Security Notice USN-2508-1

23rd February, 2015

samba vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Samba could be made to run programs as an administrator if it received
specially crafted network traffic.

Software description

  • samba
    – SMB/CIFS file, print, and login server for Unix

Details

Richard van Eeden discovered that the Samba smbd file services incorrectly
handled memory. A remote attacker could use this issue to possibly execute
arbitrary code with root privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
samba

2:4.1.11+dfsg-1ubuntu2.2
Ubuntu 14.04 LTS:
samba

2:4.1.6+dfsg-1ubuntu2.14.04.7
Ubuntu 12.04 LTS:
samba

2:3.6.3-2ubuntu2.12

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-0240

USN-2504-1: NSS update

Ubuntu Security Notice USN-2504-1

19th February, 2015

nss update

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

NSS was updated to refresh the CA certificates bundle.

Software description

  • nss
    – Network Security Service library

Details

The NSS package contained outdated CA certificates. This update refreshes
the NSS package to version 3.17.4 which includes the latest CA certificate
bundle.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
libnss3

2:3.17.4-0ubuntu0.14.10.1
Ubuntu 14.04 LTS:
libnss3

2:3.17.4-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
libnss3

3.17.4-0ubuntu0.12.04.1
Ubuntu 10.04 LTS:
libnss3-1d

3.17.4-0ubuntu0.10.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use NSS, such as Evolution and Chromium, to make all the necessary
changes.

References

LP: 1423031

USN-2503-1: Bind vulnerability

Ubuntu Security Notice USN-2503-1

18th February, 2015

bind9 vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Bind could be made to crash if it received specially crafted network
traffic.

Software description

  • bind9
    – Internet Domain Name Server

Details

Jan-Piet Mens discovered that Bind incorrectly handled Trust Anchor
Management. A remote attacker could use this issue to cause bind to crash,
resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
bind9

1:9.9.5.dfsg-4.3ubuntu0.2
Ubuntu 14.04 LTS:
bind9

1:9.9.5.dfsg-3ubuntu0.2
Ubuntu 12.04 LTS:
bind9

1:9.8.1.dfsg.P1-4ubuntu0.10

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-1349

USN-2502-1: unzip vulnerabilities

Ubuntu Security Notice USN-2502-1

17th February, 2015

unzip vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

unzip could be made to run programs if it opened a specially crafted file.

Software description

  • unzip
    – De-archiver for .zip files

Details

William Robinet discovered that unzip incorrectly handled certain
malformed zip archives. If a user or automated system were tricked into
processing a specially crafted zip archive, an attacker could possibly
execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
unzip

6.0-12ubuntu1.3
Ubuntu 14.04 LTS:
unzip

6.0-9ubuntu1.3
Ubuntu 12.04 LTS:
unzip

6.0-4ubuntu2.3

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-1315

USN-2501-1: PHP vulnerabilities

Ubuntu Security Notice USN-2501-1

17th February, 2015

php5 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in PHP.

Software description

  • php5
    – HTML-embedded scripting language interpreter

Details

Stefan Esser discovered that PHP incorrectly handled unserializing objects.
A remote attacker could use this issue to cause PHP to crash, resulting in
a denial of service, or possibly execute arbitrary code. (CVE-2014-8142,
CVE-2015-0231)

Brian Carpenter discovered that the PHP CGI component incorrectly handled
invalid files. A local attacker could use this issue to obtain sensitive
information, or possibly execute arbitrary code. This issue only affected
Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2014-9427)

It was discovered that PHP incorrectly handled certain pascal strings in
the fileinfo extension. A remote attacker could possibly use this issue to
cause PHP to crash, resulting in a denial of service. This issue only
affected Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2014-9652)

Alex Eubanks discovered that PHP incorrectly handled EXIF data in JPEG
images. A remote attacker could use this issue to cause PHP to crash,
resulting in a denial of service, or possibly execute arbitrary code.
This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2015-0232)

It was discovered that the PHP opcache component incorrectly handled
memory. A remote attacker could possibly use this issue to cause PHP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10.
(CVE-2015-1351)

It was discovered that the PHP PostgreSQL database extension incorrectly
handled certain pointers. A remote attacker could possibly use this issue
to cause PHP to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 14.04 LTS and
Ubuntu 14.10. (CVE-2015-1352)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
php5-cli

5.5.12+dfsg-2ubuntu4.2
php5-cgi

5.5.12+dfsg-2ubuntu4.2
libapache2-mod-php5

5.5.12+dfsg-2ubuntu4.2
php5-fpm

5.5.12+dfsg-2ubuntu4.2
php5-pgsql

5.5.12+dfsg-2ubuntu4.2
Ubuntu 14.04 LTS:
php5-cli

5.5.9+dfsg-1ubuntu4.6
php5-cgi

5.5.9+dfsg-1ubuntu4.6
libapache2-mod-php5

5.5.9+dfsg-1ubuntu4.6
php5-fpm

5.5.9+dfsg-1ubuntu4.6
php5-pgsql

5.5.9+dfsg-1ubuntu4.6
Ubuntu 12.04 LTS:
php5-cli

5.3.10-1ubuntu3.16
php5-cgi

5.3.10-1ubuntu3.16
libapache2-mod-php5

5.3.10-1ubuntu3.16
php5-fpm

5.3.10-1ubuntu3.16
php5-pgsql

5.3.10-1ubuntu3.16

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-8142,

CVE-2014-9427,

CVE-2014-9652,

CVE-2015-0231,

CVE-2015-0232,

CVE-2015-1351,

CVE-2015-1352