Category Archives: Ubuntu

Ubuntu Security Notices

USN-2474-1: curl vulnerability

Ubuntu Security Notice USN-2474-1

15th January, 2015

curl vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

curl could be tricked into adding arbitrary requests when following certain
URLs.

Software description

  • curl
    – HTTP, HTTPS, and FTP client and client libraries

Details

Andrey Labunets discovered that curl incorrectly handled certain URLs when
using a proxy server. If a user or automated system were tricked into using
a specially crafted URL, an attacker could possibly use this issue to
inject arbitrary HTTP requests.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
libcurl3-nss

7.37.1-1ubuntu3.2
libcurl3-gnutls

7.37.1-1ubuntu3.2
libcurl3

7.37.1-1ubuntu3.2
Ubuntu 14.04 LTS:
libcurl3-nss

7.35.0-1ubuntu2.3
libcurl3-gnutls

7.35.0-1ubuntu2.3
libcurl3

7.35.0-1ubuntu2.3
Ubuntu 12.04 LTS:
libcurl3-nss

7.22.0-3ubuntu4.12
libcurl3-gnutls

7.22.0-3ubuntu4.12
libcurl3

7.22.0-3ubuntu4.12
Ubuntu 10.04 LTS:
libcurl3-gnutls

7.19.7-1ubuntu1.11
libcurl3

7.19.7-1ubuntu1.11

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-8150

USN-2475-1: GTK+ update

Ubuntu Security Notice USN-2475-1

15th January, 2015

gtk+3.0 update

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

GTK+ improperly handled the menu key, possibly allowing lock screen bypass.

Software description

  • gtk+3.0
    – GTK+ graphical user interface library

Details

Clemens Fries discovered that GTK+ allowed bypassing certain screen locks
by using the menu key. An attacker with physical access could possibly use
this flaw to gain access to a locked session.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
libgtk-3-0

3.10.8-0ubuntu1.4

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart your session to make
all the necessary changes.

References

LP: 1366790

USN-2472-1: unzip vulnerabilities

Ubuntu Security Notice USN-2472-1

14th January, 2015

unzip vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

unzip could be made to crash or run programs if it opened a specially
crafted file.

Software description

  • unzip
    – De-archiver for .zip files

Details

Wolfgang Ettlinger discovered that unzip incorrectly handled certain
malformed zip archives. If a user or automated system were tricked into
processing a specially crafted zip archive, an attacker could possibly
execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
unzip

6.0-12ubuntu1.1
Ubuntu 14.04 LTS:
unzip

6.0-9ubuntu1.1
Ubuntu 12.04 LTS:
unzip

6.0-4ubuntu2.1
Ubuntu 10.04 LTS:
unzip

6.0-1ubuntu0.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-8139,

CVE-2014-8140,

CVE-2014-8141

USN-2471-1: GParted vulnerability

Ubuntu Security Notice USN-2471-1

14th January, 2015

gparted vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

GParted could be made to run programs as an administrator.

Software description

  • gparted
    – GNOME partition editor

Details

Wolfgang Ettlinger discovered that GParted incorrectly filtered shell
metacharacters when running external commands. A local attacker could use
this issue with a crafted filesystem label to run arbitrary commands as the
administrator.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
gparted

0.11.0-2ubuntu0.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-7208

USN-2473-1: coreutils vulnerabilities

Ubuntu Security Notice USN-2473-1

14th January, 2015

coreutils vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

date and touch could be made to crash or run programs if they
handled specially crafted input.

Software description

  • coreutils
    – GNU core utilities

Details

It was discovered that the distcheck rule in dist-check.mk in GNU
coreutils allows local users to gain privileges via a symlink attack
on a directory tree under /tmp. This issue only affected Ubuntu 10.04 LTS.
(CVE-2009-4135)

Bertrand Jacquin and Fiedler Roman discovered date and touch incorrectly
handled user-supplied input. An attacker could possibly use this to cause
a denial of service or potentially execute code. (CVE-2014-9471)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
coreutils

8.21-1ubuntu5.1
Ubuntu 12.04 LTS:
coreutils

8.13-3ubuntu3.3
Ubuntu 10.04 LTS:
coreutils

7.4-2ubuntu3.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2009-4135,

CVE-2014-9471

USN-2458-2: Ubufox update

Ubuntu Security Notice USN-2458-2

14th January, 2015

ubufox update

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

This update provides compatible packages for Firefox 35.

Software description

  • ubufox
    – Ubuntu Firefox specific configuration defaults and apt support

Details

USN-2458-1 fixed vulnerabilities in Firefox. This update provides the
corresponding version of Ubufox.

Original advisory details:

Christian Holler, Patrick McManus, Christoph Diehl, Gary Kwong, Jesse
Ruderman, Byron Campen, Terrence Cole, and Nils Ohlmeier discovered
multiple memory safety issues in Firefox. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
these to cause a denial of service via application crash, or execute
arbitrary code with the privileges of the user invoking Firefox.
(CVE-2014-8634, CVE-2014-8635)

Bobby Holley discovered that some DOM objects with certain properties
can bypass XrayWrappers in some circumstances. If a user were tricked in
to opening a specially crafted website, an attacker could potentially
exploit this to bypass security restrictions. (CVE-2014-8636)

Michal Zalewski discovered a use of uninitialized memory when rendering
malformed bitmap images on a canvas element. If a user were tricked in to
opening a specially crafted website, an attacker could potentially
exploit this to steal confidential information. (CVE-2014-8637)

Muneaki Nishimura discovered that requests from navigator.sendBeacon()
lack an origin header. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to conduct
cross-site request forgery (XSRF) attacks. (CVE-2014-8638)

Xiaofeng Zheng discovered that a web proxy returning a 407 response
could inject cookies in to the originally requested domain. If a user
connected to a malicious web proxy, an attacker could potentially exploit
this to conduct session-fixation attacks. (CVE-2014-8639)

Holger Fuhrmannek discovered a crash in Web Audio while manipulating
timelines. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to cause a denial
of service. (CVE-2014-8640)

Mitchell Harper discovered a use-after-free in WebRTC. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invoking
Firefox. (CVE-2014-8641)

Brian Smith discovered that OCSP responses would fail to verify if signed
by a delegated OCSP responder certificate with the id-pkix-ocsp-nocheck
extension, potentially allowing a user to connect to a site with a revoked
certificate. (CVE-2014-8642)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
xul-ext-ubufox

3.0-0ubuntu0.14.10.1
Ubuntu 14.04 LTS:
xul-ext-ubufox

3.0-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
xul-ext-ubufox

3.0-0ubuntu0.12.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make
all the necessary changes.

USN-2458-1: Firefox vulnerabilities

Ubuntu Security Notice USN-2458-1

14th January, 2015

firefox vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Firefox could be made to crash or run programs as your login if it
opened a malicious website.

Software description

  • firefox
    – Mozilla Open Source web browser

Details

Christian Holler, Patrick McManus, Christoph Diehl, Gary Kwong, Jesse
Ruderman, Byron Campen, Terrence Cole, and Nils Ohlmeier discovered
multiple memory safety issues in Firefox. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
these to cause a denial of service via application crash, or execute
arbitrary code with the privileges of the user invoking Firefox.
(CVE-2014-8634, CVE-2014-8635)

Bobby Holley discovered that some DOM objects with certain properties
can bypass XrayWrappers in some circumstances. If a user were tricked in
to opening a specially crafted website, an attacker could potentially
exploit this to bypass security restrictions. (CVE-2014-8636)

Michal Zalewski discovered a use of uninitialized memory when rendering
malformed bitmap images on a canvas element. If a user were tricked in to
opening a specially crafted website, an attacker could potentially
exploit this to steal confidential information. (CVE-2014-8637)

Muneaki Nishimura discovered that requests from navigator.sendBeacon()
lack an origin header. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to conduct
cross-site request forgery (XSRF) attacks. (CVE-2014-8638)

Xiaofeng Zheng discovered that a web proxy returning a 407 response
could inject cookies in to the originally requested domain. If a user
connected to a malicious web proxy, an attacker could potentially exploit
this to conduct session-fixation attacks. (CVE-2014-8639)

Holger Fuhrmannek discovered a crash in Web Audio while manipulating
timelines. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to cause a denial
of service. (CVE-2014-8640)

Mitchell Harper discovered a use-after-free in WebRTC. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invoking
Firefox. (CVE-2014-8641)

Brian Smith discovered that OCSP responses would fail to verify if signed
by a delegated OCSP responder certificate with the id-pkix-ocsp-nocheck
extension, potentially allowing a user to connect to a site with a revoked
certificate. (CVE-2014-8642)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
firefox

35.0+build3-0ubuntu0.14.10.2
Ubuntu 14.04 LTS:
firefox

35.0+build3-0ubuntu0.14.04.2
Ubuntu 12.04 LTS:
firefox

35.0+build3-0ubuntu0.12.04.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make
all the necessary changes.

References

CVE-2014-8634,

CVE-2014-8635,

CVE-2014-8636,

CVE-2014-8637,

CVE-2014-8638,

CVE-2014-8639,

CVE-2014-8640,

CVE-2014-8641,

CVE-2014-8642

USN-2463-1: Linux kernel vulnerabilities

Ubuntu Security Notice USN-2463-1

13th January, 2015

linux vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in the kernel.

Software description

  • linux
    – Linux kernel

Details

A race condition with MMIO and PIO transactions in the KVM (Kernel Virtual
Machine) subsystem of the Linux kernel was discovered. A guest OS user
could exploit this flaw to cause a denial of service (guest OS crash) via a
specially crafted application. (CVE-2014-7842)

The KVM (kernel virtual machine) subsystem of the Linux kernel
miscalculates the number of memory pages during the handling of a mapping
failure. A guest OS user could exploit this to cause a denial of service
(host OS page unpinning) or possibly have unspecified other impact by
leveraging guest OS privileges. (CVE-2014-8369)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
linux-image-3.2.0-75-generic-pae

3.2.0-75.110
linux-image-3.2.0-75-powerpc64-smp

3.2.0-75.110
linux-image-3.2.0-75-virtual

3.2.0-75.110
linux-image-3.2.0-75-omap

3.2.0-75.110
linux-image-3.2.0-75-generic

3.2.0-75.110
linux-image-3.2.0-75-powerpc-smp

3.2.0-75.110
linux-image-3.2.0-75-highbank

3.2.0-75.110

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2014-7842,

CVE-2014-8369

USN-2462-1: Linux kernel vulnerabilities

Ubuntu Security Notice USN-2462-1

13th January, 2015

linux vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 10.04 LTS

Summary

Several security issues were fixed in the kernel.

Software description

  • linux
    – Linux kernel

Details

Lars Bull reported a race condition in the PIT (programmable interrupt
timer) emulation in the KVM (Kernel Virtual Machine) subsystem of the Linux
kernel. A local guest user with access to PIT i/o ports could exploit this
flaw to cause a denial of service (crash) on the host. (CVE-2014-3611)

Lars Bull and Nadav Amit reported a flaw in how KVM (the Kernel Virtual
Machine) handles noncanonical writes to certain MSR registers. A privileged
guest user can exploit this flaw to cause a denial of service (kernel
panic) on the host. (CVE-2014-3610)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 10.04 LTS:
linux-image-2.6.32-71-powerpc-smp

2.6.32-71.138
linux-image-2.6.32-71-versatile

2.6.32-71.138
linux-image-2.6.32-71-server

2.6.32-71.138
linux-image-2.6.32-71-powerpc64-smp

2.6.32-71.138
linux-image-2.6.32-71-lpia

2.6.32-71.138
linux-image-2.6.32-71-386

2.6.32-71.138
linux-image-2.6.32-71-generic-pae

2.6.32-71.138
linux-image-2.6.32-71-sparc64-smp

2.6.32-71.138
linux-image-2.6.32-71-preempt

2.6.32-71.138
linux-image-2.6.32-71-sparc64

2.6.32-71.138
linux-image-2.6.32-71-ia64

2.6.32-71.138
linux-image-2.6.32-71-virtual

2.6.32-71.138
linux-image-2.6.32-71-generic

2.6.32-71.138
linux-image-2.6.32-71-powerpc

2.6.32-71.138

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2014-3610,

CVE-2014-3611

USN-2468-1: Linux kernel vulnerabilities

Ubuntu Security Notice USN-2468-1

13th January, 2015

linux vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10

Summary

Several security issues were fixed in the kernel.

Software description

  • linux
    – Linux kernel

Details

A null pointer dereference flaw was discovered in the the Linux kernel’s
SCTP implementation when ASCONF is used. A remote attacker could exploit
this flaw to cause a denial of service (system crash) via a malformed INIT
chunk. (CVE-2014-7841)

A race condition with MMIO and PIO transactions in the KVM (Kernel Virtual
Machine) subsystem of the Linux kernel was discovered. A guest OS user
could exploit this flaw to cause a denial of service (guest OS crash) via a
specially crafted application. (CVE-2014-7842)

Miloš Prchlík reported a flaw in how the ARM64 platform handles a single
byte overflow in __clear_user. A local user could exploit this flaw to
cause a denial of service (system crash) by reading one byte beyond a
/dev/zero page boundary. (CVE-2014-7843)

A stack buffer overflow was discovered in the ioctl command handling for
the Technotrend/Hauppauge USB DEC devices driver. A local user could
exploit this flaw to cause a denial of service (system crash) or possibly
gain privileges. (CVE-2014-8884)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
linux-image-3.16.0-29-powerpc-smp

3.16.0-29.39
linux-image-3.16.0-29-lowlatency

3.16.0-29.39
linux-image-3.16.0-29-powerpc-e500mc

3.16.0-29.39
linux-image-3.16.0-29-generic-lpae

3.16.0-29.39
linux-image-3.16.0-29-powerpc64-emb

3.16.0-29.39
linux-image-3.16.0-29-powerpc64-smp

3.16.0-29.39
linux-image-3.16.0-29-generic

3.16.0-29.39

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References

CVE-2014-7841,

CVE-2014-7842,

CVE-2014-7843,

CVE-2014-8884