[USN-6944-2] curl vulnerability

2024-08-20 Thread Federico Quattrin

==
Ubuntu Security Notice USN-6944-2
August 20, 2024

curl vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

curl could be made to crash or expose information if it received specially
crafted network traffic.

Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries

Details:

USN-6944-1 fixed CVE-2024-7264 for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and
Ubuntu 24.04 LTS. This update provides the corresponding fix for
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS.

Original advisory details:

Dov Murik discovered that curl incorrectly handled parsing ASN.1
Generalized Time fields. A remote attacker could use this issue to cause
curl to crash, resulting in a denial of service, or possibly obtain
sensitive memory contents.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
curl 7.58.0-2ubuntu3.24+esm5
Available with Ubuntu Pro
libcurl3-gnutls 7.58.0-2ubuntu3.24+esm5
Available with Ubuntu Pro
libcurl3-nss 7.58.0-2ubuntu3.24+esm5
Available with Ubuntu Pro
libcurl4 7.58.0-2ubuntu3.24+esm5
Available with Ubuntu Pro

Ubuntu 16.04 LTS
curl 7.47.0-1ubuntu2.19+esm13
Available with Ubuntu Pro
libcurl3 7.47.0-1ubuntu2.19+esm13
Available with Ubuntu Pro
libcurl3-gnutls 7.47.0-1ubuntu2.19+esm13
Available with Ubuntu Pro
libcurl3-nss 7.47.0-1ubuntu2.19+esm13
Available with Ubuntu Pro

Ubuntu 14.04 LTS
curl 7.35.0-1ubuntu2.20+esm18
Available with Ubuntu Pro
libcurl3 7.35.0-1ubuntu2.20+esm18
Available with Ubuntu Pro
libcurl3-gnutls 7.35.0-1ubuntu2.20+esm18
Available with Ubuntu Pro
libcurl3-nss 7.35.0-1ubuntu2.20+esm18
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6944-2
https://ubuntu.com/security/notices/USN-6944-1
CVE-2024-7264




OpenPGP_0x703AAD91046CD76E.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature



[USN-6913-2] phpCAS vulnerability

2024-07-31 Thread Federico Quattrin

==
Ubuntu Security Notice USN-6913-2
July 31, 2024

php-cas vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

phpCAS was vulnerable to an authentication bypass.

Software Description:
- php-cas: Central Authentication Service client library in php

Details:

USN-6913-1 fixed CVE-2022-39369 for Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
This update provides the corresponding fix for Ubuntu 16.04 LTS.

Original advisory details:

Filip Hejsek discovered that phpCAS was using HTTP headers to determine
the service URL used to validate tickets. A remote attacker could
possibly use this issue to gain access to a victim's account on a
vulnerable CASified service.

This security update introduces an incompatible API change. After applying
this update, third party applications need to be modified to pass in an
additional service base URL argument when constructing the client class.

For more information please refer to the section
"Upgrading 1.5.0 -> 1.6.0" of the phpCAS upgrading document:

https://github.com/apereo/phpCAS/blob/master/docs/Upgrading

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS
php-cas 1.3.3-2ubuntu1+esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6913-2
https://ubuntu.com/security/notices/USN-6913-1
CVE-2022-39369




OpenPGP_0x703AAD91046CD76E.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature



[USN-6914-1] OCS Inventory vulnerability

2024-07-24 Thread Federico Quattrin

==
Ubuntu Security Notice USN-6914-1
July 24, 2024

ocsinventory-server vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

OCS Inventory was vulnerable to an authentication bypass if the
selected authentication method was via CAS.

Software Description:
- ocsinventory-server: Hardware and software inventory tool

Details:

Filip Hejsek discovered that the phpCAS library included in OCS Inventory
was using HTTP headers to determine the service URL used to validate
tickets. A remote attacker could possibly use this issue to gain access
to a victim's account.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
ocsinventory-reports 2.8.1+dfsg1-1ubuntu0.1
ocsinventory-server 2.8.1+dfsg1-1ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6914-1
CVE-2022-39369

Package Information:
https://launchpad.net/ubuntu/+source/ocsinventory-server/2.8.1+dfsg1-1ubuntu0.1




OpenPGP_0x703AAD91046CD76E.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature



[USN-6913-1] phpCAS vulnerability

2024-07-24 Thread Federico Quattrin

==
Ubuntu Security Notice USN-6913-1
July 24, 2024

php-cas vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

phpCAS was vulnerable to an authentication bypass.

Software Description:
- php-cas: Central Authentication Service client library in php

Details:

Filip Hejsek discovered that phpCAS was using HTTP headers to determine
the service URL used to validate tickets. A remote attacker could
possibly use this issue to gain access to a victim's account on a
vulnerable CASified service.

This security update introduces an incompatible API change. After applying
this update, third party applications need to be modified to pass in an
additional service base URL argument when constructing the client class.

For more information please refer to the section
"Upgrading 1.5.0 -> 1.6.0" of the phpCAS upgrading document:

https://github.com/apereo/phpCAS/blob/master/docs/Upgrading

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
php-cas 1.3.8-1ubuntu0.22.04.1

Ubuntu 20.04 LTS
php-cas 1.3.8-1ubuntu0.20.04.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6913-1
CVE-2022-39369

Package Information:
https://launchpad.net/ubuntu/+source/php-cas/1.3.8-1ubuntu0.22.04.1
https://launchpad.net/ubuntu/+source/php-cas/1.3.8-1ubuntu0.20.04.1




OpenPGP_0x703AAD91046CD76E.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature



[USN-6908-1] Tomcat vulnerabilities

2024-07-23 Thread Federico Quattrin

==
Ubuntu Security Notice USN-6908-1
July 23, 2024

tomcat vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Tomcat.

Software Description:
- tomcat7: Servlet 3.0 and JSP 2.2 Java API classes

Details:

It was discovered that the Tomcat SSI printenv command echoed user
provided data without escaping it. An attacker could possibly use this
issue to perform an XSS attack. (CVE-2019-0221)

It was discovered that Tomcat incorrectly handled certain uncommon
PersistenceManager with FileStore configurations. A remote attacker could
possibly use this issue to execute arbitrary code.
(CVE-2020-9484, CVE-2021-25329)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
libservlet3.0-java 7.0.78-1ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
libservlet3.0-java 7.0.68-1ubuntu0.4+esm2
Available with Ubuntu Pro
libtomcat7-java 7.0.68-1ubuntu0.4+esm2
Available with Ubuntu Pro
tomcat7 7.0.68-1ubuntu0.4+esm2
Available with Ubuntu Pro

Ubuntu 14.04 LTS
libservlet3.0-java 7.0.52-1ubuntu0.16+esm1
Available with Ubuntu Pro
libtomcat7-java 7.0.52-1ubuntu0.16+esm1
Available with Ubuntu Pro
tomcat7 7.0.52-1ubuntu0.16+esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6908-1
CVE-2019-0221, CVE-2020-9484, CVE-2021-25329




OpenPGP_0x703AAD91046CD76E.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature



[USN-6825-1] ADOdb vulnerabilities

2024-06-10 Thread Federico Quattrin

==
Ubuntu Security Notice USN-6825-1
June 10, 2024

libphp-adodb vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in ADOdb.

Software Description:
- libphp-adodb: ADOdb is a PHP database abstraction layer library

Details:

It was discovered that the PDO driver in ADOdb was incorrectly handling
string quotes. A remote attacker could possibly use this issue to 
perform SQL injection attacks. This issue only affected Ubuntu 16.04 LTS.

(CVE-2016-7405)

It was discovered that ADOdb was incorrectly handling GET parameters in 
test.php. A remote attacker could possibly use this issue to execute 
cross-site scripting (XSS) attacks. This issue only affected Ubuntu 
16.04 LTS. (CVE-2016-4855)


Emmet Leahy discovered that ADOdb was incorrectly handling string quotes
in PostgreSQL connections. A remote attacker could possibly use this issue
to bypass authentication. (CVE-2021-3850)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
libphp-adodb 5.20.19-1ubuntu0.1

Ubuntu 20.04 LTS
libphp-adodb 5.20.16-1ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
libphp-adodb 5.20.9-1ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
libphp-adodb 5.20.3-1ubuntu1+esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6825-1
CVE-2016-4855, CVE-2016-7405, CVE-2021-3850

Package Information:
https://launchpad.net/ubuntu/+source/libphp-adodb/5.20.19-1ubuntu0.1




OpenPGP_0x703AAD91046CD76E.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature



[USN-6796-1] TPM2 Software Stack vulnerabilities

2024-05-29 Thread Federico Quattrin

==
Ubuntu Security Notice USN-6796-1
May 29, 2024

tpm2-tss vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in TPM2 Software Stack.

Software Description:
- tpm2-tss: TPM2 Software Stack library

Details:

Fergus Dall discovered that TPM2 Software Stack did not properly handle
layer arrays. An attacker could possibly use this issue to cause
TPM2 Software Stack to crash, resulting in a denial of service, or
possibly execute arbitrary code.
(CVE-2023-22745)

Jurgen Repp and Andreas Fuchs discovered that TPM2 Software Stack did not
validate the quote data after deserialization. An attacker could generate
an arbitrary quote and cause TPM2 Software Stack to have unknown behavior.
(CVE-2024-29040)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  libtss2-esys-3.0.2-0t64 4.0.1-7.1ubuntu5.1
  libtss2-fapi1t644.0.1-7.1ubuntu5.1
  libtss2-mu-4.0.1-0t64   4.0.1-7.1ubuntu5.1
  libtss2-policy0t64  4.0.1-7.1ubuntu5.1
  libtss2-rc0t64  4.0.1-7.1ubuntu5.1
  libtss2-sys1t64 4.0.1-7.1ubuntu5.1
  libtss2-tcti-cmd0t644.0.1-7.1ubuntu5.1
  libtss2-tcti-device0t64 4.0.1-7.1ubuntu5.1
  libtss2-tcti-libtpms0t644.0.1-7.1ubuntu5.1
  libtss2-tcti-mssim0t64  4.0.1-7.1ubuntu5.1
  libtss2-tcti-pcap0t64   4.0.1-7.1ubuntu5.1
  libtss2-tcti-spi-helper0t64 4.0.1-7.1ubuntu5.1
  libtss2-tcti-swtpm0t64  4.0.1-7.1ubuntu5.1
  libtss2-tctildr0t64 4.0.1-7.1ubuntu5.1

Ubuntu 23.10
  libtss2-esys-3.0.2-04.0.1-3ubuntu1.1
  libtss2-fapi1   4.0.1-3ubuntu1.1
  libtss2-mu0 4.0.1-3ubuntu1.1
  libtss2-policy0 4.0.1-3ubuntu1.1
  libtss2-rc0 4.0.1-3ubuntu1.1
  libtss2-sys14.0.1-3ubuntu1.1
  libtss2-tcti-cmd0   4.0.1-3ubuntu1.1
  libtss2-tcti-device04.0.1-3ubuntu1.1
  libtss2-tcti-libtpms0   4.0.1-3ubuntu1.1
  libtss2-tcti-mssim0 4.0.1-3ubuntu1.1
  libtss2-tcti-pcap0  4.0.1-3ubuntu1.1
  libtss2-tcti-spi-helper04.0.1-3ubuntu1.1
  libtss2-tcti-swtpm0 4.0.1-3ubuntu1.1
  libtss2-tctildr04.0.1-3ubuntu1.1

Ubuntu 22.04 LTS
  libtss2-esys-3.0.2-03.2.0-1ubuntu1.1
  libtss2-fapi1   3.2.0-1ubuntu1.1
  libtss2-mu0 3.2.0-1ubuntu1.1
  libtss2-rc0 3.2.0-1ubuntu1.1
  libtss2-sys13.2.0-1ubuntu1.1
  libtss2-tcti-cmd0   3.2.0-1ubuntu1.1
  libtss2-tcti-device03.2.0-1ubuntu1.1
  libtss2-tcti-mssim0 3.2.0-1ubuntu1.1
  libtss2-tcti-swtpm0 3.2.0-1ubuntu1.1
  libtss2-tctildr03.2.0-1ubuntu1.1

Ubuntu 20.04 LTS
  libtss2-esys0   2.3.2-1ubuntu0.20.04.2

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6796-1
  CVE-2023-22745, CVE-2024-29040

Package Information:
  https://launchpad.net/ubuntu/+source/tpm2-tss/4.0.1-7.1ubuntu5.1
  https://launchpad.net/ubuntu/+source/tpm2-tss/4.0.1-3ubuntu1.1
  https://launchpad.net/ubuntu/+source/tpm2-tss/3.2.0-1ubuntu1.1
  https://launchpad.net/ubuntu/+source/tpm2-tss/2.3.2-1ubuntu0.20.04.2



OpenPGP_0x703AAD91046CD76E.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature



[USN-6781-1] Spreadsheet::ParseExcel vulnerability

2024-05-21 Thread Federico Quattrin

==
Ubuntu Security Notice USN-6781-1
May 21, 2024

libspreadsheet-parseexcel-perl vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Spreadsheet::ParseExcel could possibly run commands if it processed a 
specially crafted file.


Software Description:
- libspreadsheet-parseexcel-perl: Perl module to access information from 
Excel Spreadsheets


Details:

Le Dinh Hai discovered that Spreadsheet::ParseExcel was passing 
unvalidated input from a file into a string-type "eval". An attacker 
could craft a malicious file to achieve arbitrary code execution.


Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
libspreadsheet-parseexcel-perl 0.6500-1.1ubuntu0.1

Ubuntu 20.04 LTS
libspreadsheet-parseexcel-perl 0.6500-1ubuntu0.20.04.1

Ubuntu 18.04 LTS
libspreadsheet-parseexcel-perl 0.6500-1ubuntu0.18.04.1~esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
libspreadsheet-parseexcel-perl 0.6500-1ubuntu0.16.04.1~esm1
Available with Ubuntu Pro

Ubuntu 14.04 LTS
libspreadsheet-parseexcel-perl 0.5800-1ubuntu0.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6781-1
CVE-2023-7101

Package Information:
https://launchpad.net/ubuntu/+source/libspreadsheet-parseexcel-perl/0.6500-1.1ubuntu0.1
https://launchpad.net/ubuntu/+source/libspreadsheet-parseexcel-perl/0.6500-1ubuntu0.20.04.1




OpenPGP_0x703AAD91046CD76E.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature



[USN-6753-1] CryptoJS vulnerability

2024-04-25 Thread Federico Quattrin

==
Ubuntu Security Notice USN-6753-1
April 25, 2024

cryptojs vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS (Available with Ubuntu Pro)
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

CryptoJS could be made to expose sensitive information.

Software Description:
- cryptojs: collection of cryptographic algorithms implemented in JavaScript

Details:

Thomas Neil James Shadwell discovered that CryptoJS was using an insecure
cryptographic default configuration. A remote attacker could possibly use
this issue to expose sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS (Available with Ubuntu Pro):
  libjs-cryptojs  3.1.2+dfsg-3ubuntu0.22.04.1~esm1

Ubuntu 20.04 LTS:
  libjs-cryptojs  3.1.2+dfsg-2ubuntu0.20.04.1

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  libjs-cryptojs  3.1.2+dfsg-2ubuntu0.18.04.1~esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  libjs-cryptojs  3.1.2+dfsg-2ubuntu0.16.04.1~esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6753-1
  CVE-2023-46233

Package Information:
  https://launchpad.net/ubuntu/+source/cryptojs/3.1.2+dfsg-2ubuntu0.20.04.1



OpenPGP_0x703AAD91046CD76E.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature