[USN-5057-1] Squashfs-Tools vulnerability
== Ubuntu Security Notice USN-5057-1 August 31, 2021 squashfs-tools vulnerability == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 21.04 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: squashfs-tools could be made to overwrite files. Software Description: - squashfs-tools: Tools to create and modify squashfs filesystems Details: Etienne Stalmans discovered that Squashfs-Tools mishandled certain malformed SQUASHFS files. An attacker could use this vulnerability to write arbitrary files to the filesystem. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 21.04: squashfs-tools 1:4.4-2ubuntu0.1 Ubuntu 20.04 LTS: squashfs-tools 1:4.4-1ubuntu0.1 Ubuntu 18.04 LTS: squashfs-tools 1:4.3-6ubuntu0.18.04.3 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-5057-1 CVE-2021-40153 Package Information: https://launchpad.net/ubuntu/+source/squashfs-tools/1:4.4-2ubuntu0.1 https://launchpad.net/ubuntu/+source/squashfs-tools/1:4.4-1ubuntu0.1 https://launchpad.net/ubuntu/+source/squashfs-tools/1:4.3-6ubuntu0.18.04.3 signature.asc Description: PGP signature -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
[USN-5054-1] uWSGI vulnerability
== Ubuntu Security Notice USN-5054-1 August 30, 2021 uwsgi vulnerability == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS Summary: uWSGI could be made to crash if it received specially crafted input. Software Description: - uwsgi: fast, self-healing application container server Details: Felix Wilhelm discovered a buffer overflow flaw in the mod_proxy_uwsgi module. An attacker could use this vulnerability to provoke an information disclosure or potentially remote code execution. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: libapache2-mod-proxy-uwsgi 2.0.15-10.2ubuntu2.2 libapache2-mod-ruwsgi 2.0.15-10.2ubuntu2.2 libapache2-mod-uwsgi2.0.15-10.2ubuntu2.2 uwsgi 2.0.15-10.2ubuntu2.2 uwsgi-core 2.0.15-10.2ubuntu2.2 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-5054-1 CVE-2020-11984 Package Information: https://launchpad.net/ubuntu/+source/uwsgi/2.0.15-10.2ubuntu2.2 signature.asc Description: PGP signature -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
[USN-5056-1] APR vulnerability
== Ubuntu Security Notice USN-5056-1 August 30, 2021 apr vulnerability == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 21.04 - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: APR could be made to expose sensitive information if it received a specially crafted input. Software Description: - apr: Apache Portable Runtime Library Details: It was discovered that APR incorrectly handled certain inputs. An attacker could possibly use this issue to expose sensitive information. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 21.04: libapr1 1.7.0-6ubuntu0.1 Ubuntu 16.04 ESM: libapr1 1.5.2-3ubuntu0.1~esm1 Ubuntu 14.04 ESM: libapr1 1.5.0-1ubuntu0.1~esm1 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-5056-1 CVE-2021-35940 Package Information: https://launchpad.net/ubuntu/+source/apr/1.7.0-6ubuntu0.1 signature.asc Description: PGP signature -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
[USN-5055-1] GNOME grilo vulnerability
== Ubuntu Security Notice USN-5055-1 August 30, 2021 grilo vulnerability == A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 21.04 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 ESM Summary: grilo could be made to allow MITM attacks. Software Description: - grilo: Framework for discovering and browsing media - GObject introspect Details: Michael Catanzaro discovered that grilo incorrectly handled certain TLS certificate verification. An attacker could possibly use this issue to MITM attacks. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 21.04: libgrilo-0.3-0 0.3.13-1ubuntu0.1 Ubuntu 20.04 LTS: libgrilo-0.3-0 0.3.12-1ubuntu0.1 Ubuntu 18.04 LTS: libgrilo-0.3-0 0.3.4-1ubuntu0.1 Ubuntu 16.04 ESM: libgrilo-0.2-1 0.2.15-1ubuntu0.1~esm1 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-5055-1 CVE-2021-39365 Package Information: https://launchpad.net/ubuntu/+source/grilo/0.3.13-1ubuntu0.1 https://launchpad.net/ubuntu/+source/grilo/0.3.12-1ubuntu0.1 https://launchpad.net/ubuntu/+source/grilo/0.3.4-1ubuntu0.1 signature.asc Description: PGP signature -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce