[USN-5057-1] Squashfs-Tools vulnerability

2021-08-30 Thread Alex Murray
==
Ubuntu Security Notice USN-5057-1
August 31, 2021

squashfs-tools vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.04
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

squashfs-tools could be made to overwrite files.

Software Description:
- squashfs-tools: Tools to create and modify squashfs filesystems

Details:

Etienne Stalmans discovered that Squashfs-Tools mishandled certain malformed 
SQUASHFS files. An attacker could use this vulnerability to write arbitrary 
files to the filesystem.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.04:
  squashfs-tools  1:4.4-2ubuntu0.1

Ubuntu 20.04 LTS:
  squashfs-tools  1:4.4-1ubuntu0.1

Ubuntu 18.04 LTS:
  squashfs-tools  1:4.3-6ubuntu0.18.04.3

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5057-1
  CVE-2021-40153

Package Information:
  https://launchpad.net/ubuntu/+source/squashfs-tools/1:4.4-2ubuntu0.1
  https://launchpad.net/ubuntu/+source/squashfs-tools/1:4.4-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/squashfs-tools/1:4.3-6ubuntu0.18.04.3


signature.asc
Description: PGP signature
-- 
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


[USN-5054-1] uWSGI vulnerability

2021-08-30 Thread Paulo Flabiano Smorigo
==
Ubuntu Security Notice USN-5054-1
August 30, 2021

uwsgi vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

uWSGI could be made to crash if it received specially crafted
input.

Software Description:
- uwsgi: fast, self-healing application container server

Details:

Felix Wilhelm discovered a buffer overflow flaw in the mod_proxy_uwsgi module.
An attacker could use this vulnerability to provoke an information disclosure
or potentially remote code execution.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  libapache2-mod-proxy-uwsgi  2.0.15-10.2ubuntu2.2
  libapache2-mod-ruwsgi   2.0.15-10.2ubuntu2.2
  libapache2-mod-uwsgi2.0.15-10.2ubuntu2.2
  uwsgi   2.0.15-10.2ubuntu2.2
  uwsgi-core  2.0.15-10.2ubuntu2.2

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5054-1
  CVE-2020-11984

Package Information:
  https://launchpad.net/ubuntu/+source/uwsgi/2.0.15-10.2ubuntu2.2


signature.asc
Description: PGP signature
-- 
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


[USN-5056-1] APR vulnerability

2021-08-30 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5056-1
August 30, 2021

apr vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.04
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

APR could be made to expose sensitive information if it received a specially 
crafted input.

Software Description:
- apr: Apache Portable Runtime Library

Details:

It was discovered that APR incorrectly handled certain inputs.
An attacker could possibly use this issue to expose sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.04:
  libapr1 1.7.0-6ubuntu0.1

Ubuntu 16.04 ESM:
  libapr1 1.5.2-3ubuntu0.1~esm1

Ubuntu 14.04 ESM:
  libapr1 1.5.0-1ubuntu0.1~esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5056-1
  CVE-2021-35940

Package Information:
  https://launchpad.net/ubuntu/+source/apr/1.7.0-6ubuntu0.1


signature.asc
Description: PGP signature
-- 
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


[USN-5055-1] GNOME grilo vulnerability

2021-08-30 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5055-1
August 30, 2021

grilo vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.04
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM

Summary:

grilo could be made to allow MITM attacks.

Software Description:
- grilo: Framework for discovering and browsing media - GObject introspect

Details:

Michael Catanzaro discovered that grilo incorrectly handled certain TLS
certificate verification. An attacker could possibly use this issue to
MITM attacks.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.04:
  libgrilo-0.3-0  0.3.13-1ubuntu0.1

Ubuntu 20.04 LTS:
  libgrilo-0.3-0  0.3.12-1ubuntu0.1

Ubuntu 18.04 LTS:
  libgrilo-0.3-0  0.3.4-1ubuntu0.1

Ubuntu 16.04 ESM:
  libgrilo-0.2-1  0.2.15-1ubuntu0.1~esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5055-1
  CVE-2021-39365

Package Information:
  https://launchpad.net/ubuntu/+source/grilo/0.3.13-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/grilo/0.3.12-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/grilo/0.3.4-1ubuntu0.1


signature.asc
Description: PGP signature
-- 
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce