[USN-6305-3] PHP regression

2024-07-03 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6305-3
July 03, 2024

php7.0 and php7.2 regression
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

USN-6305-2 caused a regression in parsing XML.

Software Description:
- php7.2: HTML-embedded scripting language interpreter
- php7.0: HTML-embedded scripting language interpreter

Details:

USN-6305-2 fixed a vulnerability in PHP. The update caused a regression
in Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. This update fix it.

Original advisory details:

 It was discovered that PHP incorrectly handled certain XML files.
 An attacker could possibly use this issue to expose sensitive information.
 (CVE-2023-3823)

 It was discovered that PHP incorrectly handled certain PHAR files.
 An attacker could possibly use this issue to cause a crash,
 expose sensitive information or execute arbitrary code.
 (CVE-2023-3824)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
  php7.2  7.2.24-0ubuntu0.18.04.17+esm4
  Available with Ubuntu Pro
  php7.2-cgi  7.2.24-0ubuntu0.18.04.17+esm4
  Available with Ubuntu Pro
  php7.2-cli  7.2.24-0ubuntu0.18.04.17+esm4
  Available with Ubuntu Pro
  php7.2-fpm  7.2.24-0ubuntu0.18.04.17+esm4
  Available with Ubuntu Pro
  php7.2-xml  7.2.24-0ubuntu0.18.04.17+esm4
  Available with Ubuntu Pro
  php7.2-xmlrpc   7.2.24-0ubuntu0.18.04.17+esm4
  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  php7.0  7.0.33-0ubuntu0.16.04.16+esm10
  Available with Ubuntu Pro
  php7.0-cgi  7.0.33-0ubuntu0.16.04.16+esm10
  Available with Ubuntu Pro
  php7.0-cli  7.0.33-0ubuntu0.16.04.16+esm10
  Available with Ubuntu Pro
  php7.0-fpm  7.0.33-0ubuntu0.16.04.16+esm10
  Available with Ubuntu Pro
  php7.0-xml  7.0.33-0ubuntu0.16.04.16+esm10
  Available with Ubuntu Pro
  php7.0-xmlrpc   7.0.33-0ubuntu0.16.04.16+esm10
  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6305-3
  https://ubuntu.com/security/notices/USN-6305-1
  https://launchpad.net/bugs/2071768



signature.asc
Description: PGP signature



[USN-6859-1] OpenSSH vulnerability

2024-07-01 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6859-1
July 01, 2024

openssh vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS

Summary:

OpenSSH could be made to bypass authentication and remotely
access systems without proper credentials.

Software Description:
- openssh: secure shell (SSH) for secure access to remote machines

Details:

It was discovered that OpenSSH incorrectly handled signal management. A
remote attacker could use this issue to bypass authentication and remotely
access systems without proper credentials.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  openssh-client  1:9.6p1-3ubuntu13.3
  openssh-server  1:9.6p1-3ubuntu13.3

Ubuntu 23.10
  openssh-client  1:9.3p1-1ubuntu3.6
  openssh-server  1:9.3p1-1ubuntu3.6

Ubuntu 22.04 LTS
  openssh-client  1:8.9p1-3ubuntu0.10
  openssh-server  1:8.9p1-3ubuntu0.10

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6859-1
  CVE-2024-6387

Package Information:
  https://launchpad.net/ubuntu/+source/openssh/1:9.6p1-3ubuntu13.3
  https://launchpad.net/ubuntu/+source/openssh/1:9.3p1-1ubuntu3.6
  https://launchpad.net/ubuntu/+source/openssh/1:8.9p1-3ubuntu0.10



signature.asc
Description: PGP signature



[USN-6852-2] Wget vulnerability

2024-06-27 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6852-2
June 27, 2024

wget vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Wget could be made to connect to a different host than expected.

Software Description:
- wget: retrieves files from the web

Details:

USN-6852-1 fixed a vulnerability in Wget. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

 It was discovered that Wget incorrectly handled semicolons in the userinfo
 subcomponent of a URI. A remote attacker could possibly trick a user into
 connecting to a different host than expected.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
  wget1.19.4-1ubuntu2.2+esm1
  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  wget1.17.1-1ubuntu1.5+esm1
  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6852-2
  https://ubuntu.com/security/notices/USN-6852-1
  CVE-2024-38428



signature.asc
Description: PGP signature



[USN-6851-1] Netplan vulnerabilities

2024-06-26 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6851-1
June 26, 2024

netplan.io vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Netplan could reveal secrets or execute commands with specially crafted
configuration file.

Software Description:
- netplan.io: Declarative network configuration for various backends

Details:

Andreas Hasenack discovered that netplan incorrectly handled the permissions
for netdev files containing wireguard configuration. An attacker could use this 
to obtain
wireguard secret keys.

It was discovered that netplan configuration could be manipulated into injecting
arbitrary commands while setting up network interfaces. An attacker could
use this to execute arbitrary commands or escalate privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  libnetplan1 1.0-2ubuntu1.1
  netplan-generator   1.0-2ubuntu1.1
  netplan.io  1.0-2ubuntu1.1

Ubuntu 23.10
  libnetplan0 0.107-5ubuntu0.3
  netplan-generator   0.107-5ubuntu0.3
  netplan.io  0.107-5ubuntu0.3

Ubuntu 22.04 LTS
  libnetplan0 0.106.1-7ubuntu0.22.04.3
  netplan.io  0.106.1-7ubuntu0.22.04.3

Ubuntu 20.04 LTS
  libnetplan0 0.104-0ubuntu2~20.04.5
  netplan.io  0.104-0ubuntu2~20.04.5

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6851-1
  CVE-2022-4968, https://launchpad.net/bugs/1987842, 
https://launchpad.net/bugs/2065738, https://launchpad.net/bugs/2066258

Package Information:
  https://launchpad.net/ubuntu/+source/netplan.io/1.0-2ubuntu1.1
  https://launchpad.net/ubuntu/+source/netplan.io/0.107-5ubuntu0.3
  https://launchpad.net/ubuntu/+source/netplan.io/0.106.1-7ubuntu0.22.04.3
  https://launchpad.net/ubuntu/+source/netplan.io/0.104-0ubuntu2~20.04.5



signature.asc
Description: PGP signature



[USN-6746-2] Google Guest Agent and Google OS Config Agent vulnerability

2024-06-25 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6746-2
June 25, 2024

google-guest-agent, google-osconfig-agent vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

Google Guest Agent and OS Config Agent could be made to crash
if it open a specially crafted JSON.

Software Description:
- google-guest-agent: Google Compute Engine Guest Agent
- google-osconfig-agent: Google OS Config Agent

Details:

USN-6746-1 fixed vulnerabilities in Google Guest Agent and Google
OS Config Agent. This update provides the corresponding update for
Ubuntu 24.04 LTS.

Original advisory details:

 It was discovered that Google Guest Agent and Google OS Config Agent 
incorrectly
 handled certain JSON files. An attacker could possibly use this issue to
 cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  google-guest-agent  20240213.00-0ubuntu3.1
  google-osconfig-agent   20240320.00-0ubuntu1~24.04.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6746-2
  https://ubuntu.com/security/notices/USN-6746-1
  CVE-2024-24786

Package Information:
  https://launchpad.net/ubuntu/+source/google-guest-agent/20240213.00-0ubuntu3.1
  
https://launchpad.net/ubuntu/+source/google-osconfig-agent/20240320.00-0ubuntu1~24.04.1



signature.asc
Description: PGP signature



[USN-6844-1] CUPS vulnerability

2024-06-25 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6844-1
June 24, 2024

cups vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

CUPS could be made to arbitrary chmod paths with specially
crafted configuration file.

Software Description:
- cups: Common UNIX Printing System(tm)

Details:

Rory McNamara discovered that when starting the cupsd server with a
Listen configuration item, the cupsd process fails to validate if
bind call passed. An attacker could possibly trick cupsd to perform
an arbitrary chmod of the provided argument, providing world-writable
access to the target.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  cups2.4.7-1.2ubuntu7.1

Ubuntu 23.10
  cups2.4.6-0ubuntu3.1

Ubuntu 22.04 LTS
  cups2.4.1op1-1ubuntu4.9

Ubuntu 20.04 LTS
  cups2.3.1-9ubuntu1.7

Ubuntu 18.04 LTS
  cups2.2.7-1ubuntu2.10+esm4
  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  cups2.1.3-4ubuntu0.11+esm6
  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6844-1
  CVE-2024-35235

Package Information:
  https://launchpad.net/ubuntu/+source/cups/2.4.7-1.2ubuntu7.1
  https://launchpad.net/ubuntu/+source/cups/2.4.6-0ubuntu3.1
  https://launchpad.net/ubuntu/+source/cups/2.4.1op1-1ubuntu4.9
  https://launchpad.net/ubuntu/+source/cups/2.3.1-9ubuntu1.7



signature.asc
Description: PGP signature



[USN-6841-1] PHP vulnerability

2024-06-19 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6841-1
June 19, 2024

php7.4, php8.1, php8.2, php8.3 vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

PHP could be made to accept invalid URLs.

Software Description:
- php8.3: server-side, HTML-embedded scripting language (metapackage)
- php8.2: server-side, HTML-embedded scripting language (metapackage)
- php8.1: HTML-embedded scripting language interpreter
- php7.4: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP could early return in the filter_var function
resulting in invalid user information being treated as valid user
information. An attacker could possibly use this issue to expose raw
user input information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  libapache2-mod-php8.3   8.3.6-0ubuntu0.24.04.1
  php8.3  8.3.6-0ubuntu0.24.04.1
  php8.3-cgi  8.3.6-0ubuntu0.24.04.1
  php8.3-cli  8.3.6-0ubuntu0.24.04.1
  php8.3-fpm  8.3.6-0ubuntu0.24.04.1

Ubuntu 23.10
  libapache2-mod-php8.2   8.2.10-2ubuntu2.2
  php8.2  8.2.10-2ubuntu2.2
  php8.2-cgi  8.2.10-2ubuntu2.2
  php8.2-cli  8.2.10-2ubuntu2.2
  php8.2-fpm  8.2.10-2ubuntu2.2

Ubuntu 22.04 LTS
  libapache2-mod-php8.1   8.1.2-1ubuntu2.18
  php8.1  8.1.2-1ubuntu2.18
  php8.1-cgi  8.1.2-1ubuntu2.18
  php8.1-cli  8.1.2-1ubuntu2.18
  php8.1-fpm  8.1.2-1ubuntu2.18

Ubuntu 20.04 LTS
  libapache2-mod-php7.4   7.4.3-4ubuntu2.23
  php7.4  7.4.3-4ubuntu2.23
  php7.4-cgi  7.4.3-4ubuntu2.23
  php7.4-cli  7.4.3-4ubuntu2.23
  php7.4-fpm  7.4.3-4ubuntu2.23

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6841-1
  CVE-2024-5458

Package Information:
  https://launchpad.net/ubuntu/+source/php8.3/8.3.6-0ubuntu0.24.04.1
  https://launchpad.net/ubuntu/+source/php8.2/8.2.10-2ubuntu2.2
  https://launchpad.net/ubuntu/+source/php8.1/8.1.2-1ubuntu2.18
  https://launchpad.net/ubuntu/+source/php7.4/7.4.3-4ubuntu2.23



signature.asc
Description: PGP signature



[USN-6793-2] Git vulnerability

2024-06-18 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6793-2
June 18, 2024

git vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Git could be made to run programs as your login if it clones
a crafted repository.

Software Description:
- git: fast, scalable, distributed revision control system

Details:

USN-6793-1 fixed vulnerabilities in Git. The CVE-2024-32002 was pending further
investigation. This update fixes the problem.

Original advisory details:

 It was discovered that Git incorrectly handled certain submodules.
 An attacker could possibly use this issue to execute arbitrary code.
 This issue was fixed in Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS.
 (CVE-2024-32002)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
  git 1:2.25.1-1ubuntu3.13

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6793-2
  https://ubuntu.com/security/notices/USN-6793-1
  CVE-2024-32002

Package Information:
  https://launchpad.net/ubuntu/+source/git/1:2.25.1-1ubuntu3.13



signature.asc
Description: PGP signature



[USN-6715-2] unixODBC vulnerability

2024-06-05 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6715-2
June 05, 2024

unixodbc vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

unixODBC could be made to crash or execute arbitrary code.

Software Description:
- unixodbc: Basic ODBC tools

Details:

USN-6715-1 fixed a vulnerability in unixODBC. This update provides the
corresponding fix for Ubuntu 24.04 LTS.

Original advisory details:

 It was discovered that unixODBC incorrectly handled certain bytes.
 An attacker could use this issue to execute arbitrary code or cause
 a crash.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  libodbc22.3.12-1ubuntu0.24.04.1
  unixodbc2.3.12-1ubuntu0.24.04.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6715-2
  https://ubuntu.com/security/notices/USN-6715-1
  CVE-2024-1013

Package Information:
  https://launchpad.net/ubuntu/+source/unixodbc/2.3.12-1ubuntu0.24.04.1



signature.asc
Description: PGP signature



[USN-6805-1] libarchive vulnerability

2024-06-04 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6805-1
June 04, 2024

libarchive vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS

Summary:

libarchive could be made to crash or run programs as your login if it
opened a specially crafted file.

Software Description:
- libarchive: Library to read/write archive files

Details:

It was discovered that libarchive incorrectly handled certain RAR archive files.
An attacker could possibly use this issue to execute arbitrary code
or cause a crash.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  libarchive13t64 3.7.2-2ubuntu0.1

Ubuntu 23.10
  libarchive133.6.2-1ubuntu1.1

Ubuntu 22.04 LTS
  libarchive133.6.0-1ubuntu1.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6805-1
  CVE-2024-26256

Package Information:
  https://launchpad.net/ubuntu/+source/libarchive/3.7.2-2ubuntu0.1
  https://launchpad.net/ubuntu/+source/libarchive/3.6.2-1ubuntu1.1
  https://launchpad.net/ubuntu/+source/libarchive/3.6.0-1ubuntu1.1



signature.asc
Description: PGP signature



[USN-6798-1] GStreamer Base Plugins vulnerability

2024-05-29 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6798-1
May 29, 2024

gst-plugins-base1.0 vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

GStreamer Base Plugins could be made to crash or run programs as your login if 
it
opened a specially crafted file.

Software Description:
- gst-plugins-base1.0: GStreamer plugins

Details:

It was discovered that GStreamer Base Plugins incorrectly handled certain
EXIF metadata. An attacker could possibly use this issue to execute arbitrary
code or cause a crash.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  gstreamer1.0-plugins-base   1.24.2-1ubuntu0.1

Ubuntu 23.10
  gstreamer1.0-plugins-base   1.22.6-1ubuntu0.1

Ubuntu 22.04 LTS
  gstreamer1.0-plugins-base   1.20.1-1ubuntu0.2

Ubuntu 20.04 LTS
  gstreamer1.0-plugins-base   1.16.3-0ubuntu1.3

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6798-1
  CVE-2024-4453

Package Information:
  https://launchpad.net/ubuntu/+source/gst-plugins-base1.0/1.24.2-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/gst-plugins-base1.0/1.22.6-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/gst-plugins-base1.0/1.20.1-1ubuntu0.2
  https://launchpad.net/ubuntu/+source/gst-plugins-base1.0/1.16.3-0ubuntu1.3



signature.asc
Description: PGP signature



[USN-6793-1] Git vulnerabilities

2024-05-28 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6793-1
May 28, 2024

git vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in Git.

Software Description:
- git: fast, scalable, distributed revision control system

Details:

It was discovered that Git incorrectly handled certain submodules.
An attacker could possibly use this issue to execute arbitrary code.
This issue was fixed in Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS.
(CVE-2024-32002)

It was discovered that Git incorrectly handled certain cloned repositories.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2024-32004)

It was discovered that Git incorrectly handled local clones with hardlinked
files/directories. An attacker could possibly use this issue to place a
specialized repository on their target's local system. (CVE-2024-32020)

It was discovered that Git incorrectly handled certain symlinks. An attacker
could possibly use this issue to impact availability and integrity
creating hardlinked arbitrary files into users repository's objects/directory.
(CVE-2024-32021)

It was discovered that Git incorrectly handled certain cloned repositories.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2024-32465)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  git 1:2.43.0-1ubuntu7.1

Ubuntu 23.10
  git 1:2.40.1-1ubuntu1.1

Ubuntu 22.04 LTS
  git 1:2.34.1-1ubuntu1.11

Ubuntu 20.04 LTS
  git 1:2.25.1-1ubuntu3.12

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6793-1
  CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021,
  CVE-2024-32465

Package Information:
  https://launchpad.net/ubuntu/+source/git/1:2.43.0-1ubuntu7.1
  https://launchpad.net/ubuntu/+source/git/1:2.40.1-1ubuntu1.1
  https://launchpad.net/ubuntu/+source/git/1:2.34.1-1ubuntu1.11
  https://launchpad.net/ubuntu/+source/git/1:2.25.1-1ubuntu3.12



signature.asc
Description: PGP signature



[USN-6771-1] SQL parse vulnerability

2024-05-13 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6771-1
May 13, 2024

sqlparse vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS

Summary:

SQL parse could be made to denial of service if it received a specially crafted 
input.

Software Description:
- sqlparse: documentation for non-validating SQL parser in Python

Details:

It was discovered that SQL parse incorrectly handled certain nested lists.
An attacker could possibly use this issue to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  python3-sqlparse0.4.4-1ubuntu0.1

Ubuntu 23.10
  python3-sqlparse0.4.2-1ubuntu1.1

Ubuntu 22.04 LTS
  python3-sqlparse0.4.2-1ubuntu0.22.04.2

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6771-1
  CVE-2024-4340

Package Information:
  https://launchpad.net/ubuntu/+source/sqlparse/0.4.4-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/sqlparse/0.4.2-1ubuntu1.1
  https://launchpad.net/ubuntu/+source/sqlparse/0.4.2-1ubuntu0.22.04.2



signature.asc
Description: PGP signature



[USN-6757-2] PHP vulnerabilities

2024-05-02 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6757-2
May 02, 2024

php7.4, php8.1, php8.2 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in PHP.

Software Description:
- php8.2: server-side, HTML-embedded scripting language (metapackage)
- php8.1: HTML-embedded scripting language interpreter
- php7.4: HTML-embedded scripting language interpreter

Details:

USN-6757-1 fixed vulnerabilities in PHP. Unfortunately these fixes were 
incomplete for
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.10. This update fixes the 
problem.

Original advisory details:

 It was discovered that PHP incorrectly handled PHP_CLI_SERVER_WORKERS variable.
 An attacker could possibly use this issue to cause a crash or execute
 arbitrary code. This issue only affected Ubuntu 20.04 LTS, and
 Ubuntu 22.04 LTS. (CVE-2022-4900)

 It was discovered that PHP incorrectly handled certain cookies.
 An attacker could possibly use this issue to cookie by pass.
 (CVE-2024-2756)

 It was discovered that PHP incorrectly handled some passwords.
 An attacker could possibly use this issue to cause an account takeover
 attack. (CVE-2024-3096)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10
  libapache2-mod-php8.2   8.2.10-2ubuntu2.1
  php8.2  8.2.10-2ubuntu2.1
  php8.2-cgi  8.2.10-2ubuntu2.1
  php8.2-cli  8.2.10-2ubuntu2.1
  php8.2-fpm  8.2.10-2ubuntu2.1
  php8.2-xml  8.2.10-2ubuntu2.1

Ubuntu 22.04 LTS
  libapache2-mod-php8.1   8.1.2-1ubuntu2.17
  php8.1  8.1.2-1ubuntu2.17
  php8.1-cgi  8.1.2-1ubuntu2.17
  php8.1-cli  8.1.2-1ubuntu2.17
  php8.1-fpm  8.1.2-1ubuntu2.17
  php8.1-xml  8.1.2-1ubuntu2.17

Ubuntu 20.04 LTS
  libapache2-mod-php7.4   7.4.3-4ubuntu2.22
  php7.4  7.4.3-4ubuntu2.22
  php7.4-cgi  7.4.3-4ubuntu2.22
  php7.4-cli  7.4.3-4ubuntu2.22
  php7.4-fpm  7.4.3-4ubuntu2.22
  php7.4-xml  7.4.3-4ubuntu2.22

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6757-2
  https://ubuntu.com/security/notices/USN-6757-1
  CVE-2022-4900, CVE-2024-2756, CVE-2024-3096

Package Information:
  https://launchpad.net/ubuntu/+source/php8.2/8.2.10-2ubuntu2.1
  https://launchpad.net/ubuntu/+source/php8.1/8.1.2-1ubuntu2.17
  https://launchpad.net/ubuntu/+source/php7.4/7.4.3-4ubuntu2.22



signature.asc
Description: PGP signature



[USN-6762-1] GNU C Library vulnerabilities

2024-05-02 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6762-1
May 02, 2024

eglibc, glibc vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in GNU C Library.

Software Description:
- glibc: GNU C Library
- eglibc: GNU C Library

Details:

It was discovered that GNU C Library incorrectly handled netgroup requests.
An attacker could possibly use this issue to cause a crash or execute arbitrary 
code.
This issue only affected Ubuntu 14.04 LTS. (CVE-2014-9984)

It was discovered that GNU C Library might allow context-dependent
attackers to cause a denial of service. This issue only affected Ubuntu 14.04 
LTS.
(CVE-2015-20109)

It was discovered that GNU C Library when processing very long pathname 
arguments to
the realpath function, could encounter an integer overflow on 32-bit
architectures, leading to a stack-based buffer overflow and, potentially,
arbitrary code execution. This issue only affected Ubuntu 14.04 LTS.
(CVE-2018-11236)

It was discovered that the GNU C library getcwd function incorrectly
handled buffers. An attacker could use this issue to cause the GNU C
Library to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2021-3999)

Charles Fol discovered that the GNU C Library iconv feature incorrectly
handled certain input sequences. An attacker could use this issue to cause
the GNU C Library to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2024-2961)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
  libc6   2.27-3ubuntu1.6+esm2
  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  libc6   2.23-0ubuntu11.3+esm6
  Available with Ubuntu Pro

Ubuntu 14.04 LTS
  libc6   2.19-0ubuntu6.15+esm3
  Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6762-1
  CVE-2014-9984, CVE-2015-20109, CVE-2018-11236, CVE-2021-3999,
  CVE-2024-2961, https://launchpad.net/bugs/2063328



signature.asc
Description: PGP signature



[USN-6757-1] PHP vulnerabilities

2024-04-29 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6757-1
April 29, 2024

php7.0, php7.2, php7.4, php8.1 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in PHP.

Software Description:
- php8.1: HTML-embedded scripting language interpreter
- php7.4: HTML-embedded scripting language interpreter
- php7.2: HTML-embedded scripting language interpreter
- php7.0: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP incorrectly handled PHP_CLI_SERVER_WORKERS variable.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code. This issue only affected Ubuntu 20.04 LTS, and
Ubuntu 22.04 LTS. (CVE-2022-4900)

It was discovered that PHP incorrectly handled certain cookies.
An attacker could possibly use this issue to cookie by pass.
(CVE-2024-2756)

It was discovered that PHP incorrectly handled some passwords.
An attacker could possibly use this issue to cause an account takeover
attack. (CVE-2024-3096)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
  libapache2-mod-php8.1   8.1.2-1ubuntu2.16
  php8.1  8.1.2-1ubuntu2.16
  php8.1-cgi  8.1.2-1ubuntu2.16
  php8.1-cli  8.1.2-1ubuntu2.16
  php8.1-fpm  8.1.2-1ubuntu2.16
  php8.1-xml  8.1.2-1ubuntu2.16

Ubuntu 20.04 LTS
  libapache2-mod-php7.4   7.4.3-4ubuntu2.21
  php7.4  7.4.3-4ubuntu2.21
  php7.4-cgi  7.4.3-4ubuntu2.21
  php7.4-cli  7.4.3-4ubuntu2.21
  php7.4-fpm  7.4.3-4ubuntu2.21
  php7.4-xml  7.4.3-4ubuntu2.21

Ubuntu 18.04 LTS
  libapache2-mod-php7.2   7.2.24-0ubuntu0.18.04.17+esm3
  Available with Ubuntu Pro
  php7.2  7.2.24-0ubuntu0.18.04.17+esm3
  Available with Ubuntu Pro
  php7.2-cgi  7.2.24-0ubuntu0.18.04.17+esm3
  Available with Ubuntu Pro
  php7.2-cli  7.2.24-0ubuntu0.18.04.17+esm3
  Available with Ubuntu Pro
  php7.2-fpm  7.2.24-0ubuntu0.18.04.17+esm3
  Available with Ubuntu Pro
  php7.2-xml  7.2.24-0ubuntu0.18.04.17+esm3
  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  libapache2-mod-php7.0   7.0.33-0ubuntu0.16.04.16+esm9
  Available with Ubuntu Pro
  php7.0  7.0.33-0ubuntu0.16.04.16+esm9
  Available with Ubuntu Pro
  php7.0-cgi  7.0.33-0ubuntu0.16.04.16+esm9
  Available with Ubuntu Pro
  php7.0-cli  7.0.33-0ubuntu0.16.04.16+esm9
  Available with Ubuntu Pro
  php7.0-fpm  7.0.33-0ubuntu0.16.04.16+esm9
  Available with Ubuntu Pro
  php7.0-xml  7.0.33-0ubuntu0.16.04.16+esm9
  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6757-1
  CVE-2022-4900, CVE-2024-2756, CVE-2024-3096

Package Information:
  https://launchpad.net/ubuntu/+source/php8.1/8.1.2-1ubuntu2.16
  https://launchpad.net/ubuntu/+source/php7.4/7.4.3-4ubuntu2.21



signature.asc
Description: PGP signature



[USN-6746-1] Google Guest Agent and Google OS Config Agent vulnerability

2024-04-23 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6746-1
April 23, 2024

google-guest-agent, google-osconfig-agent vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS

Summary:

Google Guest Agent and OS Config Agent could be made to crash
if it open a specially crafted JSON.

Software Description:
- google-guest-agent: Google Compute Engine Guest Agent
- google-osconfig-agent: Google OS Config Agent

Details:

It was discovered that Google Guest Agent and Google OS Config Agent incorrectly
handled certain JSON files. An attacker could possibly use this issue to
cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  google-guest-agent  20231004.02-0ubuntu1~23.10.3
  google-osconfig-agent   20230504.00-0ubuntu2.2

Ubuntu 22.04 LTS:
  google-guest-agent  20231004.02-0ubuntu1~22.04.4
  google-osconfig-agent   20230504.00-0ubuntu1~22.04.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6746-1
  CVE-2024-24786

Package Information:
  
https://launchpad.net/ubuntu/+source/google-guest-agent/20231004.02-0ubuntu1~23.10.3
  
https://launchpad.net/ubuntu/+source/google-osconfig-agent/20230504.00-0ubuntu2.2
  
https://launchpad.net/ubuntu/+source/google-guest-agent/20231004.02-0ubuntu1~22.04.4
  
https://launchpad.net/ubuntu/+source/google-osconfig-agent/20230504.00-0ubuntu1~22.04.1



signature.asc
Description: PGP signature



[USN-6729-2] Apache HTTP Server vulnerabilities

2024-04-17 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6729-2
April 17, 2024

apache2 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in Apache HTTP Server.

Software Description:
- apache2: Apache HTTP server

Details:

USN-6729-1 fixed several vulnerabilities in Apache. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

 Orange Tsai discovered that the Apache HTTP Server incorrectly handled
 validating certain input. A remote attacker could possibly use this
 issue to perform HTTP request splitting attacks. (CVE-2023-38709)

 Keran Mu and Jianjun Chen discovered that the Apache HTTP Server
 incorrectly handled validating certain input. A remote attacker could
 possibly use this issue to perform HTTP request splitting attacks.
 (CVE-2024-24795)

 Bartek Nowotarski discovered that the Apache HTTP Server HTTP/2 module
 incorrectly handled endless continuation frames. A remote attacker could
 possibly use this issue to cause the server to consume resources, leading
 to a denial of service. This issue was addressed only in Ubuntu 18.04 LTS.
 (CVE-2024-27316)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  apache2 2.4.29-1ubuntu4.27+esm2

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  apache2 2.4.18-2ubuntu3.17+esm12

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6729-2
  https://ubuntu.com/security/notices/USN-6729-1
  CVE-2023-38709, CVE-2024-24795, CVE-2024-27316



signature.asc
Description: PGP signature



[USN-6721-2] X.Org X Server regression

2024-04-09 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6721-2
April 09, 2024

xorg-server, xwayland regression
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

A regression was fixed in X.Org X Server.

Software Description:
- xorg-server: X.Org X11 server
- xwayland: X server for running X clients under Wayland

Details:

USN-6721-1 fixed vulnerabilities in X.Org X Server. That fix was incomplete
resulting in a regression. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

 It was discovered that X.Org X Server incorrectly handled certain data.
 An attacker could possibly use this issue to expose sensitive information.
 (CVE-2024-31080, CVE-2024-31081, CVE-2024-31082)

 It was discovered that X.Org X Server incorrectly handled certain glyphs.
 An attacker could possibly use this issue to cause a crash or expose sensitive
 information. (CVE-2024-31083)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  xserver-xorg-core   2:21.1.7-3ubuntu2.9
  xwayland2:23.2.0-1ubuntu0.6

Ubuntu 22.04 LTS:
  xserver-xorg-core   2:21.1.4-2ubuntu1.7~22.04.10
  xwayland2:22.1.1-1ubuntu0.13

Ubuntu 20.04 LTS:
  xserver-xorg-core   2:1.20.13-1ubuntu1~20.04.17
  xwayland2:1.20.13-1ubuntu1~20.04.17

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  xserver-xorg-core   2:1.19.6-1ubuntu4.15+esm8
  xwayland2:1.19.6-1ubuntu4.15+esm8

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  xserver-xorg-core   2:1.18.4-0ubuntu0.12+esm13
  xwayland2:1.18.4-0ubuntu0.12+esm13

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
  xserver-xorg-core   2:1.15.1-0ubuntu2.11+esm12

After a standard system update you need to restart -APP- to make
all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6721-2
  https://ubuntu.com/security/notices/USN-6721-1
  https://launchpad.net/bugs/2060354

Package Information:
  https://launchpad.net/ubuntu/+source/xorg-server/2:21.1.7-3ubuntu2.9
  https://launchpad.net/ubuntu/+source/xwayland/2:23.2.0-1ubuntu0.6
  https://launchpad.net/ubuntu/+source/xorg-server/2:21.1.4-2ubuntu1.7~22.04.10
  https://launchpad.net/ubuntu/+source/xwayland/2:22.1.1-1ubuntu0.13
  https://launchpad.net/ubuntu/+source/xorg-server/2:1.20.13-1ubuntu1~20.04.17



signature.asc
Description: PGP signature



[USN-6721-1] X.Org X Server vulnerabilities

2024-04-04 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6721-1
April 04, 2024

xorg-server, xwayland vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in X.Org X Server, xwayland.

Software Description:
- xorg-server: X.Org X11 server
- xwayland: X server for running X clients under Wayland

Details:

It was discovered that X.Org X Server incorrectly handled certain data.
An attacker could possibly use this issue to expose sensitive information.
(CVE-2024-31080, CVE-2024-31081, CVE-2024-31082)

It was discovered that X.Org X Server incorrectly handled certain glyphs.
An attacker could possibly use this issue to cause a crash or expose sensitive
information. (CVE-2024-31083)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  xserver-xorg-core   2:21.1.7-3ubuntu2.8
  xwayland2:23.2.0-1ubuntu0.5

Ubuntu 22.04 LTS:
  xserver-xorg-core   2:21.1.4-2ubuntu1.7~22.04.9
  xwayland2:22.1.1-1ubuntu0.12

Ubuntu 20.04 LTS:
  xserver-xorg-core   2:1.20.13-1ubuntu1~20.04.16
  xwayland2:1.20.13-1ubuntu1~20.04.16

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  xserver-xorg-core   2:1.19.6-1ubuntu4.15+esm7
  xwayland2:1.19.6-1ubuntu4.15+esm7

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  xserver-xorg-core   2:1.18.4-0ubuntu0.12+esm12
  xwayland2:1.18.4-0ubuntu0.12+esm12

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
  xserver-xorg-core   2:1.15.1-0ubuntu2.11+esm11

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6721-1
  CVE-2024-31080, CVE-2024-31081, CVE-2024-31082, CVE-2024-31083

Package Information:
  https://launchpad.net/ubuntu/+source/xorg-server/2:21.1.7-3ubuntu2.8
  https://launchpad.net/ubuntu/+source/xwayland/2:23.2.0-1ubuntu0.5
  https://launchpad.net/ubuntu/+source/xorg-server/2:21.1.4-2ubuntu1.7~22.04.9
  https://launchpad.net/ubuntu/+source/xwayland/2:22.1.1-1ubuntu0.12
  https://launchpad.net/ubuntu/+source/xorg-server/2:1.20.13-1ubuntu1~20.04.16



signature.asc
Description: PGP signature



[USN-6715-1] unixODBC vulnerability

2024-03-27 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6715-1
March 27, 2024

unixodbc vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

unixODBC could be made to crash or execute arbitrary code.

Software Description:
- unixodbc: Basic ODBC tools

Details:

It was discovered that unixODBC incorrectly handled certain bytes.
An attacker could use this issue to execute arbitrary code or cause
a crash.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  libodbc22.3.12-1ubuntu0.23.10.1
  unixodbc2.3.12-1ubuntu0.23.10.1

Ubuntu 22.04 LTS:
  libodbc12.3.9-5ubuntu0.1
  libodbc22.3.9-5ubuntu0.1
  unixodbc2.3.9-5ubuntu0.1

Ubuntu 20.04 LTS:
  libodbc12.3.6-0.1ubuntu0.1
  unixodbc2.3.6-0.1ubuntu0.1

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  libodbc12.3.4-1.1ubuntu3+esm1
  unixodbc2.3.4-1.1ubuntu3+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  libodbc12.3.1-4.1ubuntu0.1~esm2
  unixodbc2.3.1-4.1ubuntu0.1~esm2

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6715-1
  CVE-2024-1013

Package Information:
  https://launchpad.net/ubuntu/+source/unixodbc/2.3.12-1ubuntu0.23.10.1
  https://launchpad.net/ubuntu/+source/unixodbc/2.3.9-5ubuntu0.1
  https://launchpad.net/ubuntu/+source/unixodbc/2.3.6-0.1ubuntu0.1



signature.asc
Description: PGP signature



[USN-6718-2] curl vulnerability

2024-03-27 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6718-2
March 27, 2024

curl vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

curl could be made to denial of service.

Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries

Details:

USN-6718-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

 It was discovered that curl incorrectly handled memory when limiting the
 amount of headers when HTTP/2 server push is allowed. A remote attacker
 could possibly use this issue to cause curl to consume resources, leading
 to a denial of service. (CVE-2024-2398)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  curl7.58.0-2ubuntu3.24+esm4
  libcurl3-gnutls 7.58.0-2ubuntu3.24+esm4
  libcurl3-nss7.58.0-2ubuntu3.24+esm4
  libcurl47.58.0-2ubuntu3.24+esm4

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  curl7.47.0-1ubuntu2.19+esm12
  libcurl37.47.0-1ubuntu2.19+esm12
  libcurl3-gnutls 7.47.0-1ubuntu2.19+esm12
  libcurl3-nss7.47.0-1ubuntu2.19+esm12

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6718-2
  https://ubuntu.com/security/notices/USN-6718-1
  CVE-2024-2398



signature.asc
Description: PGP signature



[USN-6714-1] Debian Goodies vulnerability

2024-03-25 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6714-1
March 25, 2024

debian-goodies vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

debmany in Debian Goodies could be made to execute arbitrary shell
commands if it received a specially crafted deb file.

Software Description:
- debian-goodies: Small toolbox-style utilities for Debian systems

Details:

It was discovered that debmany in Debian Goodies incorrectly handled certain
deb files. An attacker could possibly use this issue to execute arbitrary shell
commands.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  debian-goodies  0.88.1ubuntu1.2

Ubuntu 22.04 LTS:
  debian-goodies  0.87ubuntu1.1

Ubuntu 20.04 LTS:
  debian-goodies  0.84ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6714-1
  CVE-2023-27635

Package Information:
  https://launchpad.net/ubuntu/+source/debian-goodies/0.88.1ubuntu1.2
  https://launchpad.net/ubuntu/+source/debian-goodies/0.87ubuntu1.1
  https://launchpad.net/ubuntu/+source/debian-goodies/0.84ubuntu0.1



signature.asc
Description: PGP signature



[USN-6711-1] CRM shell vulnerability

2024-03-25 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6711-1
March 25, 2024

crmsh vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

CRM shell could be made to execute arbitrary code if it received
a specially crafted input.

Software Description:
- crmsh: CRM shell for the pacemaker cluster manager

Details:

Vincent Berg discovered that CRM shell incorrectly handled certain commands.
An local attacker could possibly use this issue to execute arbitrary code
via shell code injection to the crm history commandline.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  crmsh   4.2.0-2ubuntu1.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6711-1
  CVE-2020-35459

Package Information:
  https://launchpad.net/ubuntu/+source/crmsh/4.2.0-2ubuntu1.1



signature.asc
Description: PGP signature



[USN-6587-5] X.Org X Server vulnerabilities

2024-03-13 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6587-5
March 13, 2024

xorg-server vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in X.Org X Server.

Software Description:
- xorg-server: X.Org X11 server

Details:

USN-6587-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 14.04 LTS.

Original advisory details:

 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
 memory when processing the RRChangeOutputProperty and
 RRChangeProviderProperty APIs. An attacker could possibly use this issue to
 cause the X Server to crash, or obtain sensitive information.
 (CVE-2023-6478)

 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
 memory when processing the DeviceFocusEvent and ProcXIQueryPointer APIs. An
 attacker could possibly use this issue to cause the X Server to crash,
 obtain sensitive information, or execute arbitrary code. (CVE-2023-6816)

 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
 reattaching to a different master device. An attacker could use this issue
 to cause the X Server to crash, leading to a denial of service, or possibly
 execute arbitrary code. (CVE-2024-0229)

 Olivier Fourdan and Donn Seeley discovered that the X.Org X Server
 incorrectly labeled GLX PBuffers when used with SELinux. An attacker could
 use this issue to cause the X Server to crash, leading to a denial of
 service. (CVE-2024-0408)

 Olivier Fourdan discovered that the X.Org X Server incorrectly handled
 the curser code when used with SELinux. An attacker could use this issue to
 cause the X Server to crash, leading to a denial of service.
 (CVE-2024-0409)

 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
 memory when processing the XISendDeviceHierarchyEvent API. An attacker
 could possibly use this issue to cause the X Server to crash, or execute
 arbitrary code. (CVE-2024-21885)

 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
 devices being disabled. An attacker could possibly use this issue to cause
 the X Server to crash, or execute arbitrary code. (CVE-2024-21886)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
  xserver-xorg-core   2:1.15.1-0ubuntu2.11+esm9

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6587-5
  https://ubuntu.com/security/notices/USN-6587-1
  CVE-2023-6478, CVE-2023-6816, CVE-2024-0229, CVE-2024-0408,
  CVE-2024-21885, CVE-2024-21886



signature.asc
Description: PGP signature



[USN-6689-1] Rack vulnerabilities

2024-03-12 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6689-1
March 12, 2024

ruby-rack vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10

Summary:

Rack could be made do denial of service if it received a specially
crafted header.

Software Description:
- ruby-rack: modular Ruby webserver interface

Details:

It was discovered that Rack incorrectly parse some headers.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2023-27539, CVE-2024-26141, CVE-2024-26146)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  ruby-rack   2.2.4-3ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6689-1
  CVE-2023-27539, CVE-2024-26141, CVE-2024-26146

Package Information:
  https://launchpad.net/ubuntu/+source/ruby-rack/2.2.4-3ubuntu0.1



signature.asc
Description: PGP signature



[USN-6674-2] Django vulnerability

2024-03-04 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6674-2
March 04, 2024

python-django vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)

Summary:

Django could be made to consume resources or crash if it received specially
crafted network traffic.

Software Description:
- python-django: High-level Python web development framework

Details:

USN-6674-1 fixed a vulnerability in Django. This update provides
the corresponding update for Ubuntu 18.04 LTS.

Original advisory details:

 Seokchan Yoon discovered that the Django Truncator function incorrectly
 handled very long HTML input. A remote attacker could possibly use this
 issue to cause Django to consume resources, leading to a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  python-django   1:1.11.11-1ubuntu1.21+esm4
  python3-django  1:1.11.11-1ubuntu1.21+esm4

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6674-2
  https://ubuntu.com/security/notices/USN-6674-1
  CVE-2024-27351



signature.asc
Description: PGP signature



[USN-6664-1] less vulnerability

2024-02-27 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6664-1
February 27, 2024

less vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

less could be made to crash or run arbitrary commands if it receive
a crafted input.

Software Description:
- less: pager program similar to more

Details:

It was discovered that less incorrectly handled certain file names.
An attacker could possibly use this issue to cause a crash or execute
arbitrary commands.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  less590-2ubuntu0.23.10.1

Ubuntu 22.04 LTS:
  less590-1ubuntu0.22.04.2

Ubuntu 20.04 LTS:
  less551-1ubuntu0.2

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  less487-0.1ubuntu0.1~esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  less481-2.1ubuntu0.2+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6664-1
  CVE-2022-48624

Package Information:
  https://launchpad.net/ubuntu/+source/less/590-2ubuntu0.23.10.1
  https://launchpad.net/ubuntu/+source/less/590-1ubuntu0.22.04.2
  https://launchpad.net/ubuntu/+source/less/551-1ubuntu0.2



signature.asc
Description: PGP signature



[USN-6305-2] PHP vulnerabilities

2024-02-27 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6305-2
February 27, 2024

php7.0, php7.2, php7.4 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in PHP.

Software Description:
- php7.4: HTML-embedded scripting language interpreter
- php7.2: HTML-embedded scripting language interpreter
- php7.0: HTML-embedded scripting language interpreter

Details:

USN-6305-1 fixed several vulnerabilities in PHP. This update provides
the corresponding update for Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 
20.04 LTS.

Original advisory details:

 It was discovered that PHP incorrectly handled certain XML files.
 An attacker could possibly use this issue to expose sensitive information.
 (CVE-2023-3823)

 It was discovered that PHP incorrectly handled certain PHAR files.
 An attacker could possibly use this issue to cause a crash,
 expose sensitive information or execute arbitrary code.
 (CVE-2023-3824)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  libapache2-mod-php7.4   7.4.3-4ubuntu2.20
  php7.4  7.4.3-4ubuntu2.20
  php7.4-cgi  7.4.3-4ubuntu2.20
  php7.4-cli  7.4.3-4ubuntu2.20
  php7.4-fpm  7.4.3-4ubuntu2.20
  php7.4-xml  7.4.3-4ubuntu2.20

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  libapache2-mod-php7.2   7.2.24-0ubuntu0.18.04.17+esm2
  php7.2  7.2.24-0ubuntu0.18.04.17+esm2
  php7.2-cgi  7.2.24-0ubuntu0.18.04.17+esm2
  php7.2-cli  7.2.24-0ubuntu0.18.04.17+esm2
  php7.2-fpm  7.2.24-0ubuntu0.18.04.17+esm2
  php7.2-xml  7.2.24-0ubuntu0.18.04.17+esm2

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  libapache2-mod-php7.0   7.0.33-0ubuntu0.16.04.16+esm8
  php7.0  7.0.33-0ubuntu0.16.04.16+esm8
  php7.0-cgi  7.0.33-0ubuntu0.16.04.16+esm8
  php7.0-cli  7.0.33-0ubuntu0.16.04.16+esm8
  php7.0-fpm  7.0.33-0ubuntu0.16.04.16+esm8
  php7.0-xml  7.0.33-0ubuntu0.16.04.16+esm8

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6305-2
  https://ubuntu.com/security/notices/USN-6305-1
  CVE-2023-3823, CVE-2023-3824

Package Information:
  https://launchpad.net/ubuntu/+source/php7.4/7.4.3-4ubuntu2.20



signature.asc
Description: PGP signature



[USN-6623-1] Django vulnerability

2024-02-06 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6623-1
February 06, 2024

python-django vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)

Summary:

Django could be made to denial of service if received a specially
crafted input.

Software Description:
- python-django: High-level Python web development framework

Details:

It was discovered that Django incorrectly handled certain inputs
that uses intcomma template filter. An attacker could possibly
use this issue to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  python3-django  3:4.2.4-1ubuntu2.1

Ubuntu 22.04 LTS:
  python3-django  2:3.2.12-2ubuntu1.10

Ubuntu 20.04 LTS:
  python3-django  2:2.2.12-1ubuntu0.21

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  python-django   1:1.11.11-1ubuntu1.21+esm3
  python3-django  1:1.11.11-1ubuntu1.21+esm3

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6623-1
  CVE-2024-24680

Package Information:
  https://launchpad.net/ubuntu/+source/python-django/3:4.2.4-1ubuntu2.1
  https://launchpad.net/ubuntu/+source/python-django/2:3.2.12-2ubuntu1.10
  https://launchpad.net/ubuntu/+source/python-django/2:2.2.12-1ubuntu0.21



signature.asc
Description: PGP signature



[USN-6587-4] X.Org X Server regression

2024-02-01 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6587-4
February 01, 2024

xorg-server, xwayland regression
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

A regression was fixed in X.Org X Server.

Software Description:
- xorg-server: X.Org X11 server

Details:

USN-6587-1 fixed vulnerabilities in X.Org X Server. The fix was incomplete
resulting in a possible regression. This update fixes the problem.

Original advisory details:

 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
 memory when processing the DeviceFocusEvent and ProcXIQueryPointer APIs. An
 attacker could possibly use this issue to cause the X Server to crash,
 obtain sensitive information, or execute arbitrary code. (CVE-2023-6816)

 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
 reattaching to a different master device. An attacker could use this issue
 to cause the X Server to crash, leading to a denial of service, or possibly
 execute arbitrary code. (CVE-2024-0229)

 Olivier Fourdan and Donn Seeley discovered that the X.Org X Server
 incorrectly labeled GLX PBuffers when used with SELinux. An attacker could
 use this issue to cause the X Server to crash, leading to a denial of
 service. (CVE-2024-0408)

 Olivier Fourdan discovered that the X.Org X Server incorrectly handled
 the curser code when used with SELinux. An attacker could use this issue to
 cause the X Server to crash, leading to a denial of service.
 (CVE-2024-0409)

 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
 memory when processing the XISendDeviceHierarchyEvent API. An attacker
 could possibly use this issue to cause the X Server to crash, or execute
 arbitrary code. (CVE-2024-21885)

 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
 devices being disabled. An attacker could possibly use this issue to cause
 the X Server to crash, or execute arbitrary code. (CVE-2024-21886)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  xserver-xorg-core   2:1.19.6-1ubuntu4.15+esm5
  xwayland2:1.19.6-1ubuntu4.15+esm5

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  xserver-xorg-core   2:1.18.4-0ubuntu0.12+esm10
  xwayland2:1.18.4-0ubuntu0.12+esm10

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6587-4
  https://ubuntu.com/security/notices/USN-6587-1
  https://launchpad.net/bugs/2051536



signature.asc
Description: PGP signature



[USN-6611-1] Exim vulnerability

2024-01-29 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6611-1
January 29, 2024

exim4 vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Exim could be made to bypass an SPF protection mechanism if it received
a specially crafted request.

Software Description:
- exim4: Exim is a mail transport agent

Details:

It was discovered that Exim incorrectly handled certain requests.
A remote attacker could possibly use a published exploitation technique
to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass
of an SPF protection mechanism.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  exim4   4.96-17ubuntu2.2
  exim4-base  4.96-17ubuntu2.2
  eximon4 4.96-17ubuntu2.2

Ubuntu 22.04 LTS:
  exim4   4.95-4ubuntu2.5
  exim4-base  4.95-4ubuntu2.5
  eximon4 4.95-4ubuntu2.5

Ubuntu 20.04 LTS:
  exim4   4.93-13ubuntu1.10
  exim4-base  4.93-13ubuntu1.10
  eximon4 4.93-13ubuntu1.10

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  exim4   4.90.1-1ubuntu1.10+esm3
  exim4-base  4.90.1-1ubuntu1.10+esm3
  eximon4 4.90.1-1ubuntu1.10+esm3

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  exim4   4.86.2-2ubuntu2.6+esm6
  exim4-base  4.86.2-2ubuntu2.6+esm6
  eximon4 4.86.2-2ubuntu2.6+esm6

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6611-1
  CVE-2023-51766

Package Information:
  https://launchpad.net/ubuntu/+source/exim4/4.96-17ubuntu2.2
  https://launchpad.net/ubuntu/+source/exim4/4.95-4ubuntu2.5
  https://launchpad.net/ubuntu/+source/exim4/4.93-13ubuntu1.10



signature.asc
Description: PGP signature



[USN-6599-1] Jinja2 vulnerabilities

2024-01-25 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6599-1
January 25, 2024

jinja2 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in jinja2.

Software Description:
- jinja2: documentation for the Jinja2 Python library

Details:

Yeting Li discovered that Jinja incorrectly handled certain regex.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 14.04 LTS, Ubuntu 18.04 LTS, and
Ubuntu 20.04 LTS. (CVE-2020-28493)

It was discovered that Jinja incorrectly handled certain HTML passed with
xmlatter filter. An attacker could inject arbitrary HTML attributes
keys and values potentially leading to XSS. (CVE-2024-22195)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  python3-jinja2  3.1.2-1ubuntu0.23.10.1

Ubuntu 22.04 LTS:
  python3-jinja2  3.0.3-1ubuntu0.1

Ubuntu 20.04 LTS:
  python-jinja2   2.10.1-2ubuntu0.2
  python3-jinja2  2.10.1-2ubuntu0.2

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  python-jinja2   2.10-1ubuntu0.18.04.1+esm1
  python3-jinja2  2.10-1ubuntu0.18.04.1+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  python-jinja2   2.8-1ubuntu0.1+esm2
  python3-jinja2  2.8-1ubuntu0.1+esm2

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
  python-jinja2   2.7.2-2ubuntu0.1~esm2
  python3-jinja2  2.7.2-2ubuntu0.1~esm2

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6599-1
  CVE-2020-28493, CVE-2024-22195

Package Information:
  https://launchpad.net/ubuntu/+source/jinja2/3.1.2-1ubuntu0.23.10.1
  https://launchpad.net/ubuntu/+source/jinja2/3.0.3-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/jinja2/2.10.1-2ubuntu0.2



signature.asc
Description: PGP signature



[USN-6587-2] X.Org X Server vulnerabilities

2024-01-22 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6587-2
January 22, 2024

xorg-server vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in X.Org X Server.

Software Description:
- xorg-server: X.Org X11 server

Details:

USN-6587-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
 memory when processing the DeviceFocusEvent and ProcXIQueryPointer APIs. An
 attacker could possibly use this issue to cause the X Server to crash,
 obtain sensitive information, or execute arbitrary code. (CVE-2023-6816)

 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
 reattaching to a different master device. An attacker could use this issue
 to cause the X Server to crash, leading to a denial of service, or possibly
 execute arbitrary code. (CVE-2024-0229)

 Olivier Fourdan and Donn Seeley discovered that the X.Org X Server
 incorrectly labeled GLX PBuffers when used with SELinux. An attacker could
 use this issue to cause the X Server to crash, leading to a denial of
 service. (CVE-2024-0408)

 Olivier Fourdan discovered that the X.Org X Server incorrectly handled
 the curser code when used with SELinux. An attacker could use this issue to
 cause the X Server to crash, leading to a denial of service.
 (CVE-2024-0409)

 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
 memory when processing the XISendDeviceHierarchyEvent API. An attacker
 could possibly use this issue to cause the X Server to crash, or execute
 arbitrary code. (CVE-2024-21885)

 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
 devices being disabled. An attacker could possibly use this issue to cause
 the X Server to crash, or execute arbitrary code. (CVE-2024-21886)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  xserver-xorg-core   2:1.19.6-1ubuntu4.15+esm4
  xwayland2:1.19.6-1ubuntu4.15+esm4

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  xserver-xorg-core   2:1.18.4-0ubuntu0.12+esm9
  xwayland2:1.18.4-0ubuntu0.12+esm9

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6587-2
  https://ubuntu.com/security/notices/USN-6587-1
  CVE-2023-6816, CVE-2024-0229, CVE-2024-0408, CVE-2024-0409,
  CVE-2024-21885, CVE-2024-21886



signature.asc
Description: PGP signature



[USN-6580-1] w3m vulnerability

2024-01-15 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6580-1
January 15, 2024

w3m vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

w3m could be made to crash or run programs as your login if it opened a 
malicious website.

Software Description:
- w3m: WWW browsable pager with excellent tables/frames support

Details:

It was discovered that w3m incorrectly handled certain HTML files.
An attacker could possibly use this issue to cause a crash or
execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  w3m 0.5.3+git20230121-2ubuntu0.23.10.1

Ubuntu 23.04:
  w3m 0.5.3+git20230121-2ubuntu0.23.04.1

Ubuntu 22.04 LTS:
  w3m 0.5.3+git20210102-6ubuntu0.2

Ubuntu 20.04 LTS:
  w3m 0.5.3-37ubuntu0.2

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  w3m 0.5.3-36ubuntu0.1+esm1

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
  w3m 0.5.3-15ubuntu0.2+esm2

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6580-1
  CVE-2023-4255

Package Information:
  https://launchpad.net/ubuntu/+source/w3m/0.5.3+git20230121-2ubuntu0.23.10.1
  https://launchpad.net/ubuntu/+source/w3m/0.5.3+git20230121-2ubuntu0.23.04.1
  https://launchpad.net/ubuntu/+source/w3m/0.5.3+git20210102-6ubuntu0.2
  https://launchpad.net/ubuntu/+source/w3m/0.5.3-37ubuntu0.2



signature.asc
Description: PGP signature



[USN-6560-2] OpenSSH vulnerabilities

2024-01-11 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6560-2
January 11, 2024

openssh vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in OpenSSH.

Software Description:
- openssh: secure shell (SSH) for secure access to remote machines

Details:

USN-6560-1 fixed several vulnerabilities in OpenSSH. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

 Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk discovered that the SSH
 protocol was vulnerable to a prefix truncation attack. If a remote attacker
 was able to intercept SSH communications, extension negotiation messages
 could be truncated, possibly leading to certain algorithms and features
 being downgraded. This issue is known as the Terrapin attack. This update
 adds protocol extensions to mitigate this issue. (CVE-2023-48795)

 It was discovered that OpenSSH incorrectly handled user names or host names
 with shell metacharacters. An attacker could possibly use this issue to
 perform OS command injection. This only affected Ubuntu 18.04 LTS. 
(CVE-2023-51385)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  openssh-client  1:7.6p1-4ubuntu0.7+esm3
  openssh-server  1:7.6p1-4ubuntu0.7+esm3

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  openssh-client  1:7.2p2-4ubuntu2.10+esm5
  openssh-server  1:7.2p2-4ubuntu2.10+esm5

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6560-2
  https://ubuntu.com/security/notices/USN-6560-1
  CVE-2023-48795, CVE-2023-51385



signature.asc
Description: PGP signature



[USN-6556-1] Budgie Extras vulnerabilities

2023-12-14 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6556-1
December 14, 2023

budgie-extras vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in budgie-extras.

Software Description:
- budgie-extras: Applet to provide an alternative means to launch applications

Details:

It was discovered that Budgie Extras incorrectly handled certain temporary file 
paths.
An attacker could possibly use this issue to inject false information or deny
access to the application. (CVE-2023-49342, CVE-2023-49343, CVE-2023-49347)

Matthias Gerstner discovered that Budgie Extras incorrectly handled certain
temporary file paths. A local attacker could use this to inject arbitrary PNG
data in this path and have it displayed on the victim's desktop or deny access
to the application. (CVE-2023-49344)

Matthias Gerstner discovered that Budgie Extras incorrectly handled certain
temporary file paths. A local attacker could use this to inject false 
information
or deny access to the application. (CVE-2023-49345, CVE-2023-49346)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  budgie-clockworks-applet1.7.0-3.0ubuntu1
  budgie-dropby-applet1.7.0-3.0ubuntu1
  budgie-previews 1.7.0-3.0ubuntu1
  budgie-takeabreak-applet1.7.0-3.0ubuntu1
  budgie-weathershow-applet   1.7.0-3.0ubuntu1

Ubuntu 23.04:
  budgie-clockworks-applet1.6.0-1ubuntu0.1
  budgie-dropby-applet1.6.0-1ubuntu0.1
  budgie-previews-applet  1.6.0-1ubuntu0.1
  budgie-takeabreak-applet1.6.0-1ubuntu0.1
  budgie-weathershow-applet   1.6.0-1ubuntu0.1

Ubuntu 22.04 LTS:
  budgie-clockworks-applet1.4.0-1ubuntu3.1
  budgie-dropby-applet1.4.0-1ubuntu3.1
  budgie-previews-applet  1.4.0-1ubuntu3.1
  budgie-takeabreak-applet1.4.0-1ubuntu3.1
  budgie-weathershow-applet   1.4.0-1ubuntu3.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6556-1
  CVE-2023-49342, CVE-2023-49343, CVE-2023-49344, CVE-2023-49345,
  CVE-2023-49346, CVE-2023-49347

Package Information:
  https://launchpad.net/ubuntu/+source/budgie-extras/1.7.0-3.0ubuntu1
  https://launchpad.net/ubuntu/+source/budgie-extras/1.6.0-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/budgie-extras/1.4.0-1ubuntu3.1



signature.asc
Description: PGP signature



[USN-6555-2] X.Org X Server vulnerabilities

2023-12-13 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6555-2
December 13, 2023

xorg-server vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in X.Org X Server.

Software Description:
- xorg-server: X.Org X11 server

Details:

USN-6555-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled XKB
 button actions. An attacker could possibly use this issue to cause the X
 Server to crash, execute arbitrary code, or escalate privileges.
 (CVE-2023-6377)

 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
 memory when processing the RRChangeOutputProperty and
 RRChangeProviderProperty APIs. An attacker could possibly use this issue to
 cause the X Server to crash, or obtain sensitive information.
 (CVE-2023-6478)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  xserver-xorg-core   2:1.19.6-1ubuntu4.15+esm3
  xwayland2:1.19.6-1ubuntu4.15+esm3

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  xserver-xorg-core   2:1.18.4-0ubuntu0.12+esm8
  xwayland2:1.18.4-0ubuntu0.12+esm8

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6555-2
  https://ubuntu.com/security/notices/USN-6555-1
  CVE-2023-6377, CVE-2023-6478



signature.asc
Description: PGP signature



[USN-6500-2] Squid vulnerabilities

2023-12-11 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6500-2
December 11, 2023

squid3 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in Squid.

Software Description:
- squid3: Web proxy cache server

Details:

USN-6500-1 fixed several vulnerabilities in Squid. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

 Joshua Rogers discovered that Squid incorrectly handled the Gopher
 protocol. A remote attacker could possibly use this issue to cause Squid to
 crash, resulting in a denial of service. Gopher support has been disabled
 in this update. (CVE-2023-46728)

 Joshua Rogers discovered that Squid incorrectly handled HTTP Digest
 Authentication. A remote attacker could possibly use this issue to cause
 Squid to crash, resulting in a denial of service. (CVE-2023-46847)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  squid   3.5.27-1ubuntu1.14+esm1
  squid3  3.5.27-1ubuntu1.14+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  squid   3.5.12-1ubuntu7.16+esm2
  squid3  3.5.12-1ubuntu7.16+esm2

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6500-2
  https://ubuntu.com/security/notices/USN-6500-1
  CVE-2023-46728, CVE-2023-46847



signature.asc
Description: PGP signature



[USN-6522-2] FreeRDP vulnerabilities

2023-12-07 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6522-2
December 07, 2023

freerdp2 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in FreeRDP.

Software Description:
- freerdp2: RDP client for Windows Terminal Services

Details:

USN-6522-1 fixed several vulnerabilities in FreeRDP. This update provides
the corresponding update for Ubuntu 18.04 LTS.
Original advisory details:

 It was discovered that FreeRDP incorrectly handled drive redirection. If a
 user were tricked into connection to a malicious server, a remote attacker
 could use this issue to cause FreeRDP to crash, resulting in a denial of
 service, or possibly obtain sensitive information. (CVE-2022-41877)
 
 It was discovered that FreeRDP incorrectly handled certain surface updates.
 A remote attacker could use this issue to cause FreeRDP to crash, resulting
 in a denial of service, or possibly execute arbitrary code.
 (CVE-2023-39352, CVE-2023-39356)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  libfreerdp2-2   2.2.0+dfsg1-0ubuntu0.18.04.4+esm2

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6522-2
  https://ubuntu.com/security/notices/USN-6522-1
  CVE-2022-41877, CVE-2023-39352, CVE-2023-39356



signature.asc
Description: PGP signature



[USN-6519-2] EC2 hibagent update

2023-11-29 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6519-2
November 29, 2023

ec2-hibinit-agent update
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

A security improvement was added to EC2 hibagent.

Software Description:
- ec2-hibinit-agent: Amazon EC2 hibernation agent

Details:

USN-6519-1 added IMDSv2 support to EC2 hibagent. This update provides
the corresponding update for Ubuntu 16.04 LTS.

Original advisory details:

 The EC2 hibagent package has been updated to add IMDSv2 support, as IMDSv1
 uses an insecure protocol and is no longer recommended.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  ec2-hibinit-agent   1.0.0-0ubuntu4~16.04.4+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6519-2
  https://ubuntu.com/security/notices/USN-6519-1
  https://launchpad.net/bugs/1941785



signature.asc
Description: PGP signature



[USN-6519-1] EC2 hibagent update

2023-11-28 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6519-1
November 28, 2023

ec2-hibinit-agent update
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)

Summary:

A security improvement was added to EC2 hibagent.

Software Description:
- ec2-hibinit-agent: Amazon EC2 hibernation agent

Details:

The EC2 hibagent package has been updated to add IMDSv2 support, as IMDSv1
uses an insecure protocol and is no longer recommended.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  ec2-hibinit-agent   1.0.0-0ubuntu4~18.04.6+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6519-1
  https://launchpad.net/bugs/1941785



signature.asc
Description: PGP signature



[USN-6402-2] LibTomMath vulnerability

2023-11-27 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6402-2
November 27, 2023

libtommath vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10

Summary:

LibTomMatch could be made to execute arbitrary code or
denial of service if it received a specially crafted input.

Software Description:
- libtommath: multiple-precision integer library [development files]

Details:

USN-6402-1 fixed vulnerabilities in LibTomMath. This update
provides the corresponding updates for Ubuntu 23.10.

Original advisory details:

 It was discovered that LibTomMath incorrectly handled certain inputs.
 An attacker could possibly use this issue to execute arbitrary code
 and cause a denial of service (DoS).

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  libtommath1 1.2.0-6ubuntu0.23.10.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6402-2
  https://ubuntu.com/security/notices/USN-6402-1
  CVE-2023-36328

Package Information:
  https://launchpad.net/ubuntu/+source/libtommath/1.2.0-6ubuntu0.23.10.1



signature.asc
Description: PGP signature



[USN-6501-1] RabbitMQ vulnerability

2023-11-21 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6501-1
November 21, 2023

rabbitmq-server vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

RabbitMQ could be made to denial of service if it received a specially crafted
HTTP request.

Software Description:
- rabbitmq-server: AMQP server written in Erlang

Details:

It was discovered that RabbitMQ incorrectly handled certain HTTP requests.
An attacker could possibly use this issue to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  rabbitmq-server 3.12.1-1ubuntu0.1

Ubuntu 23.04:
  rabbitmq-server 3.10.8-1.1ubuntu0.1

Ubuntu 22.04 LTS:
  rabbitmq-server 3.9.13-1ubuntu0.22.04.2

Ubuntu 20.04 LTS:
  rabbitmq-server 3.8.2-0ubuntu1.5

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6501-1
  CVE-2023-46118

Package Information:
  https://launchpad.net/ubuntu/+source/rabbitmq-server/3.12.1-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/rabbitmq-server/3.10.8-1.1ubuntu0.1
  https://launchpad.net/ubuntu/+source/rabbitmq-server/3.9.13-1ubuntu0.22.04.2
  https://launchpad.net/ubuntu/+source/rabbitmq-server/3.8.2-0ubuntu1.5



signature.asc
Description: PGP signature



[USN-6493-2] hibagent update

2023-11-21 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6493-2
November 21, 2023

hibagent update
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

A security improvement was added to hibagent.

Software Description:
- hibagent: Agent that triggers hibernation on EC2 instances

Details:

USN-6493-1 fixed a vulnerability in hibagent. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

 On Ubuntu 18.04 LTS and Ubuntu 16.04 LTS, the hibagent package has been
 updated to add IMDSv2 support, as IMDSv1 uses an insecure protocol and is
 no longer recommended.

 In addition, on all releases, hibagent has been updated to do nothing if
 ODH is configured.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  hibagent1.0.1-0ubuntu1.18.04.1+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  hibagent1.0.1-0ubuntu1~16.04.1+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6493-2
  https://ubuntu.com/security/notices/USN-6493-1
  https://launchpad.net/bugs/



signature.asc
Description: PGP signature



[USN-6486-1] iniParser vulnerability

2023-11-20 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6486-1
November 20, 2023

iniparser vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS

Summary:

Iniparser could be made to crash if it received a specially crafted file.

Software Description:
- iniparser: development files for the iniParser INI file reader/writer

Details:

It was discovered that iniParser incorrectly handled certain files.
An attacker could possibly use this issue to cause a crash.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  libiniparser1   4.1-6ubuntu0.23.10.1

Ubuntu 23.04:
  libiniparser1   4.1-6ubuntu0.23.04.1

Ubuntu 22.04 LTS:
  libiniparser1   4.1-4ubuntu4.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6486-1
  CVE-2023-33461

Package Information:
  https://launchpad.net/ubuntu/+source/iniparser/4.1-6ubuntu0.23.10.1
  https://launchpad.net/ubuntu/+source/iniparser/4.1-6ubuntu0.23.04.1
  https://launchpad.net/ubuntu/+source/iniparser/4.1-4ubuntu4.1



signature.asc
Description: PGP signature



[USN-6453-2] X.Org X Server vulnerabilities

2023-10-31 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6453-2
October 31, 2023

xorg-server vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in X.Org X Server, xwayland.

Software Description:
- xorg-server: X.Org X11 server

Details:

USN-6453-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS.

Original advisory details:

 Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
 prepending values to certain properties. An attacker could possibly use
 this issue to cause the X Server to crash, execute arbitrary code, or
 escalate privileges. (CVE-2023-5367)

 Sri discovered that the X.Org X Server incorrectly handled detroying
 windows in certain legacy multi-screen setups. An attacker could possibly
 use this issue to cause the X Server to crash, execute arbitrary code, or
 escalate privileges. (CVE-2023-5380)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  xserver-xorg-core   2:1.19.6-1ubuntu4.15+esm1
  xwayland2:1.19.6-1ubuntu4.15+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  xserver-xorg-core   2:1.18.4-0ubuntu0.12+esm6
  xwayland2:1.18.4-0ubuntu0.12+esm6

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
  xserver-xorg-core   2:1.15.1-0ubuntu2.11+esm8

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6453-2
  https://ubuntu.com/security/notices/USN-6453-1
  CVE-2023-5367, CVE-2023-5380



signature.asc
Description: PGP signature



[USN-6288-2] MySQL vulnerability

2023-10-24 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6288-2
October 24, 2023

mysql-5.7 vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in MySQL.

Software Description:
- mysql-5.7: MySQL database

Details:

USN-6288-1 fixed a vulnerability in MySQL. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

 Multiple security issues were discovered in MySQL and this update includes
 new upstream MySQL versions to fix these issues.

 MySQL has been updated to 5.7.43 in Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

 In addition to security fixes, the updated packages contain bug fixes, new
 features, and possibly incompatible changes.

 Please see the following for more information:
 https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-43.html
 https://www.oracle.com/security-alerts/cpujul2023.html

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  mysql-server-5.75.7.43-0ubuntu0.18.04.1+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  mysql-server-5.75.7.43-0ubuntu0.16.04.1+esm1

This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.

References:
  https://ubuntu.com/security/notices/USN-6288-2
  https://ubuntu.com/security/notices/USN-6288-1
  CVE-2023-22053



signature.asc
Description: PGP signature



[USN-6408-2] libXpm vulnerabilities

2023-10-23 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6408-2
October 23, 2023

libxpm vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in libXpm.

Software Description:
- libxpm: X11 pixmap library

Details:

USN-6408-1 fixed several vulnerabilities in libXpm. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 
18.04 LTS.

Original advisory details:

 Yair Mizrahi discovered that libXpm incorrectly handled certain malformed
 XPM image files. If a user were tricked into opening a specially crafted
 XPM image file, a remote attacker could possibly use this issue to consume
 memory, leading to a denial of service. (CVE-2023-43786)

 Yair Mizrahi discovered that libXpm incorrectly handled certain malformed
 XPM image files. If a user were tricked into opening a specially crafted
 XPM image file, a remote attacker could use this issue to cause libXpm to
 crash, leading to a denial of service, or possibly execute arbitrary code.
 (CVE-2023-43787)

 Alan Coopersmith discovered that libXpm incorrectly handled certain
 malformed XPM image files. If a user were tricked into opening a specially
 crafted XPM image file, a remote attacker could possibly use this issue to
 cause libXpm to crash, leading to a denial of service. (CVE-2023-43788,
 CVE-2023-43789)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  libxpm4 1:3.5.12-1ubuntu0.18.04.2+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  libxpm4 1:3.5.11-1ubuntu0.16.04.1+esm2

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
  libxpm4 1:3.5.10-1ubuntu0.1+esm2

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6408-2
  https://ubuntu.com/security/notices/USN-6408-1
  CVE-2023-43786, CVE-2023-43787, CVE-2023-43788, CVE-2023-43789



signature.asc
Description: PGP signature



[USN-6403-2] libvpx vulnerabilities

2023-10-23 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6403-2
October 23, 2023

libvpx vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in libvpx.

Software Description:
- libvpx: VP8 and VP9 video codec

Details:

USN-6403-1 fixed several vulnerabilities in libvpx. This update provides
the corresponding update for Ubuntu 18.04 LTS.

Original advisory details:

 It was discovered that libvpx did not properly handle certain malformed
 media files. If an application using libvpx opened a specially crafted
 file, a remote attacker could cause a denial of service, or possibly
 execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  libvpx5 1.7.0-3ubuntu0.18.04.1+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6403-2
  https://ubuntu.com/security/notices/USN-6403-1
  CVE-2023-44488, CVE-2023-5217



signature.asc
Description: PGP signature



[USN-6394-2] Python vulnerability

2023-10-17 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6394-2
October 17, 2023

python2.7 vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Python could be made to execute arbitrary code if it received
a specially crafted script.

Software Description:
- python2.7: An interactive high-level object-oriented language

Details:

USN-6394-1 fixed a vulnerability in Python. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 
18.04 LTS.

Original advisory details:

 It was discovered that Python incorrectly handled certain scripts.
 An attacker could possibly use this issue to execute arbitrary code
 or cause a crash.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  python2.7   2.7.17-1~18.04ubuntu1.13+esm3

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  python2.7   2.7.12-1ubuntu0~16.04.18+esm8

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
  python2.7   2.7.6-8ubuntu0.6+esm17

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6394-2
  https://ubuntu.com/security/notices/USN-6394-1
  CVE-2022-48560



signature.asc
Description: PGP signature



[USN-6429-2] curl vulnerability

2023-10-11 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6429-2
October 11, 2023

curl vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in curl.

Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries

Details:

USN-6429-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS
and Ubuntu 18.04 LTS.

Original advisory details:

 It was discovered that curl incorrectly handled cookies when an application
 duplicated certain handles. A local attacker could possibly create a cookie
 file and inject arbitrary cookies into subsequent connections.
 (CVE-2023-38546)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  curl7.58.0-2ubuntu3.24+esm2
  libcurl3-gnutls 7.58.0-2ubuntu3.24+esm2
  libcurl3-nss7.58.0-2ubuntu3.24+esm2
  libcurl47.58.0-2ubuntu3.24+esm2

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  curl7.47.0-1ubuntu2.19+esm10
  libcurl37.47.0-1ubuntu2.19+esm10
  libcurl3-gnutls 7.47.0-1ubuntu2.19+esm10
  libcurl3-nss7.47.0-1ubuntu2.19+esm10

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
  curl7.35.0-1ubuntu2.20+esm17
  libcurl37.35.0-1ubuntu2.20+esm17
  libcurl3-gnutls 7.35.0-1ubuntu2.20+esm17
  libcurl3-nss7.35.0-1ubuntu2.20+esm17

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6429-2
  https://ubuntu.com/security/notices/USN-6429-1
  CVE-2023-38546



signature.asc
Description: PGP signature



[USN-6407-2] libx11 vulnerabilities

2023-10-10 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6407-2
October 10, 2023

libx11 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in libx11.

Software Description:
- libx11: X11 client-side library

Details:

USN-6407-1 fixed several vulnerabilities in libx11. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 
18.04 LTS.

Original advisory details:

 Gregory James Duck discovered that libx11 incorrectly handled certain
 keyboard symbols. If a user were tricked into connecting to a malicious X
 server, a remote attacker could use this issue to cause libx11 to crash,
 resulting in a denial of service, or possibly execute arbitrary code.
 (CVE-2023-43785)

 Yair Mizrahi discovered that libx11 incorrectly handled certain malformed
 XPM image files. If a user were tricked into opening a specially crafted
 XPM image file, a remote attacker could possibly use this issue to consume
 memory, leading to a denial of service. (CVE-2023-43786)

 Yair Mizrahi discovered that libx11 incorrectly handled certain malformed
 XPM image files. If a user were tricked into opening a specially crafted
 XPM image file, a remote attacker could use this issue to cause libx11 to
 crash, leading to a denial of service, or possibly execute arbitrary code.
 (CVE-2023-43787)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  libx11-62:1.6.4-3ubuntu0.4+esm2

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  libx11-62:1.6.3-1ubuntu2.2+esm4

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
  libx11-62:1.6.2-1ubuntu2.1+esm5

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6407-2
  https://ubuntu.com/security/notices/USN-6407-1
  CVE-2023-43785, CVE-2023-43786, CVE-2023-43787



signature.asc
Description: PGP signature



[USN-6423-1] CUE vulnerability

2023-10-09 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6423-1
October 09, 2023

libcue vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

CUE could be made to execute arbitrary code if it received a specially
crafted file.

Software Description:
- libcue: CUE Sheet Parser Library - development files

Details:

It was discovered that CUE incorrectly handled certain files.
An attacker could possibly use this issue to expose sensitive
information or execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.04:
  libcue2 2.2.1-4ubuntu0.1

Ubuntu 22.04 LTS:
  libcue2 2.2.1-3ubuntu0.1

Ubuntu 20.04 LTS:
  libcue2 2.2.1-2ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6423-1
  CVE-2023-43641

Package Information:
  https://launchpad.net/ubuntu/+source/libcue/2.2.1-4ubuntu0.1
  https://launchpad.net/ubuntu/+source/libcue/2.2.1-3ubuntu0.1
  https://launchpad.net/ubuntu/+source/libcue/2.2.1-2ubuntu0.1



signature.asc
Description: PGP signature



[USN-6414-2] Django vulnerabilities

2023-10-04 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6414-2
October 04, 2023

python-django vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in Django.

Software Description:
- python-django: High-level Python web development framework

Details:

USN-6414-1 and USN-6378-1 fixed CVE-2023-43665 and CVE-2023-41164 in Django,
respectively. This update provides the corresponding update for Ubuntu 18.04 
LTS.

Original advisory details:

 Wenchao Li discovered that the Django Truncator function incorrectly
 handled very long HTML input. A remote attacker could possibly use this
 issue to cause Django to consume resources, leading to a denial of service.

 It was discovered that Django incorrectly handled certain URIs with a very
 large number of Unicode characters. A remote attacker could possibly use
 this issue to cause Django to consume resources or crash, leading to a
 denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  python3-django  1:1.11.11-1ubuntu1.21+esm2

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6414-2
  https://ubuntu.com/security/notices/USN-6414-1
  CVE-2023-41164, CVE-2023-43665



signature.asc
Description: PGP signature



[USN-6402-1] LibTomMath vulnerability

2023-10-02 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6402-1
October 02, 2023

libtommath vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

LibTomMatch could be made to execute arbitrary code or
denial of service if it received a specially crafted input.

Software Description:
- libtommath: multiple-precision integer library [development files]

Details:

It was discovered that LibTomMath incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code
and cause a denial of service (DoS).

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.04:
  libtommath1 1.2.0-6ubuntu0.23.04.1

Ubuntu 22.04 LTS:
  libtommath1 1.2.0-6ubuntu0.22.04.1

Ubuntu 20.04 LTS:
  libtommath1 1.2.0-3ubuntu0.1

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  libtommath1 1.0.1-1ubuntu0.1~esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  libtommath0 0.42.0-1.2ubuntu0.1~esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6402-1
  CVE-2023-36328

Package Information:
  https://launchpad.net/ubuntu/+source/libtommath/1.2.0-6ubuntu0.23.04.1
  https://launchpad.net/ubuntu/+source/libtommath/1.2.0-6ubuntu0.22.04.1
  https://launchpad.net/ubuntu/+source/libtommath/1.2.0-3ubuntu0.1



signature.asc
Description: PGP signature



[USN-6394-1] Python vulnerability

2023-09-21 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6394-1
September 21, 2023

python3.5 vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Python could be made to execute arbitrary code if it received
a specially crafted script.

Software Description:
- python3.5: An interactive high-level object-oriented language

Details:

It was discovered that Python incorrectly handled certain scripts.
An attacker could possibly use this issue to execute arbitrary code
or cause a crash.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  python3.5   3.5.2-2ubuntu0~16.04.13+esm10

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6394-1
  CVE-2022-48560



signature.asc
Description: PGP signature



[USN-6391-2] CUPS vulnerability

2023-09-21 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6391-2
September 21, 2023

cups vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

CUPS could be made to crash or run programs if it opened a specially
crafted file.

Software Description:
- cups: Common UNIX Printing System(tm)

Details:

USN-6391-1 fixed a vulnerability in CUPS. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

 It was discovered that CUPS incorrectly parsed certain Postscript objects.
 If a user or automated system were tricked into printing a specially
 crafted document, a remote attacker could use this issue to cause CUPS to
 crash, resulting in a denial of service, or possibly execute arbitrary
 code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  cups2.2.7-1ubuntu2.10+esm2

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  cups2.1.3-4ubuntu0.11+esm4

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6391-2
  https://ubuntu.com/security/notices/USN-6391-1
  CVE-2023-4504



signature.asc
Description: PGP signature



[USN-6382-1] Memcached vulnerability

2023-09-19 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6382-1
September 19, 2023

memcached vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Memcached could be made to denial of service.

Software Description:
- memcached: High-performance in-memory object caching system

Details:

It was discovered that Memcached incorrectly handled certain multi-packet
uploads in UDP. An attacker could possibly use this issue to cause a
denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  memcached   1.5.22-2ubuntu0.3

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  memcached   1.5.6-0ubuntu1.2+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  memcached   1.4.25-2ubuntu1.5+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6382-1
  CVE-2022-48571

Package Information:
  https://launchpad.net/ubuntu/+source/memcached/1.5.22-2ubuntu0.3



signature.asc
Description: PGP signature



[USN-6164-2] c-ares vulnerabilities

2023-09-11 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-6164-2
September 11, 2023

c-ares vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in c-ares.

Software Description:
- c-ares: library for asynchronous name resolution

Details:

USN-6164-1 fixed several vulnerabilities in c-ares. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

 Hannes Moesl discovered that c-ares incorrectly handled certain ipv6
 addresses. An attacker could use this issue to cause c-ares to crash,
 resulting in a denial of service, or possibly execute arbitrary code.
 (CVE-2023-31130)

 Xiang Li discovered that c-ares incorrectly handled certain UDP packets. A
 remote attacker could possibly use this issue to cause c-res to crash,
 resulting in a denial of service. (CVE-2023-32067)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  libc-ares2  1.14.0-1ubuntu0.2+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  libc-ares2  1.10.0-3ubuntu0.2+esm2

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6164-2
  https://ubuntu.com/security/notices/USN-6164-1
  CVE-2023-31130, CVE-2023-32067



signature.asc
Description: PGP signature



[USN-5767-3] Python vulnerability

2023-03-06 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5767-3
March 06, 2023

python3.6 vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in Python.

Software Description:
- python3.6: An interactive high-level object-oriented language

Details:

USN-5767-1 fixed vulnerabilities in Python. This update fixes the problem
for Ubuntu 18.04 LTS.

Original advisory details:

 Nicky Mouha discovered that Python incorrectly handled certain SHA-3 internals.
 An attacker could possibly use this issue to cause a crash or execute 
arbitrary code.
 (CVE-2022-37454)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  python3.6   3.6.9-1~18.04ubuntu1.10

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5767-3
  https://ubuntu.com/security/notices/USN-5767-1
  CVE-2022-37454, https://launchpad.net/bugs/1995197

Package Information:
  https://launchpad.net/ubuntu/+source/python3.6/3.6.9-1~18.04ubuntu1.10


signature.asc
Description: PGP signature



[USN-5871-2] Git regression

2023-03-02 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5871-2
March 02, 2023

git regression
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

USN-5871-1 caused a regression.

Software Description:
- git: fast, scalable, distributed revision control system

Details:

USN-5871-1 fixed vulnerabilities in Git. A backport fixing
part of the vulnerability in CVE-2023-22490 was required.
This update fix this for Ubuntu 18.04 LTS.

Original advisory details:

 It was discovered that Git incorrectly handled certain repositories.
 An attacker could use this issue to make Git uses its local
 clone optimization even when using a non-local transport.
 (CVE-2023-22490)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  git 1:2.17.1-1ubuntu0.17

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5871-2
  https://ubuntu.com/security/notices/USN-5871-1
  CVE-2023-22490, https://launchpad.net/bugs/2008277

Package Information:
  https://launchpad.net/ubuntu/+source/git/1:2.17.1-1ubuntu0.17


signature.asc
Description: PGP signature



[USN-5900-1] tar vulnerability

2023-02-28 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5900-1
February 28, 2023

tar vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

tar could be made to crash or expose sensitive information
if it received a specially crafted file.

Software Description:
- tar: GNU version of the tar archiving utility

Details:

It was discovered that tar incorrectly handled certain files.
An attacker could possibly use this issue to expose sensitive information
or cause a crash.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  tar 1.34+dfsg-1ubuntu0.1.22.10.1

Ubuntu 22.04 LTS:
  tar 1.34+dfsg-1ubuntu0.1.22.04.1

Ubuntu 20.04 LTS:
  tar 1.30+dfsg-7ubuntu0.20.04.3

Ubuntu 18.04 LTS:
  tar 1.29b-2ubuntu0.4

Ubuntu 16.04 ESM:
  tar 1.28-2.1ubuntu0.2+esm2

Ubuntu 14.04 ESM:
  tar 1.27.1-1ubuntu0.1+esm3

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5900-1
  CVE-2022-48303

Package Information:
  https://launchpad.net/ubuntu/+source/tar/1.34+dfsg-1ubuntu0.1.22.10.1
  https://launchpad.net/ubuntu/+source/tar/1.34+dfsg-1ubuntu0.1.22.04.1
  https://launchpad.net/ubuntu/+source/tar/1.30+dfsg-7ubuntu0.20.04.3
  https://launchpad.net/ubuntu/+source/tar/1.29b-2ubuntu0.4


signature.asc
Description: PGP signature



[USN-5778-2] X.Org X Server vulnerabilities

2023-02-16 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5778-2
February 16, 2023

xorg-server, xorg-server-hwe-16.04 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in X.Org X Server.

Software Description:
- xorg-server: X.Org X11 server
- xorg-server-hwe-16.04: X.Org X11 server

Details:

USN-5778-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

 Jan-Niklas Sohn discovered that X.Org X Server extensions contained
 multiple security issues. An attacker could possibly use these issues to
 cause the X Server to crash, execute arbitrary code, or escalate
 privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  xserver-xorg-core   2:1.18.4-0ubuntu0.12+esm5
  xserver-xorg-core-hwe-16.04 2:1.19.6-1ubuntu4.1~16.04.6+esm4
  xwayland2:1.18.4-0ubuntu0.12+esm5
  xwayland-hwe-16.04  2:1.19.6-1ubuntu4.1~16.04.6+esm4

Ubuntu 14.04 ESM:
  xserver-xorg-core   2:1.15.1-0ubuntu2.11+esm7

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5778-2
  https://ubuntu.com/security/notices/USN-5778-1
  CVE-2022-4283, CVE-2022-46340, CVE-2022-46341, CVE-2022-46342,
  CVE-2022-46343, CVE-2022-46344, CVE-2023-0494


signature.asc
Description: PGP signature



[USN-5871-1] Git vulnerabilities

2023-02-14 Thread Leonidas s. Barbosa
==
Ubuntu Security Notice USN-5871-1
February 14, 2023

git vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM

Summary:

Several security issues were fixed in Git.

Software Description:
- git: fast, scalable, distributed revision control system

Details:

It was discovered that Git incorrectly handled certain repositories.
An attacker could use this issue to make Git uses its local
clone optimization even when using a non-local transport.
(CVE-2023-22490)

Joern Schneeweisz discovered that Git incorrectly handled certain commands.
An attacker could possibly use this issue to overwrite a patch outside
the working tree. (CVE-2023-23946)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  git 1:2.37.2-1ubuntu1.4

Ubuntu 22.04 LTS:
  git 1:2.34.1-1ubuntu1.8

Ubuntu 20.04 LTS:
  git 1:2.25.1-1ubuntu3.10

Ubuntu 18.04 LTS:
  git 1:2.17.1-1ubuntu0.16

Ubuntu 16.04 ESM:
  git 1:2.7.4-0ubuntu1.10+esm5

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5871-1
  CVE-2023-22490, CVE-2023-23946

Package Information:
  https://launchpad.net/ubuntu/+source/git/1:2.37.2-1ubuntu1.4
  https://launchpad.net/ubuntu/+source/git/1:2.34.1-1ubuntu1.8
  https://launchpad.net/ubuntu/+source/git/1:2.25.1-1ubuntu3.10
  https://launchpad.net/ubuntu/+source/git/1:2.17.1-1ubuntu0.16


signature.asc
Description: PGP signature



[USN-5845-2] OpenSSL vulnerabilities

2023-02-07 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5845-2
February 07, 2023

openssl vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in OpenSSL.

Software Description:
- openssl: Secure Socket Layer (SSL) cryptographic library and tools

Details:

USN-5845-1 fixed several vulnerabilities in OpenSSL. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

 David Benjamin discovered that OpenSSL incorrectly handled X.400 address
 processing. A remote attacker could possibly use this issue to read
 arbitrary memory contents or cause OpenSSL to crash, resulting in a denial
 of service. (CVE-2023-0286)

 Octavio Galland and Marcel Böhme discovered that OpenSSL incorrectly
 handled streaming ASN.1 data. A remote attacker could use this issue to
 cause OpenSSL to crash, resulting in a denial of service, or possibly
 execute arbitrary code. (CVE-2023-0215)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  libssl1.0.0 1.0.2g-1ubuntu4.20+esm6

Ubuntu 14.04 ESM:
  libssl1.0.0 1.0.1f-1ubuntu2.27+esm6

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5845-2
  https://ubuntu.com/security/notices/USN-5845-1
  CVE-2023-0215, CVE-2023-0286


signature.asc
Description: PGP signature



[USN-5810-3] Git vulnerabilities

2023-02-07 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5810-3
February 07, 2023

git vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM

Summary:

Several security issues were fixed in Git.

Software Description:
- git: fast, scalable, distributed revision control system

Details:

USN-5810-1 fixed several vulnerabilities in Git. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

 Markus Vervier and Eric Sesterhenn discovered that Git incorrectly handled 
certain
 gitattributes. An attacker could possibly use this issue to cause a crash
 or execute arbitrary code. (CVE-2022-23521)

 Joern Schneeweisz discovered that Git incorrectly handled certain commands.
 An attacker could possibly use this issue to cause a crash or execute
 arbitrary code. (CVE-2022-41903)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  git 1:2.7.4-0ubuntu1.10+esm4

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5810-3
  https://ubuntu.com/security/notices/USN-5810-1
  CVE-2022-23521, CVE-2022-41903


signature.asc
Description: PGP signature



[USN-5843-1] tmux vulnerability

2023-02-06 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5843-1
February 06, 2023

tmux vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

tmux could be made to crash if it received a specially crafted input.

Software Description:
- tmux: terminal multiplexer

Details:

It was discovered that tmux incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  tmux3.3a-1ubuntu0.1

Ubuntu 22.04 LTS:
  tmux3.2a-4ubuntu0.2

Ubuntu 20.04 LTS:
  tmux3.0a-2ubuntu0.4

Ubuntu 18.04 LTS:
  tmux2.6-3ubuntu0.3

Ubuntu 16.04 ESM:
  tmux2.1-3ubuntu0.1~esm1

Ubuntu 14.04 ESM:
  tmux1.8-5ubuntu0.1~esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5843-1
  CVE-2022-47016

Package Information:
  https://launchpad.net/ubuntu/+source/tmux/3.3a-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/tmux/3.2a-4ubuntu0.2
  https://launchpad.net/ubuntu/+source/tmux/3.0a-2ubuntu0.4
  https://launchpad.net/ubuntu/+source/tmux/2.6-3ubuntu0.3


signature.asc
Description: PGP signature



[USN-5839-2] Apache HTTP Server vulnerability

2023-02-02 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5839-2
February 02, 2023

apache2 vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM

Summary:

Several security issues were fixed in Apache HTTP Server.

Software Description:
- apache2: Apache HTTP server

Details:

USN-5839-1 fixed a vulnerability in Apache. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

 Dimas Fariski Setyawan Putra discovered that the Apache HTTP Server
 mod_proxy module incorrectly truncated certain response headers. This may
 result in later headers not being interpreted by the client.
 (CVE-2022-37436)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  apache2 2.4.18-2ubuntu3.17+esm9

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5839-2
  https://ubuntu.com/security/notices/USN-5839-1
  CVE-2022-37436


signature.asc
Description: PGP signature



[USN-5837-2] Django vulnerability

2023-02-01 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5837-2
February 01, 2023

python-django vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM

Summary:

Django could be made to consume memory if it received specially crafted
network traffic.

Software Description:
- python-django: High-level Python web development framework

Details:

USN-5837-1 fixed a vulnerability in Django. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

 Nick Pope discovered that Django incorrectly handled certain
 Accept-Language headers. A remote attacker could possibly use this issue to
 cause Django to consume memory, leading to a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  python-django   1.8.7-1ubuntu5.15+esm6
  python3-django  1.8.7-1ubuntu5.15+esm6

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5837-2
  https://ubuntu.com/security/notices/USN-5837-1
  CVE-2023-23969


signature.asc
Description: PGP signature



[USN-5811-3] Sudo vulnerability

2023-01-30 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5811-3
January 30, 2023

sudo vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in Sudo.

Software Description:
- sudo: Provide limited super user privileges to specific users

Details:

USN-5811-1 fixed a vulnerability in Sudo. This update provides
the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

 Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly
 handled user-specified editors when using the sudoedit command. A local
 attacker that has permission to use the sudoedit command could possibly use
 this issue to edit arbitrary files. (CVE-2023-22809)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
  sudo1.8.9p5-1ubuntu1.5+esm7
  sudo-ldap   1.8.9p5-1ubuntu1.5+esm7

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5811-3
  https://ubuntu.com/security/notices/USN-5811-1
  CVE-2023-22809


signature.asc
Description: PGP signature



[USN-5823-2] MySQL vulnerability

2023-01-24 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5823-2
January 24, 2023

mysql-5.7 vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM

Summary:

Several security issues were fixed in MySQL.

Software Description:
- mysql-5.7: MySQL database

Details:

USN-5823-1 fixed a vulnerability in MySQL. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

 Multiple security issues were discovered in MySQL and this update includes
 new upstream MySQL versions to fix these issues.

 MySQL has been updated to MySQL 5.7.41.

 In addition to security fixes, the updated packages contain bug fixes, new
 features, and possibly incompatible changes.

 Please see the following for more information:

 https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-41.html
 https://www.oracle.com/security-alerts/cpujan2023.html

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  mysql-server-5.75.7.41-0ubuntu0.16.04.1+esm1

This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.

References:
  https://ubuntu.com/security/notices/USN-5823-2
  https://ubuntu.com/security/notices/USN-5823-1
  CVE-2023-21840


signature.asc
Description: PGP signature



[USN-5806-2] Ruby vulnerability

2023-01-23 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5806-2
January 23, 2023

ruby2.5, ruby3.0 vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 18.04 LTS

Summary:

Ruby could allow for internet traffic to be modified if
a vulnerable application processed malicious user input.

Software Description:
- ruby3.0: Interpreter of object-oriented scripting language Ruby
- ruby2.5: Object-oriented scripting language

Details:

USN-5806-1 fixed vulnerabilities in Ruby. This update fixes the problem
for Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and  Ubuntu 22.10.

Original advisory details:

 Hiroshi Tokumaru discovered that Ruby did not properly handle certain
 user input for applications which generate HTTP responses using cgi gem.
 An attacker could possibly use this issue to maliciously modify the
 response a user would receive from a vulnerable application.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  libruby3.0  3.0.4-7ubuntu0.1
  ruby3.0 3.0.4-7ubuntu0.1

Ubuntu 22.04 LTS:
  libruby3.0  3.0.2-7ubuntu2.3
  ruby3.0 3.0.2-7ubuntu2.3

Ubuntu 18.04 LTS:
  libruby2.5  2.5.1-1ubuntu1.13
  ruby2.5 2.5.1-1ubuntu1.13

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5806-2
  https://ubuntu.com/security/notices/USN-5806-1
  CVE-2021-33621

Package Information:
  https://launchpad.net/ubuntu/+source/ruby3.0/3.0.4-7ubuntu0.1
  https://launchpad.net/ubuntu/+source/ruby3.0/3.0.2-7ubuntu2.3
  https://launchpad.net/ubuntu/+source/ruby2.5/2.5.1-1ubuntu1.13


signature.asc
Description: PGP signature



[USN-5818-1] PHP vulnerability

2023-01-23 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5818-1
January 23, 2023

php7.2, php7.4, php8.1 vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

PHP could be made do crash or execute arbitrary code if it received
a specially crafted input.

Software Description:
- php8.1: HTML-embedded scripting language interpreter
- php7.4: HTML-embedded scripting language interpreter
- php7.2: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash or
execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  libapache2-mod-php7.4   8.1.7-1ubuntu3.2
  libapache2-mod-php8.0   8.1.7-1ubuntu3.2
  libapache2-mod-php8.1   8.1.7-1ubuntu3.2
  php8.1  8.1.7-1ubuntu3.2
  php8.1-cgi  8.1.7-1ubuntu3.2
  php8.1-cli  8.1.7-1ubuntu3.2
  php8.1-sqlite3  8.1.7-1ubuntu3.2

Ubuntu 22.04 LTS:
  libapache2-mod-php7.4   8.1.2-1ubuntu2.10
  libapache2-mod-php8.0   8.1.2-1ubuntu2.10
  libapache2-mod-php8.1   8.1.2-1ubuntu2.10
  php8.1  8.1.2-1ubuntu2.10
  php8.1-cgi  8.1.2-1ubuntu2.10
  php8.1-cli  8.1.2-1ubuntu2.10
  php8.1-sqlite3  8.1.2-1ubuntu2.10

Ubuntu 20.04 LTS:
  libapache2-mod-php7.4   7.4.3-4ubuntu2.17
  php7.4  7.4.3-4ubuntu2.17
  php7.4-cgi  7.4.3-4ubuntu2.17
  php7.4-cli  7.4.3-4ubuntu2.17
  php7.4-sqlite3  7.4.3-4ubuntu2.17

Ubuntu 18.04 LTS:
  libapache2-mod-php7.2   7.2.24-0ubuntu0.18.04.16
  php7.2  7.2.24-0ubuntu0.18.04.16
  php7.2-cgi  7.2.24-0ubuntu0.18.04.16
  php7.2-cli  7.2.24-0ubuntu0.18.04.16
  php7.2-sqlite3  7.2.24-0ubuntu0.18.04.16

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5818-1
  CVE-2022-31631

Package Information:
  https://launchpad.net/ubuntu/+source/php8.1/8.1.7-1ubuntu3.2
  https://launchpad.net/ubuntu/+source/php8.1/8.1.2-1ubuntu2.10
  https://launchpad.net/ubuntu/+source/php7.4/7.4.3-4ubuntu2.17
  https://launchpad.net/ubuntu/+source/php7.2/7.2.24-0ubuntu0.18.04.16


signature.asc
Description: PGP signature



[USN-5810-2] Git regression

2023-01-19 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5810-2
January 19, 2023

git regression
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

USN-5810-1 introduced a regression in Git.

Software Description:
- git: fast, scalable, distributed revision control system

Details:

USN-5810-1 fixed vulnerabilities in Git. This update introduced a regression as 
it
was missing some commit lines. This update fixes the problem.

Original advisory details:

 Markus Vervier and Eric Sesterhenn discovered that Git incorrectly handled 
certain
 gitattributes. An attacker could possibly use this issue to cause a crash
 or execute arbitrary code. (CVE-2022-23521)

 Joern Schneeweisz discovered that Git incorrectly handled certain commands.
 An attacker could possibly use this issue to cause a crash or execute
 arbitrary code. (CVE-2022-41903)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  git 1:2.25.1-1ubuntu3.8

Ubuntu 18.04 LTS:
  git 1:2.17.1-1ubuntu0.15

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5810-2
  https://ubuntu.com/security/notices/USN-5810-1
  https://launchpad.net/bugs/2003246

Package Information:
  https://launchpad.net/ubuntu/+source/git/1:2.25.1-1ubuntu3.8
  https://launchpad.net/ubuntu/+source/git/1:2.17.1-1ubuntu0.15


signature.asc
Description: PGP signature



[USN-5811-2] Sudo vulnerability

2023-01-18 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5811-2
January 18, 2023

sudo vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM

Summary:

Sudo could be made to possibly edit arbitrary files
if it received a specially crafted input.

Software Description:
- sudo: Provide limited super user privileges to specific users

Details:

USN-5811-1 fixed a vulnerability in Sudo. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

 Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly
 handled user-specified editors when using the sudoedit command. A local
 attacker that has permission to use the sudoedit command could possibly use
 this issue to edit arbitrary files. (CVE-2023-22809)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  sudo1.8.16-0ubuntu1.10+esm1
  sudo-ldap   1.8.16-0ubuntu1.10+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5811-2
  https://ubuntu.com/security/notices/USN-5811-1
  CVE-2023-22809


signature.asc
Description: PGP signature



[USN-5810-1] Git vulnerabilities

2023-01-17 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5810-1
January 17, 2023

git vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in Git.

Software Description:
- git: fast, scalable, distributed revision control system

Details:

Markus Vervier and Eric Sesterhenn discovered that Git incorrectly handled 
certain
gitattributes. An attacker could possibly use this issue to cause a crash
or execute arbitrary code. (CVE-2022-23521)

Joern Schneeweisz discovered that Git incorrectly handled certain commands.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code. (CVE-2022-41903)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  git 1:2.37.2-1ubuntu1.2

Ubuntu 22.04 LTS:
  git 1:2.34.1-1ubuntu1.6

Ubuntu 20.04 LTS:
  git 1:2.25.1-1ubuntu3.7

Ubuntu 18.04 LTS:
  git 1:2.17.1-1ubuntu0.14

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5810-1
  CVE-2022-23521, CVE-2022-41903

Package Information:
  https://launchpad.net/ubuntu/+source/git/1:2.37.2-1ubuntu1.2
  https://launchpad.net/ubuntu/+source/git/1:2.34.1-1ubuntu1.6
  https://launchpad.net/ubuntu/+source/git/1:2.25.1-1ubuntu3.7
  https://launchpad.net/ubuntu/+source/git/1:2.17.1-1ubuntu0.14


signature.asc
Description: PGP signature



[USN-5795-2] Net-SNMP vulnerabilities

2023-01-16 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5795-2
January 16, 2023

net-snmp vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in Net-SNMP.

Software Description:
- net-snmp: SNMP (Simple Network Management Protocol) server and applications

Details:

USN-5795-1 and 5543-1 fixed several vulnerabilities in Net-SNMP. This update 
provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

 It was discovered that Net-SNMP incorrectly handled certain requests. A
 remote attacker could possibly use these issues to cause Net-SNMP to crash,
 resulting in a denial of service.

 Yu Zhang and Nanyu Zhong discovered that Net-SNMP incorrectly handled
 memory operations when processing certain requests. A remote attacker could
 use this issue to cause Net-SNMP to crash, resulting in a denial of
 service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  libsnmp30   5.7.3+dfsg-1ubuntu4.6+esm1
  snmp5.7.3+dfsg-1ubuntu4.6+esm1
  snmpd   5.7.3+dfsg-1ubuntu4.6+esm1

Ubuntu 14.04 ESM:
  libsnmp30   5.7.2~dfsg-8.1ubuntu3.3+esm3
  snmp5.7.2~dfsg-8.1ubuntu3.3+esm3
  snmpd   5.7.2~dfsg-8.1ubuntu3.3+esm3

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5795-2
  https://ubuntu.com/security/notices/USN-5795-1
  CVE-2022-24805, CVE-2022-24806, CVE-2022-24807, CVE-2022-24808,
  CVE-2022-24809, CVE-2022-24810, CVE-2022-44792, CVE-2022-44793


signature.asc
Description: PGP signature



[USN-5796-2] w3m vulnerability

2023-01-10 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5796-2
January 10, 2023

w3m vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM

Summary:

w3m could be made to crash or run programs as your login if it opened a
malicious website.

Software Description:
- w3m: WWW browsable pager with excellent tables/frames support

Details:

USN-5796-1 fixed a vulnerability in w3m. This update provides
the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

 It was discovered that w3m incorrectly handled certain HTML files. A remote
 attacker could use this issue to cause w3m to crash, resulting in a denial
 of service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
  w3m 0.5.3-15ubuntu0.2+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5796-2
  https://ubuntu.com/security/notices/USN-5796-1
  CVE-2022-38223


signature.asc
Description: PGP signature



[USN-5761-2] ca-certificates update

2022-12-06 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5761-2
December 06, 2022

ca-certificates update
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

A distrusted certificate authority has been removed from ca-certificates.

Software Description:
- ca-certificates: Common CA certificates

Details:

USN-5761-1 updated ca-certificates. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

 Due to security concerns, the TrustCor certificate authority has been
 marked as distrusted in Mozilla's root store. This update removes the
 TrustCor CA certificates from the ca-certificates package.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  ca-certificates 20211016~16.04.1~esm2

Ubuntu 14.04 ESM:
  ca-certificates 20211016~14.04.1~esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5761-2
  https://ubuntu.com/security/notices/USN-5761-1
  https://launchpad.net/bugs/XX


signature.asc
Description: PGP signature



[USN-5762-1] GNU binutils vulnerability

2022-12-05 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5762-1
December 05, 2022

binutils vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM

Summary:

GNU binutils could be made to crash or execute arbitrary code if it received
a specially crafted COFF file.

Software Description:
- binutils: GNU assembler, linker and binary utilities

Details:

It was discovered that GNU binutils incorrectly handled certain  COFF files.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  binutils2.39-3ubuntu1.1
  binutils-multiarch  2.39-3ubuntu1.1

Ubuntu 22.04 LTS:
  binutils2.38-4ubuntu2.1
  binutils-multiarch  2.38-4ubuntu2.1

Ubuntu 20.04 LTS:
  binutils2.34-6ubuntu1.4
  binutils-multiarch  2.34-6ubuntu1.4

Ubuntu 18.04 LTS:
  binutils2.30-21ubuntu1~18.04.8
  binutils-multiarch  2.30-21ubuntu1~18.04.8

Ubuntu 16.04 ESM:
  binutils2.26.1-1ubuntu1~16.04.8+esm5
  binutils-multiarch  2.26.1-1ubuntu1~16.04.8+esm5

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5762-1
  CVE-2022-38533

Package Information:
  https://launchpad.net/ubuntu/+source/binutils/2.39-3ubuntu1.1
  https://launchpad.net/ubuntu/+source/binutils/2.38-4ubuntu2.1
  https://launchpad.net/ubuntu/+source/binutils/2.34-6ubuntu1.4
  https://launchpad.net/ubuntu/+source/binutils/2.30-21ubuntu1~18.04.8


signature.asc
Description: PGP signature



[USN-5760-1] libxml2 vulnerabilities

2022-12-05 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5760-1
December 05, 2022

libxml2 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in libxml2.

Software Description:
- libxml2: GNOME XML library

Details:

It was discovered that libxml2 incorrectly handled certain XML files.
An attacker could possibly use this issue to cause a crash.
(CVE-2022-2309)

It was discovered that libxml2 incorrectly handled certain XML files.
An attacker could possibly use this issue to expose sensitive information
or cause a crash. (CVE-2022-40303)

It was discovered that libxml2 incorrectly handled certain XML files.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2022-40304)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  libxml2 2.9.14+dfsg-1ubuntu0.1
  libxml2-utils   2.9.14+dfsg-1ubuntu0.1

Ubuntu 22.04 LTS:
  libxml2 2.9.13+dfsg-1ubuntu0.2
  libxml2-utils   2.9.13+dfsg-1ubuntu0.2

Ubuntu 20.04 LTS:
  libxml2 2.9.10+dfsg-5ubuntu0.20.04.5
  libxml2-utils   2.9.10+dfsg-5ubuntu0.20.04.5

Ubuntu 18.04 LTS:
  libxml2 2.9.4+dfsg1-6.1ubuntu1.8
  libxml2-utils   2.9.4+dfsg1-6.1ubuntu1.8

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5760-1
  CVE-2022-2309, CVE-2022-40303, CVE-2022-40304

Package Information:
  https://launchpad.net/ubuntu/+source/libxml2/2.9.14+dfsg-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/libxml2/2.9.13+dfsg-1ubuntu0.2
  https://launchpad.net/ubuntu/+source/libxml2/2.9.10+dfsg-5ubuntu0.20.04.5
  https://launchpad.net/ubuntu/+source/libxml2/2.9.4+dfsg1-6.1ubuntu1.8


signature.asc
Description: PGP signature



[USN-5716-2] SQLite vulnerability

2022-11-21 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5716-2
November 21, 2022

sqlite3 vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM

Summary:

SQLite could be made to crash or run programs if it received specially
crafted input.

Software Description:
- sqlite3: C library that implements an SQL database engine

Details:

USN-5716-1 fixed a vulnerability in SQLite. This update provides
the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

 It was discovered that SQLite incorrectly handled certain long string
 arguments. An attacker could use this issue to cause SQLite to crash,
 resulting in a denial of service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
  libsqlite3-03.8.2-1ubuntu2.2+esm3

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5716-2
  https://ubuntu.com/security/notices/USN-5716-1
  CVE-2022-35737


signature.asc
Description: PGP signature



[USN-5658-3] DHCP vulnerabilities

2022-11-21 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5658-3
November 21, 2022

isc-dhcp vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in DHCP.

Software Description:
- isc-dhcp: DHCP server and client

Details:

USN-5658-1 fixed several vulnerabilities in DHCP. This update provides
the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

 It was discovered that DHCP incorrectly handled option reference counting.
 A remote attacker could possibly use this issue to cause DHCP servers to
 crash, resulting in a denial of service. (CVE-2022-2928)

 It was discovered that DHCP incorrectly handled certain memory operations.
 A remote attacker could possibly use this issue to cause DHCP clients and
 servers to consume resources, leading to a denial of service.
 (CVE-2022-2929)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
  isc-dhcp-client 4.2.4-7ubuntu12.13+esm2
  isc-dhcp-server 4.2.4-7ubuntu12.13+esm2

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5658-3
  https://ubuntu.com/security/notices/USN-5658-1
  CVE-2022-2928, CVE-2022-2929


signature.asc
Description: PGP signature



[USN-5686-3] Git vulnerabilities

2022-11-21 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5686-3
November 21, 2022

git vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10

Summary:

Several security issues were fixed in Git.

Software Description:
- git: fast, scalable, distributed revision control system

Details:

USN-5686-1 fixed vulnerabilities in Git. This update provides the corresponding
updates for Ubuntu 22.10.

Original advisory details:

 Cory Snider discovered that Git incorrectly handled certain symbolic links.
 An attacker could possibly use this issue to cause an unexpected behaviour.
 (CVE-2022-39253)

 Kevin Backhouse discovered that Git incorrectly handled certain command 
strings.
 An attacker could possibly use this issue to arbitrary code execution.
 (CVE-2022-39260)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  git 1:2.37.2-1ubuntu1.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5686-3
  https://ubuntu.com/security/notices/USN-5686-1
  CVE-2022-39253, CVE-2022-39260

Package Information:
  https://launchpad.net/ubuntu/+source/git/1:2.37.2-1ubuntu1.1


signature.asc
Description: PGP signature



[USN-5625-2] Mako vulnerability

2022-11-15 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5625-2
November 15, 2022

mako vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10

Summary:

Mako could be made to denial of service if it received a
specially crafted regular expression.

Software Description:
- mako: fast and lightweight templating for the Python platform

Details:

USN-5625-1 fixed a vulnerability in Mako. This update provides the 
corresponding updates for
Ubuntu 22.10.

Original advisory details:

 It was discovered that Mako incorrectly handled certain regular expressions.
 An attacker could possibly use this issue to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  python3-mako1.1.3+ds1-3ubuntu2.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5625-2
  https://ubuntu.com/security/notices/USN-5625-1
  CVE-2022-40023

Package Information:
  https://launchpad.net/ubuntu/+source/mako/1.1.3+ds1-3ubuntu2.1


signature.asc
Description: PGP signature



[USN-5717-1] PHP vulnerabilities

2022-11-08 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5717-1
November 08, 2022

php7.2, php7.4, php8.1 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in PHP.

Software Description:
- php8.1: HTML-embedded scripting language interpreter
- php7.4: HTML-embedded scripting language interpreter
- php7.2: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP incorrectly handled certain gzip files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2022-31628)

It was discovered that PHP incorrectly handled certain cookies.
An attacker could possibly use this issue to compromise the data
(CVE-2022-31629)

It was discovered that PHP incorrectly handled certain image fonts.
An attacker could possibly use this issue to expose sensitive information.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.10, and Ubuntu 22.04 LTS.
(CVE-2022-31630)

Nicky Mouha discovered that PHP incorrectly handled certain SHA-3 operations.
An attacker could possibly use this issue to cause a crash
or execute arbitrary code. This issue only affected Ubuntu 20.04 LTS,
Ubuntu 22.10, and Ubuntu 22.04 LTS. (CVE-2022-37454)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  libapache2-mod-php7.4   8.1.7-1ubuntu3.1
  libapache2-mod-php8.0   8.1.7-1ubuntu3.1
  libapache2-mod-php8.1   8.1.7-1ubuntu3.1
  php8.1  8.1.7-1ubuntu3.1
  php8.1-cgi  8.1.7-1ubuntu3.1
  php8.1-cli  8.1.7-1ubuntu3.1
  php8.1-zip  8.1.7-1ubuntu3.1

Ubuntu 22.04 LTS:
  libapache2-mod-php7.4   8.1.2-1ubuntu2.8
  libapache2-mod-php8.0   8.1.2-1ubuntu2.8
  libapache2-mod-php8.1   8.1.2-1ubuntu2.8
  php8.1  8.1.2-1ubuntu2.8
  php8.1-cgi  8.1.2-1ubuntu2.8
  php8.1-cli  8.1.2-1ubuntu2.8
  php8.1-zip  8.1.2-1ubuntu2.8

Ubuntu 20.04 LTS:
  libapache2-mod-php7.4   7.4.3-4ubuntu2.15
  php7.4  7.4.3-4ubuntu2.15
  php7.4-cgi  7.4.3-4ubuntu2.15
  php7.4-cli  7.4.3-4ubuntu2.15
  php7.4-zip  7.4.3-4ubuntu2.15

Ubuntu 18.04 LTS:
  libapache2-mod-php7.2   7.2.24-0ubuntu0.18.04.15
  php7.2  7.2.24-0ubuntu0.18.04.15
  php7.2-cgi  7.2.24-0ubuntu0.18.04.15
  php7.2-cli  7.2.24-0ubuntu0.18.04.15
  php7.2-zip  7.2.24-0ubuntu0.18.04.15

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5717-1
  CVE-2022-31628, CVE-2022-31629, CVE-2022-31630, CVE-2022-37454

Package Information:
  https://launchpad.net/ubuntu/+source/php8.1/8.1.7-1ubuntu3.1
  https://launchpad.net/ubuntu/+source/php8.1/8.1.2-1ubuntu2.8
  https://launchpad.net/ubuntu/+source/php7.4/7.4.3-4ubuntu2.15
  https://launchpad.net/ubuntu/+source/php7.2/7.2.24-0ubuntu0.18.04.15


signature.asc
Description: PGP signature



[USN-5711-2] NTFS-3G vulnerability

2022-11-03 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5711-2
November 03, 2022

ntfs-3g vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

NTFS-3G could be made to crash or run programs as an administrator
if it mounted a specially crafted disk.

Software Description:
- ntfs-3g: read/write NTFS driver for FUSE

Details:

USN-5711-1 fixed a vulnerability in NTFS-3G. This update provides
the corresponding update for Ubuntu 14.04 ESM Ubuntu 16.04 ESM.

Original advisory details:

 Yuchen Zeng and Eduardo Vela discovered that NTFS-3G incorrectly validated
 certain NTFS metadata. A local attacker could possibly use this issue to
 gain privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  ntfs-3g 1:2015.3.14AR.1-1ubuntu0.3+esm4

Ubuntu 14.04 ESM:
  ntfs-3g 1:2013.1.13AR.1-2ubuntu2+esm4

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5711-2
  https://ubuntu.com/security/notices/USN-5711-1
  CVE-2022-40284


signature.asc
Description: PGP signature



[USN-5708-1] backport-iwlwifi-dkms vulnerabilities

2022-11-01 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5708-1
November 01, 2022

backport-iwlwifi-dkms vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in backport-iwlwifi-dkms.

Software Description:
- backport-iwlwifi-dkms: iwlwifi driver backport in DKMS format

Details:

Sönke Huster discovered that an integer overflow vulnerability existed in
the WiFi driver stack in the Linux kernel, leading to a buffer overflow. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-41674)

Sönke Huster discovered that a use-after-free vulnerability existed in the
WiFi driver stack in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-42719)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly perform reference counting in some situations, leading to a
use-after-free vulnerability. A physically proximate attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-42720)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly handle BSSID/SSID lists in some situations. A physically
proximate attacker could use this to cause a denial of service (infinite
loop). (CVE-2022-42721)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
physically proximate attacker could use this to cause a denial of service
(system crash). This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.10.
(CVE-2022-42722)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  backport-iwlwifi-dkms   9904-0ubuntu3.1

Ubuntu 22.04 LTS:
  backport-iwlwifi-dkms   9858-0ubuntu3.1

Ubuntu 20.04 LTS:
  backport-iwlwifi-dkms   8324-0ubuntu3~20.04.5

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5708-1
  CVE-2022-41674, CVE-2022-42719, CVE-2022-42720, CVE-2022-42721,
  CVE-2022-42722, https://launchpad.net/bugs/1994525

Package Information:
  https://launchpad.net/ubuntu/+source/backport-iwlwifi-dkms/9904-0ubuntu3.1
  https://launchpad.net/ubuntu/+source/backport-iwlwifi-dkms/9858-0ubuntu3.1
  
https://launchpad.net/ubuntu/+source/backport-iwlwifi-dkms/8324-0ubuntu3~20.04.5


signature.asc
Description: PGP signature



[USN-5698-2] Open vSwitch vulnerability

2022-10-25 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5698-2
October 25, 2022

openvswitch vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM

Summary:

Open vSwitch could be made to crash or run programs if it received
specially crafted network traffic.

Software Description:
- openvswitch: Ethernet virtual switch

Details:

USN-5698-1 fixed a vulnerability in Open. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

 It was discovered that Open vSwitch incorrectly handled comparison of
 certain minimasks. A remote attacker could use this issue to cause Open
 vSwitch to crash, resulting in a denial of service, or possibly execute
 arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  openvswitch-common  2.5.9-0ubuntu0.16.04.3+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5698-2
  https://ubuntu.com/security/notices/USN-5698-1
  CVE-2022-32166


signature.asc
Description: PGP signature



[USN-5689-1] Perl vulnerability

2022-10-19 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5689-1
October 19, 2022

perl vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Perl could be made to by pass signature verification.

Software Description:
- perl: Practical Extraction and Report Language

Details:

It was discovered that Perl incorrectly handled certain signature verification.
An remote attacker could possibly use this issue to bypass signature 
verification.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  perl5.34.0-3ubuntu1.1

Ubuntu 20.04 LTS:
  perl5.30.0-9ubuntu0.3

Ubuntu 18.04 LTS:
  perl5.26.1-6ubuntu0.6

Ubuntu 16.04 ESM:
  perl5.22.1-9ubuntu0.9+esm1

Ubuntu 14.04 ESM:
  perl5.18.2-2ubuntu1.7+esm4

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5689-1
  CVE-2020-16156

Package Information:
  https://launchpad.net/ubuntu/+source/perl/5.34.0-3ubuntu1.1
  https://launchpad.net/ubuntu/+source/perl/5.30.0-9ubuntu0.3
  https://launchpad.net/ubuntu/+source/perl/5.26.1-6ubuntu0.6


signature.asc
Description: PGP signature



[USN-5686-1] Git vulnerabilities

2022-10-18 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5686-1
October 18, 2022

git vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in Git.

Software Description:
- git: fast, scalable, distributed revision control system

Details:

Cory Snider discovered that Git incorrectly handled certain symbolic links.
An attacker could possibly use this issue to cause an unexpected behaviour.
(CVE-2022-39253)

Kevin Backhouse discovered that Git incorrectly handled certain command strings.
An attacker could possibly use this issue to arbitrary code execution.
(CVE-2022-39260)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  git 1:2.34.1-1ubuntu1.5

Ubuntu 20.04 LTS:
  git 1:2.25.1-1ubuntu3.6

Ubuntu 18.04 LTS:
  git 1:2.17.1-1ubuntu0.13

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5686-1
  CVE-2022-39253, CVE-2022-39260

Package Information:
  https://launchpad.net/ubuntu/+source/git/1:2.34.1-1ubuntu1.5
  https://launchpad.net/ubuntu/+source/git/1:2.25.1-1ubuntu3.6
  https://launchpad.net/ubuntu/+source/git/1:2.17.1-1ubuntu0.13


signature.asc
Description: PGP signature



[USN-5666-1] OpenSSH vulnerability

2022-10-10 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5666-1
October 10, 2022

openssh vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM

Summary:

OpenSSH could be made to run arbitrary code if it some
non-default configuration are in use.

Software Description:
- openssh: secure shell (SSH) for secure access to remote machines

Details:

It was discovered that OpenSSH incorrectly handled certain helper programs.
An attacker could possibly use this issue to arbitrary code execution.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  openssh-server  1:7.2p2-4ubuntu2.10+esm2

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5666-1
  CVE-2021-41617


signature.asc
Description: PGP signature



[USN-5651-2] strongSwan vulnerability

2022-10-03 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5651-2
October 03, 2022

strongswan vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

strongSwan could be made do denial of service if it received
a specially crafted certificate.

Software Description:
- strongswan: IPsec VPN solution

Details:

USN-5651-1 fixed a vulnerability in strongSwan. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

 Lahav Schlesinger discovered that strongSwan incorrectly handled certain OCSP 
URIs and
 and CRL distribution points (CDP) in certificates. A remote attacker could
 possibly use this issue to initiate IKE_SAs and send crafted certificates
 that contain URIs pointing to servers under their control, which can lead
 to a denial-of-service attack.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  libstrongswan   5.3.5-1ubuntu3.8+esm3
  strongswan  5.3.5-1ubuntu3.8+esm3

Ubuntu 14.04 ESM:
  libstrongswan   5.1.2-0ubuntu2.11+esm3
  strongswan  5.1.2-0ubuntu2.11+esm3

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5651-2
  https://ubuntu.com/security/notices/USN-5651-1
  CVE-2022-40617


signature.asc
Description: PGP signature



[USN-5651-1] strongSwan vulnerability

2022-10-03 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5651-1
October 03, 2022

strongswan vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

strongSwan could be made do denial of service if it received
a specially crafted certificate.

Software Description:
- strongswan: IPsec VPN solution

Details:

Lahav Schlesinger discovered that strongSwan incorrectly handled certain OCSP 
URIs and
and CRL distribution points (CDP) in certificates. A remote attacker could
possibly use this issue to initiate IKE_SAs and send crafted certificates
that contain URIs pointing to servers under their control, which can lead
to a denial-of-service attack.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  libstrongswan   5.9.5-2ubuntu2.1
  strongswan  5.9.5-2ubuntu2.1

Ubuntu 20.04 LTS:
  libstrongswan   5.8.2-1ubuntu3.5
  strongswan  5.8.2-1ubuntu3.5

Ubuntu 18.04 LTS:
  libstrongswan   5.6.2-1ubuntu2.9
  strongswan  5.6.2-1ubuntu2.9

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5651-1
  CVE-2022-40617

Package Information:
  https://launchpad.net/ubuntu/+source/strongswan/5.9.5-2ubuntu2.1
  https://launchpad.net/ubuntu/+source/strongswan/5.8.2-1ubuntu3.5
  https://launchpad.net/ubuntu/+source/strongswan/5.6.2-1ubuntu2.9


signature.asc
Description: PGP signature



[USN-5636-1] SoS vulnerability

2022-09-26 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5636-1
September 26, 2022

sosreport vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

SoS could be made do expose sensitive information.

Software Description:
- sosreport: Set of tools to gather troubleshooting data from a system

Details:

It was discovered that SoS incorrectly handled certain data.
An attacker could possibly use this issue to expose sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  sosreport   4.3-1ubuntu2.1

Ubuntu 20.04 LTS:
  sosreport   4.3-1ubuntu0.20.04.2

Ubuntu 18.04 LTS:
  sosreport   4.3-1ubuntu0.18.04.2

Ubuntu 16.04 ESM:
  sosreport   3.9.1-1ubuntu0.16.04.2+esm1

Ubuntu 14.04 ESM:
  sosreport   3.5-1~ubuntu14.04.3+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5636-1
  CVE-2022-2806

Package Information:
  https://launchpad.net/ubuntu/+source/sosreport/4.3-1ubuntu2.1
  https://launchpad.net/ubuntu/+source/sosreport/4.3-1ubuntu0.20.04.2
  https://launchpad.net/ubuntu/+source/sosreport/4.3-1ubuntu0.18.04.2


signature.asc
Description: PGP signature



[USN-5626-2] Bind vulnerabilities

2022-09-21 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5626-2
September 21, 2022

bind9 vulnerabilities
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in Bind.

Software Description:
- bind9: Internet Domain Name Server

Details:

USN-5626-1 fixed several vulnerabilities in Bind. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

 Yehuda Afek, Anat Bremler-Barr, and Shani Stajnrod discovered that Bind
 incorrectly handled large delegations. A remote attacker could possibly use
 this issue to reduce performance, leading to a denial of service.
 (CVE-2022-2795)

 It was discovered that Bind incorrectly handled memory when processing
 ECDSA DNSSEC verification. A remote attacker could use this issue to
 consume resources, leading to a denial of service. (CVE-2022-38177)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  bind9   1:9.10.3.dfsg.P4-8ubuntu1.19+esm3

Ubuntu 14.04 ESM:
  bind9   1:9.9.5.dfsg-3ubuntu0.19+esm7

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5626-2
  https://ubuntu.com/security/notices/USN-5626-1
  CVE-2022-2795, CVE-2022-38177


signature.asc
Description: PGP signature



[USN-5625-1] Mako vulnerability

2022-09-21 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5625-1
September 21, 2022

mako vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM

Summary:

Mako could be made to denial of service if it received a
specially crafted regular expression.

Software Description:
- mako: documentation for the Mako Python library

Details:

It was discovered that Mako incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  python3-mako1.1.3+ds1-2ubuntu0.1

Ubuntu 20.04 LTS:
  python-mako 1.1.0+ds1-1ubuntu2.1
  python3-mako1.1.0+ds1-1ubuntu2.1

Ubuntu 18.04 LTS:
  python-mako 1.0.7+ds1-1ubuntu0.2
  python3-mako1.0.7+ds1-1ubuntu0.2

Ubuntu 16.04 ESM:
  python-mako 1.0.3+ds1-1ubuntu1+esm1
  python3-mako1.0.3+ds1-1ubuntu1+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5625-1
  CVE-2022-40023

Package Information:
  https://launchpad.net/ubuntu/+source/mako/1.1.3+ds1-2ubuntu0.1
  https://launchpad.net/ubuntu/+source/mako/1.1.0+ds1-1ubuntu2.1
  https://launchpad.net/ubuntu/+source/mako/1.0.7+ds1-1ubuntu0.2


signature.asc
Description: PGP signature



[USN-5606-2] poppler regression

2022-09-14 Thread Leonidas S. Barbosa
==
Ubuntu Security Notice USN-5606-2
September 14, 2022

poppler regression
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM

Summary:

USN-5606-1 caused a regression in poppler.

Software Description:
- poppler: PDF rendering library

Details:

USN-5606-1 fixed a vulnerability in poppler. Unfortunately it was missing a
commit to fix it properly.  This update provides
the corresponding fix for Ubuntu 18.04 LTS and Ubuntu 16.04 ESM.

We apologize for the inconvenience.

Original advisory details:

 It was discovered that poppler incorrectly handled certain
 PDF. An attacker could possibly use this issue to cause a
 denial of service or execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  libpoppler-private-dev  0.62.0-2ubuntu2.14
  libpoppler730.62.0-2ubuntu2.14
  poppler-utils   0.62.0-2ubuntu2.14

Ubuntu 16.04 ESM:
  libpoppler-private-dev  0.41.0-0ubuntu1.16+esm2
  libpoppler580.41.0-0ubuntu1.16+esm2
  poppler-utils   0.41.0-0ubuntu1.16+esm2

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5606-2
  https://ubuntu.com/security/notices/USN-5606-1
  https://launchpad.net/bugs/1989515

Package Information:
  https://launchpad.net/ubuntu/+source/poppler/0.62.0-2ubuntu2.14


signature.asc
Description: PGP signature



[USN-5607-1] GDK-PixBuf vulnerability

2022-09-13 Thread Leonidas s. Barbosa
==
Ubuntu Security Notice USN-5607-1
September 13, 2022

gdk-pixbuf vulnerability
==

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

GDK-PixBuf could be made do execute arbitrary code or
crash if it received a specially crafted image.

Software Description:
- gdk-pixbuf: GDK Pixbuf library

Details:

It was discovered that GDK-PixBuf incorrectly handled certain images.
An attacker could possibly use this issue to execute arbitrary code
or cause a crash.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
  libgdk-pixbuf-2.0-0 2.42.8+dfsg-1ubuntu0.1

Ubuntu 20.04 LTS:
  libgdk-pixbuf2.0-0  2.40.0+dfsg-3ubuntu0.4

After a standard system update you need to restart your session to make all
the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5607-1
  CVE-2021-44648

Package Information:
  https://launchpad.net/ubuntu/+source/gdk-pixbuf/2.42.8+dfsg-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/gdk-pixbuf/2.40.0+dfsg-3ubuntu0.4


signature.asc
Description: PGP signature



  1   2   3   4   5   6   7   >