Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2262-1] Linux kernel (Quantal HWE) vulnerabilities
(John Johansen)
2. [USN-2263-1] Linux kernel (OMAP4) vulnerabilities (John Johansen)
3. [USN-2264-1] Linux kernel vulnerabilities (John Johansen)
----------------------------------------------------------------------
Message: 1
Date: Fri, 27 Jun 2014 05:01:33 -0400
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2262-1] Linux kernel (Quantal HWE) vulnerabilities
Message-ID: <53AD32ED.5020909@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2262-1
June 27, 2014
linux-lts-quantal vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-lts-quantal: Linux hardware enablement kernel from Quantal
Details:
A bounds check error was discovered in the socket filter subsystem of the
Linux kernel. A local user could exploit this flaw to cause a denial of
service (system crash) via crafted BPF instructions. (CVE-2014-3144)
A remainder calculation error was discovered in the socket filter subsystem
of the Linux kernel. A local user could exploit this flaw to cause a denial
of service (system crash) via crafted BPF instructions. (CVE-2014-3145)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.5.0-52-generic 3.5.0-52.78~precise1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2262-1
CVE-2014-3144, CVE-2014-3145
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-quantal/3.5.0-52.78~precise1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140627/5ea13dc8/attachment-0001.pgp>
------------------------------
Message: 2
Date: Fri, 27 Jun 2014 05:01:58 -0400
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2263-1] Linux kernel (OMAP4) vulnerabilities
Message-ID: <53AD3306.6090005@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2263-1
June 27, 2014
linux-ti-omap4 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-ti-omap4: Linux kernel for OMAP4
Details:
Salva Peir? discovered an information leak in the Linux kernel's media-
device driver. A local attacker could exploit this flaw to obtain sensitive
information from kernel memory. (CVE-2014-1739)
A bounds check error was discovered in the socket filter subsystem of the
Linux kernel. A local user could exploit this flaw to cause a denial of
service (system crash) via crafted BPF instructions. (CVE-2014-3144)
A remainder calculation error was discovered in the socket filter subsystem
of the Linux kernel. A local user could exploit this flaw to cause a denial
of service (system crash) via crafted BPF instructions. (CVE-2014-3145)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.2.0-1450-omap4 3.2.0-1450.69
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2263-1
CVE-2014-1739, CVE-2014-3144, CVE-2014-3145
Package Information:
https://launchpad.net/ubuntu/+source/linux-ti-omap4/3.2.0-1450.69
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140627/841df3e9/attachment-0001.pgp>
------------------------------
Message: 3
Date: Fri, 27 Jun 2014 05:02:29 -0400
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2264-1] Linux kernel vulnerabilities
Message-ID: <53AD3325.2010805@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2264-1
June 27, 2014
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.10
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux: Linux kernel
Details:
Salva Peir? discovered an information leak in the Linux kernel's media-
device driver. A local attacker could exploit this flaw to obtain sensitive
information from kernel memory. (CVE-2014-1739)
A bounds check error was discovered in the socket filter subsystem of the
Linux kernel. A local user could exploit this flaw to cause a denial of
service (system crash) via crafted BPF instructions. (CVE-2014-3144)
A remainder calculation error was discovered in the socket filter subsystem
of the Linux kernel. A local user could exploit this flaw to cause a denial
of service (system crash) via crafted BPF instructions. (CVE-2014-3145)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.10:
linux-image-3.11.0-24-generic 3.11.0-24.41
linux-image-3.11.0-24-generic-lpae 3.11.0-24.41
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2264-1
CVE-2014-1739, CVE-2014-3144, CVE-2014-3145
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.11.0-24.41
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140627/61f536a1/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 117, Issue 16
*********************************************************
News
Friday, June 27, 2014
ubuntu-security-announce Digest, Vol 117, Issue 15
Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2257-1] Samba vulnerabilities (Marc Deslauriers)
2. [USN-2258-1] GnuPG vulnerability (Marc Deslauriers)
3. [USN-2259-1] Linux kernel vulnerabilities (John Johansen)
4. [USN-2260-1] Linux kernel (Trusty HWE) vulnerabilities
(John Johansen)
5. [USN-2261-1] Linux kernel (Saucy HWE) vulnerabilities
(John Johansen)
----------------------------------------------------------------------
Message: 1
Date: Thu, 26 Jun 2014 14:23:17 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2257-1] Samba vulnerabilities
Message-ID: <53AC6515.7040603@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2257-1
June 26, 2014
samba vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in Samba.
Software Description:
- samba: SMB/CIFS file, print, and login server for Unix
Details:
Christof Schmitt discovered that Samba incorrectly initialized a certain
response field when vfs shadow copy was enabled. A remote authenticated
attacker could use this issue to possibly obtain sensitive information.
This issue only affected Ubuntu 13.10 and Ubuntu 14.04 LTS. (CVE-2014-0178)
It was discovered that the Samba internal DNS server incorrectly handled QR
fields when processing incoming DNS messages. A remote attacker could use
this issue to cause Samba to consume resources, resulting in a denial of
service. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-0239)
Daniel Berteaud discovered that the Samba NetBIOS name service daemon
incorrectly handled certain malformed packets. A remote attacker could use
this issue to cause Samba to consume resources, resulting in a denial of
service. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and
Ubuntu 14.04 LTS. (CVE-2014-0244)
Simon Arlott discovered that Samba incorrectly handled certain unicode path
names. A remote authenticated attacker could use this issue to cause Samba
to stop responding, resulting in a denial of service. (CVE-2014-3493)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
samba 2:4.1.6+dfsg-1ubuntu2.14.04.2
Ubuntu 13.10:
samba 2:3.6.18-1ubuntu3.3
Ubuntu 12.04 LTS:
samba 2:3.6.3-2ubuntu2.11
Ubuntu 10.04 LTS:
samba 2:3.4.7~dfsg-1ubuntu3.15
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2257-1
CVE-2014-0178, CVE-2014-0239, CVE-2014-0244, CVE-2014-3493
Package Information:
https://launchpad.net/ubuntu/+source/samba/2:4.1.6+dfsg-1ubuntu2.14.04.2
https://launchpad.net/ubuntu/+source/samba/2:3.6.18-1ubuntu3.3
https://launchpad.net/ubuntu/+source/samba/2:3.6.3-2ubuntu2.11
https://launchpad.net/ubuntu/+source/samba/2:3.4.7~dfsg-1ubuntu3.15
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140626/edb763d5/attachment-0001.pgp>
------------------------------
Message: 2
Date: Thu, 26 Jun 2014 14:23:48 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2258-1] GnuPG vulnerability
Message-ID: <53AC6534.2050307@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2258-1
June 26, 2014
gnupg, gnupg2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
GnuPG could be made to hang if it processed a specially crafted message.
Software Description:
- gnupg: GNU privacy guard - a free PGP replacement
- gnupg2: GNU privacy guard - a free PGP replacement
Details:
Jean-Ren? Reinhard, Olivier Levillain and Florian Maury discovered that
GnuPG incorrectly handled certain OpenPGP messages. If a user or automated
system were tricked into processing a specially-crafted message, GnuPG
could consume resources, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
gnupg 1.4.16-1ubuntu2.1
gnupg2 2.0.22-3ubuntu1.1
Ubuntu 13.10:
gnupg 1.4.14-1ubuntu2.2
gnupg2 2.0.20-1ubuntu3.1
Ubuntu 12.04 LTS:
gnupg 1.4.11-3ubuntu2.6
gnupg2 2.0.17-2ubuntu2.12.04.4
Ubuntu 10.04 LTS:
gnupg 1.4.10-2ubuntu1.6
gnupg2 2.0.14-1ubuntu1.7
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2258-1
CVE-2014-4617
Package Information:
https://launchpad.net/ubuntu/+source/gnupg/1.4.16-1ubuntu2.1
https://launchpad.net/ubuntu/+source/gnupg2/2.0.22-3ubuntu1.1
https://launchpad.net/ubuntu/+source/gnupg/1.4.14-1ubuntu2.2
https://launchpad.net/ubuntu/+source/gnupg2/2.0.20-1ubuntu3.1
https://launchpad.net/ubuntu/+source/gnupg/1.4.11-3ubuntu2.6
https://launchpad.net/ubuntu/+source/gnupg2/2.0.17-2ubuntu2.12.04.4
https://launchpad.net/ubuntu/+source/gnupg/1.4.10-2ubuntu1.6
https://launchpad.net/ubuntu/+source/gnupg2/2.0.14-1ubuntu1.7
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140626/ac7b56dc/attachment-0001.pgp>
------------------------------
Message: 3
Date: Fri, 27 Jun 2014 05:00:10 -0400
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2259-1] Linux kernel vulnerabilities
Message-ID: <53AD329A.1030303@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2259-1
June 27, 2014
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux: Linux kernel
Details:
Salva Peir? discovered an information leak in the Linux kernel's media-
device driver. A local attacker could exploit this flaw to obtain sensitive
information from kernel memory. (CVE-2014-1739)
A bounds check error was discovered in the socket filter subsystem of the
Linux kernel. A local user could exploit this flaw to cause a denial of
service (system crash) via crafted BPF instructions. (CVE-2014-3144)
A remainder calculation error was discovered in the socket filter subsystem
of the Linux kernel. A local user could exploit this flaw to cause a denial
of service (system crash) via crafted BPF instructions. (CVE-2014-3145)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.2.0-65-generic 3.2.0-65.98
linux-image-3.2.0-65-generic-pae 3.2.0-65.98
linux-image-3.2.0-65-highbank 3.2.0-65.98
linux-image-3.2.0-65-omap 3.2.0-65.98
linux-image-3.2.0-65-powerpc-smp 3.2.0-65.98
linux-image-3.2.0-65-powerpc64-smp 3.2.0-65.98
linux-image-3.2.0-65-virtual 3.2.0-65.98
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2259-1
CVE-2014-1739, CVE-2014-3144, CVE-2014-3145
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.2.0-65.98
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140627/ba2ff78d/attachment-0001.pgp>
------------------------------
Message: 4
Date: Fri, 27 Jun 2014 05:00:37 -0400
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2260-1] Linux kernel (Trusty HWE) vulnerabilities
Message-ID: <53AD32B5.2030808@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2260-1
June 27, 2014
linux-lts-trusty vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-lts-trusty: Block storage devices (udeb)
Details:
A flaw was discovered in the Linux kernel's pseudo tty (pty) device. An
unprivileged user could exploit this flaw to cause a denial of service
(system crash) or potentially gain administrator privileges.
(CVE-2014-0196)
Pinkie Pie discovered a flaw in the Linux kernel's futex subsystem. An
unprivileged local user could exploit this flaw to cause a denial of
service (system crash) or gain administrative privileges. (CVE-2014-3153)
Matthew Daley reported an information leak in the floppy disk driver of the
Linux kernel. An unprivileged local user could exploit this flaw to obtain
potentially sensitive information from kernel memory. (CVE-2014-1738)
Matthew Daley reported a flaw in the handling of ioctl commands by the
floppy disk driver in the Linux kernel. An unprivileged local user could
exploit this flaw to gain administrative privileges if the floppy disk
module is loaded. (CVE-2014-1737)
A flaw was discovered in the handling of network packets when mergeable
buffers are disabled for virtual machines in the Linux kernel. Guest OS
users may exploit this flaw to cause a denial of service (host OS crash) or
possibly gain privilege on the host OS. (CVE-2014-0077)
An information leak was discovered in the netfilter subsystem of the Linux
kernel. An attacker could exploit this flaw to obtain sensitive information
from kernel memory. (CVE-2014-2568)
A flaw was discovered in the Linux kernel's ping sockets. An unprivileged
local user could exploit this flaw to cause a denial of service (system
crash) or possibly gain privileges via a crafted application.
(CVE-2014-2851)
Sasha Levin reported a bug in the Linux kernel's virtual memory management
subsystem. An unprivileged local user could exploit this flaw to cause a
denial of service (system crash). (CVE-2014-3122)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.13.0-30-generic 3.13.0-30.54~precise2
linux-image-3.13.0-30-generic-lpae 3.13.0-30.54~precise2
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2260-1
CVE-2014-0077, CVE-2014-0196, CVE-2014-1737, CVE-2014-1738,
CVE-2014-2568, CVE-2014-2851, CVE-2014-3122, CVE-2014-3153
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-30.54~precise2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140627/7de2a1fb/attachment-0001.pgp>
------------------------------
Message: 5
Date: Fri, 27 Jun 2014 05:01:09 -0400
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2261-1] Linux kernel (Saucy HWE) vulnerabilities
Message-ID: <53AD32D5.4060204@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2261-1
June 27, 2014
linux-lts-saucy vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-lts-saucy: Linux hardware enablement kernel from Saucy
Details:
Salva Peir? discovered an information leak in the Linux kernel's media-
device driver. A local attacker could exploit this flaw to obtain sensitive
information from kernel memory. (CVE-2014-1739)
A bounds check error was discovered in the socket filter subsystem of the
Linux kernel. A local user could exploit this flaw to cause a denial of
service (system crash) via crafted BPF instructions. (CVE-2014-3144)
A remainder calculation error was discovered in the socket filter subsystem
of the Linux kernel. A local user could exploit this flaw to cause a denial
of service (system crash) via crafted BPF instructions. (CVE-2014-3145)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.11.0-24-generic 3.11.0-24.41~precise1
linux-image-3.11.0-24-generic-lpae 3.11.0-24.41~precise1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2261-1
CVE-2014-1739, CVE-2014-3144, CVE-2014-3145
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-saucy/3.11.0-24.41~precise1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140627/9511b939/attachment.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 117, Issue 15
*********************************************************
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2257-1] Samba vulnerabilities (Marc Deslauriers)
2. [USN-2258-1] GnuPG vulnerability (Marc Deslauriers)
3. [USN-2259-1] Linux kernel vulnerabilities (John Johansen)
4. [USN-2260-1] Linux kernel (Trusty HWE) vulnerabilities
(John Johansen)
5. [USN-2261-1] Linux kernel (Saucy HWE) vulnerabilities
(John Johansen)
----------------------------------------------------------------------
Message: 1
Date: Thu, 26 Jun 2014 14:23:17 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2257-1] Samba vulnerabilities
Message-ID: <53AC6515.7040603@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2257-1
June 26, 2014
samba vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in Samba.
Software Description:
- samba: SMB/CIFS file, print, and login server for Unix
Details:
Christof Schmitt discovered that Samba incorrectly initialized a certain
response field when vfs shadow copy was enabled. A remote authenticated
attacker could use this issue to possibly obtain sensitive information.
This issue only affected Ubuntu 13.10 and Ubuntu 14.04 LTS. (CVE-2014-0178)
It was discovered that the Samba internal DNS server incorrectly handled QR
fields when processing incoming DNS messages. A remote attacker could use
this issue to cause Samba to consume resources, resulting in a denial of
service. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-0239)
Daniel Berteaud discovered that the Samba NetBIOS name service daemon
incorrectly handled certain malformed packets. A remote attacker could use
this issue to cause Samba to consume resources, resulting in a denial of
service. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and
Ubuntu 14.04 LTS. (CVE-2014-0244)
Simon Arlott discovered that Samba incorrectly handled certain unicode path
names. A remote authenticated attacker could use this issue to cause Samba
to stop responding, resulting in a denial of service. (CVE-2014-3493)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
samba 2:4.1.6+dfsg-1ubuntu2.14.04.2
Ubuntu 13.10:
samba 2:3.6.18-1ubuntu3.3
Ubuntu 12.04 LTS:
samba 2:3.6.3-2ubuntu2.11
Ubuntu 10.04 LTS:
samba 2:3.4.7~dfsg-1ubuntu3.15
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2257-1
CVE-2014-0178, CVE-2014-0239, CVE-2014-0244, CVE-2014-3493
Package Information:
https://launchpad.net/ubuntu/+source/samba/2:4.1.6+dfsg-1ubuntu2.14.04.2
https://launchpad.net/ubuntu/+source/samba/2:3.6.18-1ubuntu3.3
https://launchpad.net/ubuntu/+source/samba/2:3.6.3-2ubuntu2.11
https://launchpad.net/ubuntu/+source/samba/2:3.4.7~dfsg-1ubuntu3.15
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140626/edb763d5/attachment-0001.pgp>
------------------------------
Message: 2
Date: Thu, 26 Jun 2014 14:23:48 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2258-1] GnuPG vulnerability
Message-ID: <53AC6534.2050307@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2258-1
June 26, 2014
gnupg, gnupg2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
GnuPG could be made to hang if it processed a specially crafted message.
Software Description:
- gnupg: GNU privacy guard - a free PGP replacement
- gnupg2: GNU privacy guard - a free PGP replacement
Details:
Jean-Ren? Reinhard, Olivier Levillain and Florian Maury discovered that
GnuPG incorrectly handled certain OpenPGP messages. If a user or automated
system were tricked into processing a specially-crafted message, GnuPG
could consume resources, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
gnupg 1.4.16-1ubuntu2.1
gnupg2 2.0.22-3ubuntu1.1
Ubuntu 13.10:
gnupg 1.4.14-1ubuntu2.2
gnupg2 2.0.20-1ubuntu3.1
Ubuntu 12.04 LTS:
gnupg 1.4.11-3ubuntu2.6
gnupg2 2.0.17-2ubuntu2.12.04.4
Ubuntu 10.04 LTS:
gnupg 1.4.10-2ubuntu1.6
gnupg2 2.0.14-1ubuntu1.7
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2258-1
CVE-2014-4617
Package Information:
https://launchpad.net/ubuntu/+source/gnupg/1.4.16-1ubuntu2.1
https://launchpad.net/ubuntu/+source/gnupg2/2.0.22-3ubuntu1.1
https://launchpad.net/ubuntu/+source/gnupg/1.4.14-1ubuntu2.2
https://launchpad.net/ubuntu/+source/gnupg2/2.0.20-1ubuntu3.1
https://launchpad.net/ubuntu/+source/gnupg/1.4.11-3ubuntu2.6
https://launchpad.net/ubuntu/+source/gnupg2/2.0.17-2ubuntu2.12.04.4
https://launchpad.net/ubuntu/+source/gnupg/1.4.10-2ubuntu1.6
https://launchpad.net/ubuntu/+source/gnupg2/2.0.14-1ubuntu1.7
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140626/ac7b56dc/attachment-0001.pgp>
------------------------------
Message: 3
Date: Fri, 27 Jun 2014 05:00:10 -0400
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2259-1] Linux kernel vulnerabilities
Message-ID: <53AD329A.1030303@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2259-1
June 27, 2014
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux: Linux kernel
Details:
Salva Peir? discovered an information leak in the Linux kernel's media-
device driver. A local attacker could exploit this flaw to obtain sensitive
information from kernel memory. (CVE-2014-1739)
A bounds check error was discovered in the socket filter subsystem of the
Linux kernel. A local user could exploit this flaw to cause a denial of
service (system crash) via crafted BPF instructions. (CVE-2014-3144)
A remainder calculation error was discovered in the socket filter subsystem
of the Linux kernel. A local user could exploit this flaw to cause a denial
of service (system crash) via crafted BPF instructions. (CVE-2014-3145)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.2.0-65-generic 3.2.0-65.98
linux-image-3.2.0-65-generic-pae 3.2.0-65.98
linux-image-3.2.0-65-highbank 3.2.0-65.98
linux-image-3.2.0-65-omap 3.2.0-65.98
linux-image-3.2.0-65-powerpc-smp 3.2.0-65.98
linux-image-3.2.0-65-powerpc64-smp 3.2.0-65.98
linux-image-3.2.0-65-virtual 3.2.0-65.98
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2259-1
CVE-2014-1739, CVE-2014-3144, CVE-2014-3145
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.2.0-65.98
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140627/ba2ff78d/attachment-0001.pgp>
------------------------------
Message: 4
Date: Fri, 27 Jun 2014 05:00:37 -0400
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2260-1] Linux kernel (Trusty HWE) vulnerabilities
Message-ID: <53AD32B5.2030808@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2260-1
June 27, 2014
linux-lts-trusty vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-lts-trusty: Block storage devices (udeb)
Details:
A flaw was discovered in the Linux kernel's pseudo tty (pty) device. An
unprivileged user could exploit this flaw to cause a denial of service
(system crash) or potentially gain administrator privileges.
(CVE-2014-0196)
Pinkie Pie discovered a flaw in the Linux kernel's futex subsystem. An
unprivileged local user could exploit this flaw to cause a denial of
service (system crash) or gain administrative privileges. (CVE-2014-3153)
Matthew Daley reported an information leak in the floppy disk driver of the
Linux kernel. An unprivileged local user could exploit this flaw to obtain
potentially sensitive information from kernel memory. (CVE-2014-1738)
Matthew Daley reported a flaw in the handling of ioctl commands by the
floppy disk driver in the Linux kernel. An unprivileged local user could
exploit this flaw to gain administrative privileges if the floppy disk
module is loaded. (CVE-2014-1737)
A flaw was discovered in the handling of network packets when mergeable
buffers are disabled for virtual machines in the Linux kernel. Guest OS
users may exploit this flaw to cause a denial of service (host OS crash) or
possibly gain privilege on the host OS. (CVE-2014-0077)
An information leak was discovered in the netfilter subsystem of the Linux
kernel. An attacker could exploit this flaw to obtain sensitive information
from kernel memory. (CVE-2014-2568)
A flaw was discovered in the Linux kernel's ping sockets. An unprivileged
local user could exploit this flaw to cause a denial of service (system
crash) or possibly gain privileges via a crafted application.
(CVE-2014-2851)
Sasha Levin reported a bug in the Linux kernel's virtual memory management
subsystem. An unprivileged local user could exploit this flaw to cause a
denial of service (system crash). (CVE-2014-3122)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.13.0-30-generic 3.13.0-30.54~precise2
linux-image-3.13.0-30-generic-lpae 3.13.0-30.54~precise2
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2260-1
CVE-2014-0077, CVE-2014-0196, CVE-2014-1737, CVE-2014-1738,
CVE-2014-2568, CVE-2014-2851, CVE-2014-3122, CVE-2014-3153
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-30.54~precise2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140627/7de2a1fb/attachment-0001.pgp>
------------------------------
Message: 5
Date: Fri, 27 Jun 2014 05:01:09 -0400
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2261-1] Linux kernel (Saucy HWE) vulnerabilities
Message-ID: <53AD32D5.4060204@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2261-1
June 27, 2014
linux-lts-saucy vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-lts-saucy: Linux hardware enablement kernel from Saucy
Details:
Salva Peir? discovered an information leak in the Linux kernel's media-
device driver. A local attacker could exploit this flaw to obtain sensitive
information from kernel memory. (CVE-2014-1739)
A bounds check error was discovered in the socket filter subsystem of the
Linux kernel. A local user could exploit this flaw to cause a denial of
service (system crash) via crafted BPF instructions. (CVE-2014-3144)
A remainder calculation error was discovered in the socket filter subsystem
of the Linux kernel. A local user could exploit this flaw to cause a denial
of service (system crash) via crafted BPF instructions. (CVE-2014-3145)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.11.0-24-generic 3.11.0-24.41~precise1
linux-image-3.11.0-24-generic-lpae 3.11.0-24.41~precise1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2261-1
CVE-2014-1739, CVE-2014-3144, CVE-2014-3145
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-saucy/3.11.0-24.41~precise1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140627/9511b939/attachment.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 117, Issue 15
*********************************************************
Thursday, June 26, 2014
ubuntu-security-announce Digest, Vol 117, Issue 14
Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2254-2] PHP updates (Marc Deslauriers)
2. [USN-2255-1] OpenStack Neutron vulnerabilities (Jamie Strandboge)
3. [USN-2256-1] Swift vulnerability (Jamie Strandboge)
----------------------------------------------------------------------
Message: 1
Date: Wed, 25 Jun 2014 15:47:30 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2254-2] PHP updates
Message-ID: <53AB2752.2090603@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2254-2
June 25, 2014
php5 updates
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
Summary:
An improvement was made for PHP FPM environments.
Software Description:
- php5: HTML-embedded scripting language interpreter
Details:
USN-2254-1 fixed vulnerabilities in PHP. The fix for CVE-2014-0185
further restricted the permissions on the PHP FastCGI Process Manager (FPM)
UNIX socket. This update grants socket access to the www-data user and
group so installations and documentation relying on the previous socket
permissions will continue to function.
Original advisory details:
Christian Hoffmann discovered that the PHP FastCGI Process Manager (FPM)
set incorrect permissions on the UNIX socket. A local attacker could use
this issue to possibly elevate their privileges. This issue only affected
Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. (CVE-2014-0185)
Francisco Alonso discovered that the PHP Fileinfo component incorrectly
handled certain CDF documents. A remote attacker could use this issue to
cause PHP to hang or crash, resulting in a denial of service.
(CVE-2014-0237, CVE-2014-0238)
Stefan Esser discovered that PHP incorrectly handled DNS TXT records. A
remote attacker could use this issue to cause PHP to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2014-4049)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
php5-fpm 5.5.9+dfsg-1ubuntu4.2
Ubuntu 13.10:
php5-fpm 5.5.3+dfsg-1ubuntu2.5
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2254-2
http://www.ubuntu.com/usn/usn-2254-1
https://launchpad.net/bugs/1334337
Package Information:
https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.2
https://launchpad.net/ubuntu/+source/php5/5.5.3+dfsg-1ubuntu2.5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140625/43c41ebe/attachment-0001.pgp>
------------------------------
Message: 2
Date: Wed, 25 Jun 2014 16:45:47 -0500
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2255-1] OpenStack Neutron vulnerabilities
Message-ID: <53AB430B.8090403@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2255-1
June 25, 2014
neutron vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
Summary:
Several security issues were fixed in OpenStack Neutron.
Software Description:
- neutron: OpenStack Virtual Network Service
Details:
Darragh O'Reilly discovered that the Ubuntu packaging for OpenStack Neutron
did not properly set up its sudo configuration. If a different flaw was
found in OpenStack Neutron, this vulnerability could be used to escalate
privileges. (CVE-2013-6433)
Stephen Ma and Christoph Thiel discovered that the openvswitch-agent in
OpenStack Neutron did not properly perform input validation when creating
security group rules when specifying --remote-ip-prefix. A remote
authenticated attacker could exploit this to prevent application of
additional rules. (CVE-2014-0187)
Thiago Martins discovered that OpenStack Neutron would inappropriately
apply SNAT rules to IPv6 subnets when using the L3-agent. A remote
authenticated attacker could exploit this to prevent floating IPv4
addresses from being attached throughout the cloud. (CVE-2014-4167)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
python-neutron 1:2014.1-0ubuntu1.3
Ubuntu 13.10:
python-neutron 1:2013.2.3-0ubuntu1.5
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2255-1
CVE-2013-6433, CVE-2014-0187, CVE-2014-4167
Package Information:
https://launchpad.net/ubuntu/+source/neutron/1:2014.1-0ubuntu1.3
https://launchpad.net/ubuntu/+source/neutron/1:2013.2.3-0ubuntu1.5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140625/06767aa8/attachment-0001.pgp>
------------------------------
Message: 3
Date: Wed, 25 Jun 2014 16:56:19 -0500
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2256-1] Swift vulnerability
Message-ID: <53AB4583.9060603@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2256-1
June 25, 2014
swift vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Swift did not properly perform input validation of certain HTTP headers.
Software Description:
- swift: OpenStack distributed virtual object store
Details:
John Dickinson discovered that Swift did not properly quote the
WWW-Authenticate header value. If a user were tricked into navigating to a
malicious Swift URL, an attacker could conduct cross-site scripting
attacks. With cross-site scripting vulnerabilities, if a user were tricked
into viewing server output during a crafted server request, a remote
attacker could exploit this to modify the contents, or steal confidential
data, within the same domain.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
python-swift 1.13.1-0ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2256-1
CVE-2014-3497
Package Information:
https://launchpad.net/ubuntu/+source/swift/1.13.1-0ubuntu1.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140625/63a07421/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 117, Issue 14
*********************************************************
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2254-2] PHP updates (Marc Deslauriers)
2. [USN-2255-1] OpenStack Neutron vulnerabilities (Jamie Strandboge)
3. [USN-2256-1] Swift vulnerability (Jamie Strandboge)
----------------------------------------------------------------------
Message: 1
Date: Wed, 25 Jun 2014 15:47:30 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2254-2] PHP updates
Message-ID: <53AB2752.2090603@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2254-2
June 25, 2014
php5 updates
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
Summary:
An improvement was made for PHP FPM environments.
Software Description:
- php5: HTML-embedded scripting language interpreter
Details:
USN-2254-1 fixed vulnerabilities in PHP. The fix for CVE-2014-0185
further restricted the permissions on the PHP FastCGI Process Manager (FPM)
UNIX socket. This update grants socket access to the www-data user and
group so installations and documentation relying on the previous socket
permissions will continue to function.
Original advisory details:
Christian Hoffmann discovered that the PHP FastCGI Process Manager (FPM)
set incorrect permissions on the UNIX socket. A local attacker could use
this issue to possibly elevate their privileges. This issue only affected
Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. (CVE-2014-0185)
Francisco Alonso discovered that the PHP Fileinfo component incorrectly
handled certain CDF documents. A remote attacker could use this issue to
cause PHP to hang or crash, resulting in a denial of service.
(CVE-2014-0237, CVE-2014-0238)
Stefan Esser discovered that PHP incorrectly handled DNS TXT records. A
remote attacker could use this issue to cause PHP to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2014-4049)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
php5-fpm 5.5.9+dfsg-1ubuntu4.2
Ubuntu 13.10:
php5-fpm 5.5.3+dfsg-1ubuntu2.5
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2254-2
http://www.ubuntu.com/usn/usn-2254-1
https://launchpad.net/bugs/1334337
Package Information:
https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.2
https://launchpad.net/ubuntu/+source/php5/5.5.3+dfsg-1ubuntu2.5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140625/43c41ebe/attachment-0001.pgp>
------------------------------
Message: 2
Date: Wed, 25 Jun 2014 16:45:47 -0500
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2255-1] OpenStack Neutron vulnerabilities
Message-ID: <53AB430B.8090403@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2255-1
June 25, 2014
neutron vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
Summary:
Several security issues were fixed in OpenStack Neutron.
Software Description:
- neutron: OpenStack Virtual Network Service
Details:
Darragh O'Reilly discovered that the Ubuntu packaging for OpenStack Neutron
did not properly set up its sudo configuration. If a different flaw was
found in OpenStack Neutron, this vulnerability could be used to escalate
privileges. (CVE-2013-6433)
Stephen Ma and Christoph Thiel discovered that the openvswitch-agent in
OpenStack Neutron did not properly perform input validation when creating
security group rules when specifying --remote-ip-prefix. A remote
authenticated attacker could exploit this to prevent application of
additional rules. (CVE-2014-0187)
Thiago Martins discovered that OpenStack Neutron would inappropriately
apply SNAT rules to IPv6 subnets when using the L3-agent. A remote
authenticated attacker could exploit this to prevent floating IPv4
addresses from being attached throughout the cloud. (CVE-2014-4167)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
python-neutron 1:2014.1-0ubuntu1.3
Ubuntu 13.10:
python-neutron 1:2013.2.3-0ubuntu1.5
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2255-1
CVE-2013-6433, CVE-2014-0187, CVE-2014-4167
Package Information:
https://launchpad.net/ubuntu/+source/neutron/1:2014.1-0ubuntu1.3
https://launchpad.net/ubuntu/+source/neutron/1:2013.2.3-0ubuntu1.5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140625/06767aa8/attachment-0001.pgp>
------------------------------
Message: 3
Date: Wed, 25 Jun 2014 16:56:19 -0500
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2256-1] Swift vulnerability
Message-ID: <53AB4583.9060603@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2256-1
June 25, 2014
swift vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Swift did not properly perform input validation of certain HTTP headers.
Software Description:
- swift: OpenStack distributed virtual object store
Details:
John Dickinson discovered that Swift did not properly quote the
WWW-Authenticate header value. If a user were tricked into navigating to a
malicious Swift URL, an attacker could conduct cross-site scripting
attacks. With cross-site scripting vulnerabilities, if a user were tricked
into viewing server output during a crafted server request, a remote
attacker could exploit this to modify the contents, or steal confidential
data, within the same domain.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
python-swift 1.13.1-0ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2256-1
CVE-2014-3497
Package Information:
https://launchpad.net/ubuntu/+source/swift/1.13.1-0ubuntu1.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140625/63a07421/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 117, Issue 14
*********************************************************
Wednesday, June 25, 2014
Microsoft Releases Microsoft Update Client for All Windows Versions to Improve Security
View on Mobile Phone | View as Web page |
|
Contact Us
About the commentary -- letters@windowsitpro.com
About technical questions -- forums.windowsitpro.com
About product news -- products@windowsitpro.com
You are subscribed as: boy.blogger@gmail.com. To unsubscribe, click here.
Tuesday, June 24, 2014
ubuntu-security-announce Digest, Vol 117, Issue 13
Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2254-1] PHP vulnerabilities (Marc Deslauriers)
2. [USN-2232-3] OpenSSL regression (Marc Deslauriers)
----------------------------------------------------------------------
Message: 1
Date: Mon, 23 Jun 2014 08:37:54 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2254-1] PHP vulnerabilities
Message-ID: <53A81FA2.9070206@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2254-1
June 23, 2014
php5 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in PHP.
Software Description:
- php5: HTML-embedded scripting language interpreter
Details:
Christian Hoffmann discovered that the PHP FastCGI Process Manager (FPM)
set incorrect permissions on the UNIX socket. A local attacker could use
this issue to possibly elevate their privileges. This issue only affected
Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. (CVE-2014-0185)
Francisco Alonso discovered that the PHP Fileinfo component incorrectly
handled certain CDF documents. A remote attacker could use this issue to
cause PHP to hang or crash, resulting in a denial of service.
(CVE-2014-0237, CVE-2014-0238)
Stefan Esser discovered that PHP incorrectly handled DNS TXT records. A
remote attacker could use this issue to cause PHP to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2014-4049)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.1
php5-cgi 5.5.9+dfsg-1ubuntu4.1
php5-cli 5.5.9+dfsg-1ubuntu4.1
php5-fpm 5.5.9+dfsg-1ubuntu4.1
Ubuntu 13.10:
libapache2-mod-php5 5.5.3+dfsg-1ubuntu2.4
php5-cgi 5.5.3+dfsg-1ubuntu2.4
php5-cli 5.5.3+dfsg-1ubuntu2.4
php5-fpm 5.5.3+dfsg-1ubuntu2.4
Ubuntu 12.04 LTS:
libapache2-mod-php5 5.3.10-1ubuntu3.12
php5-cgi 5.3.10-1ubuntu3.12
php5-cli 5.3.10-1ubuntu3.12
php5-fpm 5.3.10-1ubuntu3.12
Ubuntu 10.04 LTS:
libapache2-mod-php5 5.3.2-1ubuntu4.25
php5-cgi 5.3.2-1ubuntu4.25
php5-cli 5.3.2-1ubuntu4.25
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2254-1
CVE-2014-0185, CVE-2014-0237, CVE-2014-0238, CVE-2014-4049
Package Information:
https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.1
https://launchpad.net/ubuntu/+source/php5/5.5.3+dfsg-1ubuntu2.4
https://launchpad.net/ubuntu/+source/php5/5.3.10-1ubuntu3.12
https://launchpad.net/ubuntu/+source/php5/5.3.2-1ubuntu4.25
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140623/bd313933/attachment-0001.pgp>
------------------------------
Message: 2
Date: Mon, 23 Jun 2014 08:37:29 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2232-3] OpenSSL regression
Message-ID: <53A81F89.2090308@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2232-3
June 23, 2014
openssl regression
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
USN-2232-1 introduced a regression in OpenSSL.
Software Description:
- openssl: Secure Socket Layer (SSL) cryptographic library and tools
Details:
USN-2232-1 fixed vulnerabilities in OpenSSL. The upstream fix for
CVE-2014-0224 caused a regression for certain applications that use
renegotiation, such as PostgreSQL. This update fixes the problem.
Original advisory details:
J?ri Aedla discovered that OpenSSL incorrectly handled invalid DTLS
fragments. A remote attacker could use this issue to cause OpenSSL to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and
Ubuntu 14.04 LTS. (CVE-2014-0195)
Imre Rad discovered that OpenSSL incorrectly handled DTLS recursions. A
remote attacker could use this issue to cause OpenSSL to crash, resulting
in a denial of service. (CVE-2014-0221)
KIKUCHI Masashi discovered that OpenSSL incorrectly handled certain
handshakes. A remote attacker could use this flaw to perform a
man-in-the-middle attack and possibly decrypt and modify traffic.
(CVE-2014-0224)
Felix Gr?bert and Ivan Fratri? discovered that OpenSSL incorrectly handled
anonymous ECDH ciphersuites. A remote attacker could use this issue to
cause OpenSSL to crash, resulting in a denial of service. This issue only
affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS.
(CVE-2014-3470)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libssl1.0.0 1.0.1f-1ubuntu2.4
Ubuntu 13.10:
libssl1.0.0 1.0.1e-3ubuntu1.6
Ubuntu 12.04 LTS:
libssl1.0.0 1.0.1-4ubuntu5.16
Ubuntu 10.04 LTS:
libssl0.9.8 0.9.8k-7ubuntu8.19
After a standard system update you need to reboot your computer to make all
the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2232-3
http://www.ubuntu.com/usn/usn-2232-1
https://launchpad.net/bugs/1332643
Package Information:
https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.4
https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.6
https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.16
https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.19
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140623/eb41a3fc/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 117, Issue 13
*********************************************************
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2254-1] PHP vulnerabilities (Marc Deslauriers)
2. [USN-2232-3] OpenSSL regression (Marc Deslauriers)
----------------------------------------------------------------------
Message: 1
Date: Mon, 23 Jun 2014 08:37:54 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2254-1] PHP vulnerabilities
Message-ID: <53A81FA2.9070206@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2254-1
June 23, 2014
php5 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in PHP.
Software Description:
- php5: HTML-embedded scripting language interpreter
Details:
Christian Hoffmann discovered that the PHP FastCGI Process Manager (FPM)
set incorrect permissions on the UNIX socket. A local attacker could use
this issue to possibly elevate their privileges. This issue only affected
Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. (CVE-2014-0185)
Francisco Alonso discovered that the PHP Fileinfo component incorrectly
handled certain CDF documents. A remote attacker could use this issue to
cause PHP to hang or crash, resulting in a denial of service.
(CVE-2014-0237, CVE-2014-0238)
Stefan Esser discovered that PHP incorrectly handled DNS TXT records. A
remote attacker could use this issue to cause PHP to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2014-4049)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.1
php5-cgi 5.5.9+dfsg-1ubuntu4.1
php5-cli 5.5.9+dfsg-1ubuntu4.1
php5-fpm 5.5.9+dfsg-1ubuntu4.1
Ubuntu 13.10:
libapache2-mod-php5 5.5.3+dfsg-1ubuntu2.4
php5-cgi 5.5.3+dfsg-1ubuntu2.4
php5-cli 5.5.3+dfsg-1ubuntu2.4
php5-fpm 5.5.3+dfsg-1ubuntu2.4
Ubuntu 12.04 LTS:
libapache2-mod-php5 5.3.10-1ubuntu3.12
php5-cgi 5.3.10-1ubuntu3.12
php5-cli 5.3.10-1ubuntu3.12
php5-fpm 5.3.10-1ubuntu3.12
Ubuntu 10.04 LTS:
libapache2-mod-php5 5.3.2-1ubuntu4.25
php5-cgi 5.3.2-1ubuntu4.25
php5-cli 5.3.2-1ubuntu4.25
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2254-1
CVE-2014-0185, CVE-2014-0237, CVE-2014-0238, CVE-2014-4049
Package Information:
https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.1
https://launchpad.net/ubuntu/+source/php5/5.5.3+dfsg-1ubuntu2.4
https://launchpad.net/ubuntu/+source/php5/5.3.10-1ubuntu3.12
https://launchpad.net/ubuntu/+source/php5/5.3.2-1ubuntu4.25
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140623/bd313933/attachment-0001.pgp>
------------------------------
Message: 2
Date: Mon, 23 Jun 2014 08:37:29 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2232-3] OpenSSL regression
Message-ID: <53A81F89.2090308@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2232-3
June 23, 2014
openssl regression
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
USN-2232-1 introduced a regression in OpenSSL.
Software Description:
- openssl: Secure Socket Layer (SSL) cryptographic library and tools
Details:
USN-2232-1 fixed vulnerabilities in OpenSSL. The upstream fix for
CVE-2014-0224 caused a regression for certain applications that use
renegotiation, such as PostgreSQL. This update fixes the problem.
Original advisory details:
J?ri Aedla discovered that OpenSSL incorrectly handled invalid DTLS
fragments. A remote attacker could use this issue to cause OpenSSL to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and
Ubuntu 14.04 LTS. (CVE-2014-0195)
Imre Rad discovered that OpenSSL incorrectly handled DTLS recursions. A
remote attacker could use this issue to cause OpenSSL to crash, resulting
in a denial of service. (CVE-2014-0221)
KIKUCHI Masashi discovered that OpenSSL incorrectly handled certain
handshakes. A remote attacker could use this flaw to perform a
man-in-the-middle attack and possibly decrypt and modify traffic.
(CVE-2014-0224)
Felix Gr?bert and Ivan Fratri? discovered that OpenSSL incorrectly handled
anonymous ECDH ciphersuites. A remote attacker could use this issue to
cause OpenSSL to crash, resulting in a denial of service. This issue only
affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS.
(CVE-2014-3470)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libssl1.0.0 1.0.1f-1ubuntu2.4
Ubuntu 13.10:
libssl1.0.0 1.0.1e-3ubuntu1.6
Ubuntu 12.04 LTS:
libssl1.0.0 1.0.1-4ubuntu5.16
Ubuntu 10.04 LTS:
libssl0.9.8 0.9.8k-7ubuntu8.19
After a standard system update you need to reboot your computer to make all
the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2232-3
http://www.ubuntu.com/usn/usn-2232-1
https://launchpad.net/bugs/1332643
Package Information:
https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.4
https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.6
https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.16
https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.19
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140623/eb41a3fc/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 117, Issue 13
*********************************************************
Monday, June 23, 2014
ubuntu-security-announce Digest, Vol 117, Issue 12
Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2253-1] LibreOffice vulnerability (Marc Deslauriers)
----------------------------------------------------------------------
Message: 1
Date: Mon, 23 Jun 2014 07:24:50 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2253-1] LibreOffice vulnerability
Message-ID: <53A80E82.5000800@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2253-1
June 23, 2014
libreoffice vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
LibreOffice would unconditionally execute certain VBA macros.
Software Description:
- libreoffice: Office productivity suite
Details:
It was discovered that LibreOffice unconditionally executed certain VBA
macros, contrary to user expectations.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libreoffice-core 1:4.2.4-0ubuntu2
After a standard system update you need to restart LibreOffice to makea all
the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2253-1
CVE-2014-0247
Package Information:
https://launchpad.net/ubuntu/+source/libreoffice/1:4.2.4-0ubuntu2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140623/3984b73f/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 117, Issue 12
*********************************************************
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2253-1] LibreOffice vulnerability (Marc Deslauriers)
----------------------------------------------------------------------
Message: 1
Date: Mon, 23 Jun 2014 07:24:50 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2253-1] LibreOffice vulnerability
Message-ID: <53A80E82.5000800@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2253-1
June 23, 2014
libreoffice vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
LibreOffice would unconditionally execute certain VBA macros.
Software Description:
- libreoffice: Office productivity suite
Details:
It was discovered that LibreOffice unconditionally executed certain VBA
macros, contrary to user expectations.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libreoffice-core 1:4.2.4-0ubuntu2
After a standard system update you need to restart LibreOffice to makea all
the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2253-1
CVE-2014-0247
Package Information:
https://launchpad.net/ubuntu/+source/libreoffice/1:4.2.4-0ubuntu2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140623/3984b73f/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 117, Issue 12
*********************************************************
Friday, June 20, 2014
ubuntu-security-announce Digest, Vol 117, Issue 11
Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2250-1] Thunderbird vulnerabilities (Chris Coulson)
2. [USN-2251-1] Linux kernel vulnerabilities (John Johansen)
3. [USN-2252-1] Linux kernel (EC2) vulnerabilities (John Johansen)
4. Ubuntu 13.10 (Saucy Salamander) reaches End of Life on July
17 2014 (Adam Conrad)
----------------------------------------------------------------------
Message: 1
Date: Thu, 19 Jun 2014 12:32:57 +0100
From: Chris Coulson <chris.coulson@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2250-1] Thunderbird vulnerabilities
Message-ID: <53A2CA69.2060005@canonical.com>
Content-Type: text/plain; charset="iso-8859-1"
==========================================================================
Ubuntu Security Notice USN-2250-1
June 19, 2014
thunderbird vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in Thunderbird.
Software Description:
- thunderbird: Mozilla Open Source mail and newsgroup client
Details:
Gary Kwong, Christoph Diehl, Christian Holler, Hannes Verschore, Jan de
Mooij, Ryan VanderMeulen, Jeff Walden and Kyle Huey discovered multiple
memory safety issues in Thunderbird. If a user were tricked in to opening
a specially crafted message with scripting enabled, an attacker could
potentially exploit these to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invoking
Thunderbird. (CVE-2014-1533)
Abhishek Arya discovered multiple use-after-free and out-of-bounds read
issues in Thunderbird. If a user had enabled scripting, an attacker could
potentially exploit these to cause a denial of service via application
crash or execute arbitrary code with the priviliges of the user invoking
Thunderbird. (CVE-2014-1538)
A use-after-free was discovered in the SMIL animation controller. If a
user had enabled scripting, an attacker could potentially exploit this
to cause a denial of service via application crash or execute arbitrary
code with the priviliges of the user invoking Thunderbird. (CVE-2014-1541)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
thunderbird 1:24.6.0+build1-0ubuntu0.14.04.1
Ubuntu 13.10:
thunderbird 1:24.6.0+build1-0ubuntu0.13.10.1
Ubuntu 12.04 LTS:
thunderbird 1:24.6.0+build1-0ubuntu0.12.04.1
After a standard system update you need to restart Thunderbird to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2250-1
CVE-2014-1533, CVE-2014-1538, CVE-2014-1541, https://launchpad.net/bugs/1328003
Package Information:
https://launchpad.net/ubuntu/+source/thunderbird/1:24.6.0+build1-0ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/thunderbird/1:24.6.0+build1-0ubuntu0.13.10.1
https://launchpad.net/ubuntu/+source/thunderbird/1:24.6.0+build1-0ubuntu0.12.04.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 538 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140619/042006b4/attachment-0001.pgp>
------------------------------
Message: 2
Date: Thu, 19 Jun 2014 22:26:23 -0700
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2251-1] Linux kernel vulnerabilities
Message-ID: <53A3C5FF.90700@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2251-1
June 20, 2014
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux: Linux kernel
Details:
A bounds check error was discovered in the socket filter subsystem of the
Linux kernel. A local user could exploit this flaw to cause a denial of
service (system crash) via crafted BPF instructions. (CVE-2014-3144)
A remainder calculation error was discovered in the socket filter subsystem
of the Linux kernel. A local user could exploit this flaw to cause a denial
of service (system crash) via crafted BPF instructions. (CVE-2014-3145)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.04 LTS:
linux-image-2.6.32-62-386 2.6.32-62.125
linux-image-2.6.32-62-generic 2.6.32-62.125
linux-image-2.6.32-62-generic-pae 2.6.32-62.125
linux-image-2.6.32-62-ia64 2.6.32-62.125
linux-image-2.6.32-62-lpia 2.6.32-62.125
linux-image-2.6.32-62-powerpc 2.6.32-62.125
linux-image-2.6.32-62-powerpc-smp 2.6.32-62.125
linux-image-2.6.32-62-powerpc64-smp 2.6.32-62.125
linux-image-2.6.32-62-preempt 2.6.32-62.125
linux-image-2.6.32-62-server 2.6.32-62.125
linux-image-2.6.32-62-sparc64 2.6.32-62.125
linux-image-2.6.32-62-sparc64-smp 2.6.32-62.125
linux-image-2.6.32-62-versatile 2.6.32-62.125
linux-image-2.6.32-62-virtual 2.6.32-62.125
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2251-1
CVE-2014-3144, CVE-2014-3145
Package Information:
https://launchpad.net/ubuntu/+source/linux/2.6.32-62.125
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140619/248a4ed3/attachment-0001.pgp>
------------------------------
Message: 3
Date: Thu, 19 Jun 2014 22:26:51 -0700
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2252-1] Linux kernel (EC2) vulnerabilities
Message-ID: <53A3C61B.7040808@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2252-1
June 20, 2014
linux-ec2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-ec2: Linux kernel for EC2
Details:
A bounds check error was discovered in the socket filter subsystem of the
Linux kernel. A local user could exploit this flaw to cause a denial of
service (system crash) via crafted BPF instructions. (CVE-2014-3144)
A remainder calculation error was discovered in the socket filter subsystem
of the Linux kernel. A local user could exploit this flaw to cause a denial
of service (system crash) via crafted BPF instructions. (CVE-2014-3145)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.04 LTS:
linux-image-2.6.32-366-ec2 2.6.32-366.80
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2252-1
CVE-2014-3144, CVE-2014-3145
Package Information:
https://launchpad.net/ubuntu/+source/linux-ec2/2.6.32-366.80
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140619/3534c5d2/attachment-0001.pgp>
------------------------------
Message: 4
Date: Thu, 19 Jun 2014 23:00:13 -0600
From: Adam Conrad <adconrad@ubuntu.com>
To: ubuntu-announce@lists.ubuntu.com
Cc: ubuntu-security-announce@lists.ubuntu.com
Subject: Ubuntu 13.10 (Saucy Salamander) reaches End of Life on July
17 2014
Message-ID: <20140620050013.GC28005@0c3.net>
Content-Type: text/plain; charset=us-ascii
Ubuntu announced its 13.10 (Saucy Salamander) release almost 9 months
ago, on October 17, 2013. This was the second release with our new 9
month support cycle and, as such, the support period is now nearing
its end and Ubuntu 13.10 will reach end of life on Thursday, July
17th. At that time, Ubuntu Security Notices will no longer include
information or updated packages for Ubuntu 13.10.
The supported upgrade path from Ubuntu 13.10 is via Ubuntu 14.04 LTS.
Instructions and caveats for the upgrade may be found at:
https://help.ubuntu.com/community/TrustyUpgrades
Ubuntu 14.04 LTS continues to be actively supported with security
updates and select high-impact bug fixes. Announcements of security
updates for Ubuntu releases are sent to the ubuntu-security-announce
mailing list, information about which may be found at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Since its launch in October 2004 Ubuntu has become one of the most
highly regarded Linux distributions with millions of users in homes,
schools, businesses and governments around the world. Ubuntu is Open
Source software, costs nothing to download, and users are free to
customise or alter their software in order to meet their needs.
On behalf of the Ubuntu Release Team,
Adam Conrad
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 117, Issue 11
*********************************************************
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2250-1] Thunderbird vulnerabilities (Chris Coulson)
2. [USN-2251-1] Linux kernel vulnerabilities (John Johansen)
3. [USN-2252-1] Linux kernel (EC2) vulnerabilities (John Johansen)
4. Ubuntu 13.10 (Saucy Salamander) reaches End of Life on July
17 2014 (Adam Conrad)
----------------------------------------------------------------------
Message: 1
Date: Thu, 19 Jun 2014 12:32:57 +0100
From: Chris Coulson <chris.coulson@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2250-1] Thunderbird vulnerabilities
Message-ID: <53A2CA69.2060005@canonical.com>
Content-Type: text/plain; charset="iso-8859-1"
==========================================================================
Ubuntu Security Notice USN-2250-1
June 19, 2014
thunderbird vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in Thunderbird.
Software Description:
- thunderbird: Mozilla Open Source mail and newsgroup client
Details:
Gary Kwong, Christoph Diehl, Christian Holler, Hannes Verschore, Jan de
Mooij, Ryan VanderMeulen, Jeff Walden and Kyle Huey discovered multiple
memory safety issues in Thunderbird. If a user were tricked in to opening
a specially crafted message with scripting enabled, an attacker could
potentially exploit these to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invoking
Thunderbird. (CVE-2014-1533)
Abhishek Arya discovered multiple use-after-free and out-of-bounds read
issues in Thunderbird. If a user had enabled scripting, an attacker could
potentially exploit these to cause a denial of service via application
crash or execute arbitrary code with the priviliges of the user invoking
Thunderbird. (CVE-2014-1538)
A use-after-free was discovered in the SMIL animation controller. If a
user had enabled scripting, an attacker could potentially exploit this
to cause a denial of service via application crash or execute arbitrary
code with the priviliges of the user invoking Thunderbird. (CVE-2014-1541)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
thunderbird 1:24.6.0+build1-0ubuntu0.14.04.1
Ubuntu 13.10:
thunderbird 1:24.6.0+build1-0ubuntu0.13.10.1
Ubuntu 12.04 LTS:
thunderbird 1:24.6.0+build1-0ubuntu0.12.04.1
After a standard system update you need to restart Thunderbird to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2250-1
CVE-2014-1533, CVE-2014-1538, CVE-2014-1541, https://launchpad.net/bugs/1328003
Package Information:
https://launchpad.net/ubuntu/+source/thunderbird/1:24.6.0+build1-0ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/thunderbird/1:24.6.0+build1-0ubuntu0.13.10.1
https://launchpad.net/ubuntu/+source/thunderbird/1:24.6.0+build1-0ubuntu0.12.04.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 538 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140619/042006b4/attachment-0001.pgp>
------------------------------
Message: 2
Date: Thu, 19 Jun 2014 22:26:23 -0700
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2251-1] Linux kernel vulnerabilities
Message-ID: <53A3C5FF.90700@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2251-1
June 20, 2014
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux: Linux kernel
Details:
A bounds check error was discovered in the socket filter subsystem of the
Linux kernel. A local user could exploit this flaw to cause a denial of
service (system crash) via crafted BPF instructions. (CVE-2014-3144)
A remainder calculation error was discovered in the socket filter subsystem
of the Linux kernel. A local user could exploit this flaw to cause a denial
of service (system crash) via crafted BPF instructions. (CVE-2014-3145)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.04 LTS:
linux-image-2.6.32-62-386 2.6.32-62.125
linux-image-2.6.32-62-generic 2.6.32-62.125
linux-image-2.6.32-62-generic-pae 2.6.32-62.125
linux-image-2.6.32-62-ia64 2.6.32-62.125
linux-image-2.6.32-62-lpia 2.6.32-62.125
linux-image-2.6.32-62-powerpc 2.6.32-62.125
linux-image-2.6.32-62-powerpc-smp 2.6.32-62.125
linux-image-2.6.32-62-powerpc64-smp 2.6.32-62.125
linux-image-2.6.32-62-preempt 2.6.32-62.125
linux-image-2.6.32-62-server 2.6.32-62.125
linux-image-2.6.32-62-sparc64 2.6.32-62.125
linux-image-2.6.32-62-sparc64-smp 2.6.32-62.125
linux-image-2.6.32-62-versatile 2.6.32-62.125
linux-image-2.6.32-62-virtual 2.6.32-62.125
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2251-1
CVE-2014-3144, CVE-2014-3145
Package Information:
https://launchpad.net/ubuntu/+source/linux/2.6.32-62.125
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140619/248a4ed3/attachment-0001.pgp>
------------------------------
Message: 3
Date: Thu, 19 Jun 2014 22:26:51 -0700
From: John Johansen <john.johansen@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2252-1] Linux kernel (EC2) vulnerabilities
Message-ID: <53A3C61B.7040808@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2252-1
June 20, 2014
linux-ec2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-ec2: Linux kernel for EC2
Details:
A bounds check error was discovered in the socket filter subsystem of the
Linux kernel. A local user could exploit this flaw to cause a denial of
service (system crash) via crafted BPF instructions. (CVE-2014-3144)
A remainder calculation error was discovered in the socket filter subsystem
of the Linux kernel. A local user could exploit this flaw to cause a denial
of service (system crash) via crafted BPF instructions. (CVE-2014-3145)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.04 LTS:
linux-image-2.6.32-366-ec2 2.6.32-366.80
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-2252-1
CVE-2014-3144, CVE-2014-3145
Package Information:
https://launchpad.net/ubuntu/+source/linux-ec2/2.6.32-366.80
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140619/3534c5d2/attachment-0001.pgp>
------------------------------
Message: 4
Date: Thu, 19 Jun 2014 23:00:13 -0600
From: Adam Conrad <adconrad@ubuntu.com>
To: ubuntu-announce@lists.ubuntu.com
Cc: ubuntu-security-announce@lists.ubuntu.com
Subject: Ubuntu 13.10 (Saucy Salamander) reaches End of Life on July
17 2014
Message-ID: <20140620050013.GC28005@0c3.net>
Content-Type: text/plain; charset=us-ascii
Ubuntu announced its 13.10 (Saucy Salamander) release almost 9 months
ago, on October 17, 2013. This was the second release with our new 9
month support cycle and, as such, the support period is now nearing
its end and Ubuntu 13.10 will reach end of life on Thursday, July
17th. At that time, Ubuntu Security Notices will no longer include
information or updated packages for Ubuntu 13.10.
The supported upgrade path from Ubuntu 13.10 is via Ubuntu 14.04 LTS.
Instructions and caveats for the upgrade may be found at:
https://help.ubuntu.com/community/TrustyUpgrades
Ubuntu 14.04 LTS continues to be actively supported with security
updates and select high-impact bug fixes. Announcements of security
updates for Ubuntu releases are sent to the ubuntu-security-announce
mailing list, information about which may be found at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Since its launch in October 2004 Ubuntu has become one of the most
highly regarded Linux distributions with millions of users in homes,
schools, businesses and governments around the world. Ubuntu is Open
Source software, costs nothing to download, and users are free to
customise or alter their software in order to meet their needs.
On behalf of the Ubuntu Release Team,
Adam Conrad
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 117, Issue 11
*********************************************************
Thursday, June 19, 2014
ubuntu-security-announce Digest, Vol 117, Issue 10
Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2248-1] OpenStack Cinder vulnerability (Jamie Strandboge)
2. [USN-2249-1] OpenStack Heat vulnerability (Jamie Strandboge)
----------------------------------------------------------------------
Message: 1
Date: Wed, 18 Jun 2014 12:50:44 -0500
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2248-1] OpenStack Cinder vulnerability
Message-ID: <53A1D174.1000804@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2248-1
June 18, 2014
cinder vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
Summary:
OpenStack Cinder could be made to run programs as an administrator under
certain conditions.
Software Description:
- cinder: OpenStack storage service
Details:
Darragh O'Reilly discovered that the Ubuntu packaging for OpenStack Cinder
did not properly set up its sudo configuration. If a different flaw was
found in OpenStack Cinder, this vulnerability could be used to escalate
privileges. (CVE-2013-1068)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
python-cinder 1:2014.1-0ubuntu1.1
Ubuntu 13.10:
python-cinder 1:2013.2.3-0ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2248-1
CVE-2013-1068
Package Information:
https://launchpad.net/ubuntu/+source/cinder/1:2014.1-0ubuntu1.1
https://launchpad.net/ubuntu/+source/cinder/1:2013.2.3-0ubuntu1.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140618/ff0d3124/attachment-0001.pgp>
------------------------------
Message: 2
Date: Wed, 18 Jun 2014 15:56:24 -0500
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2249-1] OpenStack Heat vulnerability
Message-ID: <53A1FCF8.3010408@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2249-1
June 18, 2014
heat vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
OpenStack Heat would expose sensitive information over the network.
Software Description:
- heat: OpenStack Orchestration Service
Details:
Jason Dunsmore discovered that OpenStack heat did not properly restrict
access to template information. A remote authenticated attacker could
exploit this to see URL provider templates of other tenants for a limited
time.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
python-heat 2014.1-0ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2249-1
CVE-2014-3801
Package Information:
https://launchpad.net/ubuntu/+source/heat/2014.1-0ubuntu1.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140618/054fe416/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 117, Issue 10
*********************************************************
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2248-1] OpenStack Cinder vulnerability (Jamie Strandboge)
2. [USN-2249-1] OpenStack Heat vulnerability (Jamie Strandboge)
----------------------------------------------------------------------
Message: 1
Date: Wed, 18 Jun 2014 12:50:44 -0500
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2248-1] OpenStack Cinder vulnerability
Message-ID: <53A1D174.1000804@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2248-1
June 18, 2014
cinder vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
Summary:
OpenStack Cinder could be made to run programs as an administrator under
certain conditions.
Software Description:
- cinder: OpenStack storage service
Details:
Darragh O'Reilly discovered that the Ubuntu packaging for OpenStack Cinder
did not properly set up its sudo configuration. If a different flaw was
found in OpenStack Cinder, this vulnerability could be used to escalate
privileges. (CVE-2013-1068)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
python-cinder 1:2014.1-0ubuntu1.1
Ubuntu 13.10:
python-cinder 1:2013.2.3-0ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2248-1
CVE-2013-1068
Package Information:
https://launchpad.net/ubuntu/+source/cinder/1:2014.1-0ubuntu1.1
https://launchpad.net/ubuntu/+source/cinder/1:2013.2.3-0ubuntu1.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140618/ff0d3124/attachment-0001.pgp>
------------------------------
Message: 2
Date: Wed, 18 Jun 2014 15:56:24 -0500
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2249-1] OpenStack Heat vulnerability
Message-ID: <53A1FCF8.3010408@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2249-1
June 18, 2014
heat vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
OpenStack Heat would expose sensitive information over the network.
Software Description:
- heat: OpenStack Orchestration Service
Details:
Jason Dunsmore discovered that OpenStack heat did not properly restrict
access to template information. A remote authenticated attacker could
exploit this to see URL provider templates of other tenants for a limited
time.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
python-heat 2014.1-0ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2249-1
CVE-2014-3801
Package Information:
https://launchpad.net/ubuntu/+source/heat/2014.1-0ubuntu1.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140618/054fe416/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 117, Issue 10
*********************************************************
Subscribe to:
Posts (Atom)
Blog Archive
-
▼
2014
(407)
-
▼
June
(21)
- ubuntu-security-announce Digest, Vol 117, Issue 16
- ubuntu-security-announce Digest, Vol 117, Issue 15
- ubuntu-security-announce Digest, Vol 117, Issue 14
- Microsoft Releases Microsoft Update Client for All...
- ubuntu-security-announce Digest, Vol 117, Issue 13
- ubuntu-security-announce Digest, Vol 117, Issue 12
- ubuntu-security-announce Digest, Vol 117, Issue 11
- ubuntu-security-announce Digest, Vol 117, Issue 10
- ubuntu-security-announce Digest, Vol 117, Issue 9
- See where your customers are coming from and where...
- ubuntu-security-announce Digest, Vol 117, Issue 8
- ubuntu-security-announce Digest, Vol 117, Issue 7
- Severe New OpenSSL Vulnerability Reported
- ubuntu-security-announce Digest, Vol 117, Issue 6
- PLEASE OPEN YOU ATTACHMENT AND GET BACK TO ME THANKS
- ubuntu-security-announce Digest, Vol 117, Issue 5
- Collaborate smarter by giving colleagues access to...
- ubuntu-security-announce Digest, Vol 117, Issue 4
- ubuntu-security-announce Digest, Vol 117, Issue 3
- ubuntu-security-announce Digest, Vol 117, Issue 2
- ubuntu-security-announce Digest, Vol 117, Issue 1
-
▼
June
(21)