News

Thursday, July 24, 2014

ubuntu-security-announce Digest, Vol 118, Issue 14

Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com

To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com

You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com

When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."


Today's Topics:

1. [USN-2298-1] Oxide vulnerabilities (Chris Coulson)
2. [USN-2299-1] Apache HTTP Server vulnerabilities (Marc Deslauriers)


----------------------------------------------------------------------

Message: 1
Date: Wed, 23 Jul 2014 21:13:02 +0100
From: Chris Coulson <chris.coulson@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2298-1] Oxide vulnerabilities
Message-ID: <53D0174E.7060001@canonical.com>
Content-Type: text/plain; charset="windows-1252"

==========================================================================
Ubuntu Security Notice USN-2298-1
July 23, 2014

oxide-qt vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Oxide.

Software Description:
- oxide-qt: Web browser engine library for Qt

Details:

A type confusion bug was discovered in V8. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to cause a denial of service via renderer crash, or execute arbitrary
code with the privileges of the sandboxed render process. (CVE-2014-1730)

A type confusion bug was discovered in Blink. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to cause a denial of service via renderer crash, or execute arbitrary
code with the privileges of the sandboxed render process. (CVE-2014-1731)

Multiple security issues including memory safety bugs were discovered in
Chromium. If a user were tricked in to opening a specially crafted website,
an attacker could potentially exploit these to cause a denial of service via
application crash or execute arbitrary code with the privileges of the
user invoking the program. (CVE-2014-1735, CVE-2014-3162)

Multiple use-after-free issues were discovered in the WebSockets
implementation. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit these to cause a denial of
service via application crash or execute arbitrary code with the
privileges of the user invoking the program. (CVE-2014-1740)

Multiple integer overflows were discovered in CharacterData
implementation. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit these to cause a denial of
service via renderer crash or execute arbitrary code with the privileges
of the sandboxed render process. (CVE-2014-1741)

Multiple use-after-free issues were discovered in Blink. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service via renderer crash
or execute arbitrary code with the privileges of the sandboxed render
process. (CVE-2014-1742, CVE-2014-1743)

An integer overflow bug was discovered in Chromium. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via application
crash or execute arbitrary code with the privileges of the user invoking
the program. (CVE-2014-1744)

An out-of-bounds read was discovered in Chromium. If a user were tricked
in to opening a specially crafter website, an attacker could potentially
exploit this to cause a denial of service via application crash.
(CVE-2014-1746)

It was discovered that Blink allowed scrollbar painting to extend in to
the parent frame in some circumstances. An attacker could potentially
exploit this to conduct clickjacking attacks via UI redress.
(CVE-2014-1748)

An integer underflow was discovered in Blink. If a user were tricked in to
opening a specially crafter website, an attacker could potentially exploit
this to cause a denial of service via renderer crash or execute arbitrary
code with the privileges of the sandboxed render process. (CVE-2014-3152)

A use-after-free was discovered in Chromium. If a use were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to cause a denial of service via renderer crash or execute arbitrary
code with the privileges of the sandboxed render process.
(CVE-2014-3154)

A security issue was discovered in the SPDY implementation. An attacker
could potentially exploit this to cause a denial of service via
application crash or execute arbitrary code with the privileges of the
user invoking the program. (CVE-2014-3155)

A heap overflow was discovered in Chromium. If a use were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to cause a denial of service via renderer crash or execute arbitrary
code with the privileges of the sandboxed render process. (CVE-2014-3157)

It was discovered that Blink did not enforce security rules for
subresource loading in SVG images. If a user opened a site that embedded a
specially crafted image, an attacker could exploit this to log page views.
(CVE-2014-3160)

It was discovered that the SpeechInput feature in Blink could be activated
without consent or any visible indication. If a user were tricked in to
opening a specially crafted website, an attacker could exploit this to
eavesdrop on the user. (CVE-2014-3803)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
liboxideqtcore0 1.0.4-0ubuntu0.14.04.1
oxideqt-codecs 1.0.4-0ubuntu0.14.04.1
oxideqt-codecs-extra 1.0.4-0ubuntu0.14.04.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2298-1
CVE-2014-1730, CVE-2014-1731, CVE-2014-1735, CVE-2014-1740,
CVE-2014-1741, CVE-2014-1742, CVE-2014-1743, CVE-2014-1744,
CVE-2014-1746, CVE-2014-1748, CVE-2014-3152, CVE-2014-3154,
CVE-2014-3155, CVE-2014-3157, CVE-2014-3160, CVE-2014-3162,
CVE-2014-3803, https://launchpad.net/bugs/1337301

Package Information:
https://launchpad.net/ubuntu/+source/oxide-qt/1.0.4-0ubuntu0.14.04.1


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 473 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140723/d571f295/attachment-0001.pgp>

------------------------------

Message: 2
Date: Wed, 23 Jul 2014 16:29:08 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2299-1] Apache HTTP Server vulnerabilities
Message-ID: <53D01B14.9010008@canonical.com>
Content-Type: text/plain; charset="utf-8"

==========================================================================
Ubuntu Security Notice USN-2299-1
July 23, 2014

apache2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in Apache HTTP Server.

Software Description:
- apache2: Apache HTTP server

Details:

Marek Kroemeke discovered that the mod_proxy module incorrectly handled
certain requests. A remote attacker could use this issue to cause the
server to stop responding, leading to a denial of service. This issue only
affected Ubuntu 14.04 LTS. (CVE-2014-0117)

Giancarlo Pellegrino and Davide Balzarotti discovered that the mod_deflate
module incorrectly handled body decompression. A remote attacker could use
this issue to cause resource consumption, leading to a denial of service.
(CVE-2014-0118)

Marek Kroemeke and others discovered that the mod_status module incorrectly
handled certain requests. A remote attacker could use this issue to cause
the server to stop responding, leading to a denial of service, or possibly
execute arbitrary code. (CVE-2014-0226)

Rainer Jung discovered that the mod_cgid module incorrectly handled certain
scripts. A remote attacker could use this issue to cause the server to stop
responding, leading to a denial of service. (CVE-2014-0231)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
apache2-bin 2.4.7-1ubuntu4.1

Ubuntu 12.04 LTS:
apache2.2-bin 2.2.22-1ubuntu1.7

Ubuntu 10.04 LTS:
apache2.2-bin 2.2.14-5ubuntu8.14

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2299-1
CVE-2014-0117, CVE-2014-0118, CVE-2014-0226, CVE-2014-0231

Package Information:
https://launchpad.net/ubuntu/+source/apache2/2.4.7-1ubuntu4.1
https://launchpad.net/ubuntu/+source/apache2/2.2.22-1ubuntu1.7
https://launchpad.net/ubuntu/+source/apache2/2.2.14-5ubuntu8.14


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140723/185a0e5d/attachment-0001.pgp>

------------------------------

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


End of ubuntu-security-announce Digest, Vol 118, Issue 14
*********************************************************

No comments:

Blog Archive