Ubuntu Security Advisories

USN-4101-1: Firefox vulnerability

1 day 17 hours ago
firefox vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

A local attacker could obtain saved passwords.

Software Description
  • firefox - Mozilla Open Source web browser
Details

It was discovered that passwords could be copied to the clipboard from the "Saved Logins" dialog without entering the master password, even when a master password has been set. A local attacker could potentially exploit this to obtain saved passwords.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
firefox - 68.0.2+build1-0ubuntu0.19.04.1
Ubuntu 18.04 LTS
firefox - 68.0.2+build1-0ubuntu0.18.04.1
Ubuntu 16.04 LTS
firefox - 68.0.2+build1-0ubuntu0.16.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make all the necessary changes.

References

USN-4099-1: nginx vulnerabilities

2 days 20 hours ago
nginx vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

nginx could be made to crash if it received specially crafted network traffic.

Software Description
  • nginx - small, powerful, scalable web/proxy server
Details

Jonathan Looney discovered that nginx incorrectly handled the HTTP/2 implementation. A remote attacker could possibly use this issue to consume resources, leading to a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
nginx-common - 1.15.9-0ubuntu1.1
nginx-core - 1.15.9-0ubuntu1.1
nginx-extras - 1.15.9-0ubuntu1.1
nginx-full - 1.15.9-0ubuntu1.1
nginx-light - 1.15.9-0ubuntu1.1
Ubuntu 18.04 LTS
nginx-common - 1.14.0-0ubuntu1.4
nginx-core - 1.14.0-0ubuntu1.4
nginx-extras - 1.14.0-0ubuntu1.4
nginx-full - 1.14.0-0ubuntu1.4
nginx-light - 1.14.0-0ubuntu1.4
Ubuntu 16.04 LTS
nginx-common - 1.10.3-0ubuntu0.16.04.4
nginx-core - 1.10.3-0ubuntu0.16.04.4
nginx-extras - 1.10.3-0ubuntu0.16.04.4
nginx-full - 1.10.3-0ubuntu0.16.04.4
nginx-light - 1.10.3-0ubuntu0.16.04.4

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-4098-1: wpa_supplicant and hostapd vulnerability

4 days ago
wpa vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
Summary

wpa_supplicant and hostapd could be made to expose sensitive information over the network.

Software Description
  • wpa - client support for WPA and WPA2
Details

It was discovered that wpa_supplicant and hostapd were vulnerable to a side channel attack against EAP-pwd. A remote attacker could possibly use this issue to recover certain passwords.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
hostapd - 2:2.6-21ubuntu3.2
wpasupplicant - 2:2.6-21ubuntu3.2
Ubuntu 18.04 LTS
hostapd - 2:2.6-15ubuntu2.4
wpasupplicant - 2:2.6-15ubuntu2.4

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

References

USN-4097-2: PHP vulnerabilities

4 days 17 hours ago
php5 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM
  • Ubuntu 12.04 ESM
Summary

PHP could be made to crash or execute arbitrary code if it received specially crafted image.

Software Description
  • php5 - HTML-embedded scripting language interpreter
Details

USN-4097-1 fixed several vulnerabilities in php5. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that PHP incorrectly handled certain images. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2019-11041, CVE-2019-11042)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM
libapache2-mod-php5 - 5.5.9+dfsg-1ubuntu4.29+esm5
php5-cgi - 5.5.9+dfsg-1ubuntu4.29+esm5
php5-cli - 5.5.9+dfsg-1ubuntu4.29+esm5
php5-fpm - 5.5.9+dfsg-1ubuntu4.29+esm5
php5-xmlrpc - 5.5.9+dfsg-1ubuntu4.29+esm5
Ubuntu 12.04 ESM
libapache2-mod-php5 - 5.3.10-1ubuntu3.39
php5-cgi - 5.3.10-1ubuntu3.39
php5-cli - 5.3.10-1ubuntu3.39
php5-fpm - 5.3.10-1ubuntu3.39
php5-xmlrpc - 5.3.10-1ubuntu3.39

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-4097-1: PHP vulnerabilities

4 days 19 hours ago
php7.0, php7.2 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

PHP could be made to crash or execute arbitrary code if it received specially crafted image.

Software Description
  • php7.2 - HTML-embedded scripting language interpreter
  • php7.0 - HTML-embedded scripting language interpreter
Details

It was discovered that PHP incorrectly handled certain images. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2019-11041, CVE-2019-11042)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
libapache2-mod-php7.2 - 7.2.19-0ubuntu0.19.04.2
php7.2-cgi - 7.2.19-0ubuntu0.19.04.2
php7.2-cli - 7.2.19-0ubuntu0.19.04.2
php7.2-fpm - 7.2.19-0ubuntu0.19.04.2
php7.2-xmlrpc - 7.2.19-0ubuntu0.19.04.2
Ubuntu 18.04 LTS
libapache2-mod-php7.2 - 7.2.19-0ubuntu0.18.04.2
php7.2-cgi - 7.2.19-0ubuntu0.18.04.2
php7.2-cli - 7.2.19-0ubuntu0.18.04.2
php7.2-fpm - 7.2.19-0ubuntu0.18.04.2
php7.2-xmlrpc - 7.2.19-0ubuntu0.18.04.2
Ubuntu 16.04 LTS
libapache2-mod-php7.0 - 7.0.33-0ubuntu0.16.04.6
php7.0-cgi - 7.0.33-0ubuntu0.16.04.6
php7.0-cli - 7.0.33-0ubuntu0.16.04.6
php7.0-fpm - 7.0.33-0ubuntu0.16.04.6
php7.0-xmlrpc - 7.0.33-0ubuntu0.16.04.6

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-4095-2: Linux kernel (Xenial HWE) vulnerabilities

4 days 20 hours ago
linux-lts-xenial, linux-aws vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM
Summary

Several security issues were fixed in the Linux kernel.

Software Description
  • linux-aws - Linux kernel for Amazon Web Services (AWS) systems
  • linux-lts-xenial - Linux hardware enablement kernel from Xenial for Trusty
Details

USN-4095-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 ESM.

Eli Biham and Lior Neumann discovered that the Bluetooth implementation in the Linux kernel did not properly validate elliptic curve parameters during Diffie-Hellman key exchange in some situations. An attacker could use this to expose sensitive information. (CVE-2018-5383)

It was discovered that a heap buffer overflow existed in the Marvell Wireless LAN device driver for the Linux kernel. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-10126)

Andrei Vlad Lutas and Dan Lutas discovered that some x86 processors incorrectly handle SWAPGS instructions during speculative execution. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-1125)

It was discovered that the ext4 file system implementation in the Linux kernel did not properly zero out memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-11833)

It was discovered that the PowerPC dlpar implementation in the Linux kernel did not properly check for allocation errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-12614)

It was discovered that the Linux kernel on ARM processors allowed a tracing process to modify a syscall after a seccomp decision had been made on that syscall. A local attacker could possibly use this to bypass seccomp restrictions. (CVE-2019-2054)

It was discovered that the Marvell Wireless LAN device driver in the Linux kernel did not properly validate the BSS descriptor. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-3846)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM
linux-image-4.4.0-1050-aws - 4.4.0-1050.54
linux-image-4.4.0-159-generic - 4.4.0-159.187~14.04.1
linux-image-4.4.0-159-generic-lpae - 4.4.0-159.187~14.04.1
linux-image-4.4.0-159-lowlatency - 4.4.0-159.187~14.04.1
linux-image-4.4.0-159-powerpc-e500mc - 4.4.0-159.187~14.04.1
linux-image-4.4.0-159-powerpc-smp - 4.4.0-159.187~14.04.1
linux-image-4.4.0-159-powerpc64-emb - 4.4.0-159.187~14.04.1
linux-image-4.4.0-159-powerpc64-smp - 4.4.0-159.187~14.04.1
linux-image-aws - 4.4.0.1050.51
linux-image-generic-lpae-lts-xenial - 4.4.0.159.140
linux-image-generic-lts-xenial - 4.4.0.159.140
linux-image-lowlatency-lts-xenial - 4.4.0.159.140
linux-image-powerpc-e500mc-lts-xenial - 4.4.0.159.140
linux-image-powerpc-smp-lts-xenial - 4.4.0.159.140
linux-image-powerpc64-emb-lts-xenial - 4.4.0.159.140
linux-image-powerpc64-smp-lts-xenial - 4.4.0.159.140
linux-image-virtual-lts-xenial - 4.4.0.159.140

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

References

USN-4096-1: Linux kernel (AWS) vulnerability

4 days 20 hours ago
linux-aws, linux-aws-hwe vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

The system could be made to expose sensitive information.

Software Description
  • linux-aws - Linux kernel for Amazon Web Services (AWS) systems
  • linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE) systems
Details

Andrei Vlad Lutas and Dan Lutas discovered that some x86 processors incorrectly handle SWAPGS instructions during speculative execution. A local attacker could use this to expose sensitive information (kernel memory).

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
linux-image-5.0.0-1012-aws - 5.0.0-1012.13
linux-image-aws - 5.0.0.1012.12
Ubuntu 18.04 LTS
linux-image-4.15.0-1045-aws - 4.15.0-1045.47
linux-image-aws - 4.15.0.1045.44
Ubuntu 16.04 LTS
linux-image-4.15.0-1045-aws - 4.15.0-1045.47~16.04.1
linux-image-aws-hwe - 4.15.0.1045.45

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

References

USN-4095-1: Linux kernel vulnerabilities

4 days 20 hours ago
linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS
Summary

Several security issues were fixed in the Linux kernel.

Software Description
  • linux - Linux kernel
  • linux-aws - Linux kernel for Amazon Web Services (AWS) systems
  • linux-kvm - Linux kernel for cloud environments
  • linux-raspi2 - Linux kernel for Raspberry Pi 2
  • linux-snapdragon - Linux kernel for Snapdragon processors
Details

Eli Biham and Lior Neumann discovered that the Bluetooth implementation in the Linux kernel did not properly validate elliptic curve parameters during Diffie-Hellman key exchange in some situations. An attacker could use this to expose sensitive information. (CVE-2018-5383)

It was discovered that a heap buffer overflow existed in the Marvell Wireless LAN device driver for the Linux kernel. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-10126)

Andrei Vlad Lutas and Dan Lutas discovered that some x86 processors incorrectly handle SWAPGS instructions during speculative execution. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-1125)

Jann Horn discovered that a race condition existed in the Linux kernel when performing core dumps. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2019-11599)

It was discovered that the PowerPC dlpar implementation in the Linux kernel did not properly check for allocation errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-12614)

Jann Horn discovered that the ptrace implementation in the Linux kernel did not properly record credentials in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. (CVE-2019-13272)

It was discovered that the Marvell Wireless LAN device driver in the Linux kernel did not properly validate the BSS descriptor. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-3846)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04 LTS
linux-image-4.4.0-1054-kvm - 4.4.0-1054.61
linux-image-4.4.0-1090-aws - 4.4.0-1090.101
linux-image-4.4.0-1118-raspi2 - 4.4.0-1118.127
linux-image-4.4.0-1122-snapdragon - 4.4.0-1122.128
linux-image-4.4.0-159-generic - 4.4.0-159.187
linux-image-4.4.0-159-generic-lpae - 4.4.0-159.187
linux-image-4.4.0-159-lowlatency - 4.4.0-159.187
linux-image-4.4.0-159-powerpc-e500mc - 4.4.0-159.187
linux-image-4.4.0-159-powerpc-smp - 4.4.0-159.187
linux-image-4.4.0-159-powerpc64-emb - 4.4.0-159.187
linux-image-4.4.0-159-powerpc64-smp - 4.4.0-159.187
linux-image-aws - 4.4.0.1090.94
linux-image-generic - 4.4.0.159.167
linux-image-generic-lpae - 4.4.0.159.167
linux-image-kvm - 4.4.0.1054.54
linux-image-lowlatency - 4.4.0.159.167
linux-image-powerpc-e500mc - 4.4.0.159.167
linux-image-powerpc-smp - 4.4.0.159.167
linux-image-powerpc64-emb - 4.4.0.159.167
linux-image-powerpc64-smp - 4.4.0.159.167
linux-image-raspi2 - 4.4.0.1118.118
linux-image-snapdragon - 4.4.0.1122.114
linux-image-virtual - 4.4.0.159.167

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

References

USN-4094-1: Linux kernel vulnerabilities

4 days 21 hours ago
linux, linux-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

Several security issues were fixed in the Linux kernel.

Software Description
  • linux - Linux kernel
  • linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
  • linux-gke-4.15 - Linux kernel for Google Container Engine (GKE) systems
  • linux-kvm - Linux kernel for cloud environments
  • linux-oem - Linux kernel for OEM processors
  • linux-oracle - Linux kernel for Oracle Cloud systems
  • linux-raspi2 - Linux kernel for Raspberry Pi 2
  • linux-snapdragon - Linux kernel for Snapdragon processors
  • linux-azure - Linux kernel for Microsoft Azure Cloud systems
  • linux-hwe - Linux hardware enablement (HWE) kernel
Details

It was discovered that the alarmtimer implementation in the Linux kernel contained an integer overflow vulnerability. A local attacker could use this to cause a denial of service. (CVE-2018-13053)

Wen Xu discovered that the XFS filesystem implementation in the Linux kernel did not properly track inode validations. An attacker could use this to construct a malicious XFS image that, when mounted, could cause a denial of service (system crash). (CVE-2018-13093)

Wen Xu discovered that the f2fs file system implementation in the Linux kernel did not properly validate metadata. An attacker could use this to construct a malicious f2fs image that, when mounted, could cause a denial of service (system crash). (CVE-2018-13097, CVE-2018-13099, CVE-2018-13100, CVE-2018-14614, CVE-2018-14616, CVE-2018-13096, CVE-2018-13098, CVE-2018-14615)

Wen Xu and Po-Ning Tseng discovered that btrfs file system implementation in the Linux kernel did not properly validate metadata. An attacker could use this to construct a malicious btrfs image that, when mounted, could cause a denial of service (system crash). (CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613, CVE-2018-14609)

Wen Xu discovered that the HFS+ filesystem implementation in the Linux kernel did not properly handle malformed catalog data in some situations. An attacker could use this to construct a malicious HFS+ image that, when mounted, could cause a denial of service (system crash). (CVE-2018-14617)

Vasily Averin and Pavel Tikhomirov discovered that the cleancache subsystem of the Linux kernel did not properly initialize new files in some situations. A local attacker could use this to expose sensitive information. (CVE-2018-16862)

Hui Peng and Mathias Payer discovered that the USB subsystem in the Linux kernel did not properly handle size checks when handling an extra USB descriptor. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2018-20169)

It was discovered that a use-after-free error existed in the block layer subsystem of the Linux kernel when certain failure conditions occurred. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-20856)

Eli Biham and Lior Neumann discovered that the Bluetooth implementation in the Linux kernel did not properly validate elliptic curve parameters during Diffie-Hellman key exchange in some situations. An attacker could use this to expose sensitive information. (CVE-2018-5383)

It was discovered that a heap buffer overflow existed in the Marvell Wireless LAN device driver for the Linux kernel. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-10126)

Andrei Vlad Lutas and Dan Lutas discovered that some x86 processors incorrectly handle SWAPGS instructions during speculative execution. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-1125)

It was discovered that the PowerPC dlpar implementation in the Linux kernel did not properly check for allocation errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-12614)

It was discovered that a NULL pointer dereference vulnerabilty existed in the Near-field communication (NFC) implementation in the Linux kernel. An attacker could use this to cause a denial of service (system crash). (CVE-2019-12818)

It was discovered that the MDIO bus devices subsystem in the Linux kernel improperly dropped a device reference in an error condition, leading to a use-after-free. An attacker could use this to cause a denial of service (system crash). (CVE-2019-12819)

It was discovered that a NULL pointer dereference vulnerability existed in the Near-field communication (NFC) implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-12984)

Jann Horn discovered a use-after-free vulnerability in the Linux kernel when accessing LDT entries in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-13233)

Jann Horn discovered that the ptrace implementation in the Linux kernel did not properly record credentials in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. (CVE-2019-13272)

It was discovered that the Empia EM28xx DVB USB device driver implementation in the Linux kernel contained a use-after-free vulnerability when disconnecting the device. An attacker could use this to cause a denial of service (system crash). (CVE-2019-2024)

It was discovered that the USB video device class implementation in the Linux kernel did not properly validate control bits, resulting in an out of bounds buffer read. A local attacker could use this to possibly expose sensitive information (kernel memory). (CVE-2019-2101)

It was discovered that the Marvell Wireless LAN device driver in the Linux kernel did not properly validate the BSS descriptor. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-3846)

It was discovered that the Appletalk IP encapsulation driver in the Linux kernel did not properly prevent kernel addresses from being copied to user space. A local attacker with the CAP_NET_ADMIN capability could use this to expose sensitive information. (CVE-2018-20511)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04 LTS
linux-image-4.15.0-1021-oracle - 4.15.0-1021.23
linux-image-4.15.0-1040-gcp - 4.15.0-1040.42
linux-image-4.15.0-1040-gke - 4.15.0-1040.42
linux-image-4.15.0-1042-kvm - 4.15.0-1042.42
linux-image-4.15.0-1043-raspi2 - 4.15.0-1043.46
linux-image-4.15.0-1050-oem - 4.15.0-1050.57
linux-image-4.15.0-1060-snapdragon - 4.15.0-1060.66
linux-image-4.15.0-58-generic - 4.15.0-58.64
linux-image-4.15.0-58-generic-lpae - 4.15.0-58.64
linux-image-4.15.0-58-lowlatency - 4.15.0-58.64
linux-image-gcp - 4.15.0.1040.42
linux-image-generic - 4.15.0.58.60
linux-image-generic-lpae - 4.15.0.58.60
linux-image-gke - 4.15.0.1040.43
linux-image-gke-4.15 - 4.15.0.1040.43
linux-image-kvm - 4.15.0.1042.42
linux-image-lowlatency - 4.15.0.58.60
linux-image-oem - 4.15.0.1050.54
linux-image-oracle - 4.15.0.1021.24
linux-image-powerpc-e500mc - 4.15.0.58.60
linux-image-powerpc-smp - 4.15.0.58.60
linux-image-powerpc64-emb - 4.15.0.58.60
linux-image-powerpc64-smp - 4.15.0.58.60
linux-image-raspi2 - 4.15.0.1043.41
linux-image-snapdragon - 4.15.0.1060.63
linux-image-virtual - 4.15.0.58.60
Ubuntu 16.04 LTS
linux-image-4.15.0-1021-oracle - 4.15.0-1021.23~16.04.1
linux-image-4.15.0-1040-gcp - 4.15.0-1040.42~16.04.1
linux-image-4.15.0-1055-azure - 4.15.0-1055.60
linux-image-4.15.0-58-generic - 4.15.0-58.64~16.04.1
linux-image-4.15.0-58-generic-lpae - 4.15.0-58.64~16.04.1
linux-image-4.15.0-58-lowlatency - 4.15.0-58.64~16.04.1
linux-image-azure - 4.15.0.1055.58
linux-image-gcp - 4.15.0.1040.54
linux-image-generic-hwe-16.04 - 4.15.0.58.79
linux-image-generic-lpae-hwe-16.04 - 4.15.0.58.79
linux-image-gke - 4.15.0.1040.54
linux-image-lowlatency-hwe-16.04 - 4.15.0.58.79
linux-image-oem - 4.15.0.58.79
linux-image-oracle - 4.15.0.1021.15
linux-image-virtual-hwe-16.04 - 4.15.0.58.79

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

References

USN-4093-1: Linux kernel vulnerabilities

4 days 22 hours ago
linux, linux-hwe, linux-azure, linux-gcp, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
Summary

Several security issues were fixed in the Linux kernel.

Software Description
  • linux - Linux kernel
  • linux-azure - Linux kernel for Microsoft Azure Cloud systems
  • linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
  • linux-kvm - Linux kernel for cloud environments
  • linux-raspi2 - Linux kernel for Raspberry Pi 2
  • linux-snapdragon - Linux kernel for Snapdragon processors
  • linux-hwe - Linux hardware enablement (HWE) kernel
Details

It was discovered that a heap buffer overflow existed in the Marvell Wireless LAN device driver for the Linux kernel. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-10126)

Andrei Vlad Lutas and Dan Lutas discovered that some x86 processors incorrectly handle SWAPGS instructions during speculative execution. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-1125)

It was discovered that the PowerPC dlpar implementation in the Linux kernel did not properly check for allocation errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-12614)

It was discovered that a NULL pointer dereference vulnerability existed in the Near-field communication (NFC) implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-12984)

Jann Horn discovered a use-after-free vulnerability in the Linux kernel when accessing LDT entries in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-13233)

Jann Horn discovered that the ptrace implementation in the Linux kernel did not properly record credentials in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. (CVE-2019-13272)

It was discovered that the Marvell Wireless LAN device driver in the Linux kernel did not properly validate the BSS descriptor. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-3846)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
linux-image-5.0.0-1013-gcp - 5.0.0-1013.13
linux-image-5.0.0-1013-kvm - 5.0.0-1013.14
linux-image-5.0.0-1014-azure - 5.0.0-1014.14
linux-image-5.0.0-1014-raspi2 - 5.0.0-1014.14
linux-image-5.0.0-1018-snapdragon - 5.0.0-1018.19
linux-image-5.0.0-25-generic - 5.0.0-25.26
linux-image-5.0.0-25-generic-lpae - 5.0.0-25.26
linux-image-5.0.0-25-lowlatency - 5.0.0-25.26
linux-image-azure - 5.0.0.1014.13
linux-image-gcp - 5.0.0.1013.13
linux-image-generic - 5.0.0.25.26
linux-image-generic-lpae - 5.0.0.25.26
linux-image-gke - 5.0.0.1013.13
linux-image-kvm - 5.0.0.1013.13
linux-image-lowlatency - 5.0.0.25.26
linux-image-raspi2 - 5.0.0.1014.11
linux-image-snapdragon - 5.0.0.1018.11
linux-image-virtual - 5.0.0.25.26
Ubuntu 18.04 LTS
linux-image-5.0.0-1014-azure - 5.0.0-1014.14~18.04.1
linux-image-5.0.0-25-generic - 5.0.0-25.26~18.04.1
linux-image-5.0.0-25-generic-lpae - 5.0.0-25.26~18.04.1
linux-image-5.0.0-25-lowlatency - 5.0.0-25.26~18.04.1
linux-image-azure - 5.0.0.1014.25
linux-image-generic-hwe-18.04 - 5.0.0.25.82
linux-image-generic-lpae-hwe-18.04 - 5.0.0.25.82
linux-image-lowlatency-hwe-18.04 - 5.0.0.25.82
linux-image-snapdragon-hwe-18.04 - 5.0.0.25.82
linux-image-virtual-hwe-18.04 - 5.0.0.25.82

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

References

USN-4070-3: MariaDB vulnerabilities

5 days 1 hour ago
MariaDB vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
Summary

Several security issues were fixed in MariaDB.

Software Description
  • mariadb-10.3 - MariaDB database
Details

USN-4070-1 fixed multiple vulnerabilities in MySQL. This update provides the corresponding fixes for CVE-2019-2737, CVE-2019-2739, CVE-2019-2740, CVE-2019-2758, CVE-2019-2805, CVE-2019-2628, CVE-2019-2627, CVE-2019-2614 in MariaDB 10.3.

Ubuntu 19.04 has been updated to MariaDB 10.3.17.

In addition to security fixes, the updated package contain bug fixes, new features, and possibly incompatible changes.

Please see the following for more information: https://mariadb.com/kb/en/library/mariadb-10317-changelog/ https://mariadb.com/kb/en/library/mariadb-10317-release-notes/

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes a new upstream MySQL version to fix these issues.

Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 19.04 have been updated to MySQL 5.7.27.

In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.

Please see the following for more information: http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-27.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
libmariadb-dev - 1:10.3.17-0ubuntu0.19.04.1
libmariadb-dev-compat - 1:10.3.17-0ubuntu0.19.04.1
libmariadb3 - 1:10.3.17-0ubuntu0.19.04.1
libmariadbclient-dev - 1:10.3.17-0ubuntu0.19.04.1
libmariadbd-dev - 1:10.3.17-0ubuntu0.19.04.1
libmariadbd19 - 1:10.3.17-0ubuntu0.19.04.1
mariadb-backup - 1:10.3.17-0ubuntu0.19.04.1
mariadb-client - 1:10.3.17-0ubuntu0.19.04.1
mariadb-client-10.3 - 1:10.3.17-0ubuntu0.19.04.1
mariadb-client-core-10.3 - 1:10.3.17-0ubuntu0.19.04.1
mariadb-common - 1:10.3.17-0ubuntu0.19.04.1
mariadb-plugin-connect - 1:10.3.17-0ubuntu0.19.04.1
mariadb-plugin-cracklib-password-check - 1:10.3.17-0ubuntu0.19.04.1
mariadb-plugin-gssapi-client - 1:10.3.17-0ubuntu0.19.04.1
mariadb-plugin-gssapi-server - 1:10.3.17-0ubuntu0.19.04.1
mariadb-plugin-mroonga - 1:10.3.17-0ubuntu0.19.04.1
mariadb-plugin-oqgraph - 1:10.3.17-0ubuntu0.19.04.1
mariadb-plugin-rocksdb - 1:10.3.17-0ubuntu0.19.04.1
mariadb-plugin-spider - 1:10.3.17-0ubuntu0.19.04.1
mariadb-plugin-tokudb - 1:10.3.17-0ubuntu0.19.04.1
mariadb-server - 1:10.3.17-0ubuntu0.19.04.1
mariadb-server-10.3 - 1:10.3.17-0ubuntu0.19.04.1
mariadb-server-core-10.3 - 1:10.3.17-0ubuntu0.19.04.1
mariadb-test - 1:10.3.17-0ubuntu0.19.04.1
mariadb-test-data - 1:10.3.17-0ubuntu0.19.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional bug fixes. In general, a standard system update will make all the necessary changes.

References

USN-4070-2: MariaDB vulnerabilities

5 days 17 hours ago
MariaDB vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.04 LTS
Summary

Several security issues were fixed in MariaDB

Software Description
  • mariadb-10.1 - MariaDB database
Details

USN-4070-1 fixed multiple vulnerabilities in MySQL. This update provides the corresponding fixes for CVE-2019-2737, CVE-2019-2739, CVE-2019-2740, CVE-2019-2805 in MariaDB 10.1.

Ubuntu 18.04 LTS has been updated to MariaDB 10.1.41.

In addition to security fixes, the updated package contain bug fixes, new features, and possibly incompatible changes.

Please see the following for more information: https://mariadb.com/kb/en/library/mariadb-10141-changelog/ https://mariadb.com/kb/en/library/mariadb-10141-release-notes/

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes a new upstream MySQL version to fix these issues.

Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 19.04 have been updated to MySQL 5.7.27.

In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.

Please see the following for more information: http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-27.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04 LTS
libmariadbclient-dev - 1:10.1.41-0ubuntu0.18.04.1
libmariadbclient-dev-compat - 1:10.1.41-0ubuntu0.18.04.1
libmariadbclient18 - 1:10.1.41-0ubuntu0.18.04.1
libmariadbd-dev - 1:10.1.41-0ubuntu0.18.04.1
libmariadbd18 - 1:10.1.41-0ubuntu0.18.04.1
mariadb-client - 1:10.1.41-0ubuntu0.18.04.1
mariadb-client-10.1 - 1:10.1.41-0ubuntu0.18.04.1
mariadb-client-core-10.1 - 1:10.1.41-0ubuntu0.18.04.1
mariadb-common - 1:10.1.41-0ubuntu0.18.04.1
mariadb-plugin-connect - 1:10.1.41-0ubuntu0.18.04.1
mariadb-plugin-cracklib-password-check - 1:10.1.41-0ubuntu0.18.04.1
mariadb-plugin-gssapi-client - 1:10.1.41-0ubuntu0.18.04.1
mariadb-plugin-gssapi-server - 1:10.1.41-0ubuntu0.18.04.1
mariadb-plugin-mroonga - 1:10.1.41-0ubuntu0.18.04.1
mariadb-plugin-oqgraph - 1:10.1.41-0ubuntu0.18.04.1
mariadb-plugin-spider - 1:10.1.41-0ubuntu0.18.04.1
mariadb-plugin-tokudb - 1:10.1.41-0ubuntu0.18.04.1
mariadb-server - 1:10.1.41-0ubuntu0.18.04.1
mariadb-server-10.1 - 1:10.1.41-0ubuntu0.18.04.1
mariadb-server-core-10.1 - 1:10.1.41-0ubuntu0.18.04.1
mariadb-test - 1:10.1.41-0ubuntu0.18.04.1
mariadb-test-data - 1:10.1.41-0ubuntu0.18.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional bug fixes. In general, a standard system update will make all the necessary changes.

References

USN-4092-1: Ghostscript vulnerability

5 days 23 hours ago
ghostscript vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

Ghostscript could be made to access files if it opened a specially crafted file.

Software Description
  • ghostscript - PostScript and PDF interpreter
Details

Netanel Fisher discovered that the font handler in Ghostscript did not properly restrict privileged calls when ‘-dSAFER’ restrictions were in effect. If a user or automated system were tricked into processing a specially crafted file, a remote attacker could possibly use this issue to access arbitrary files.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
ghostscript - 9.26~dfsg+0-0ubuntu7.2
libgs9 - 9.26~dfsg+0-0ubuntu7.2
Ubuntu 18.04 LTS
ghostscript - 9.26~dfsg+0-0ubuntu0.18.04.10
libgs9 - 9.26~dfsg+0-0ubuntu0.18.04.10
Ubuntu 16.04 LTS
ghostscript - 9.26~dfsg+0-0ubuntu0.16.04.10
libgs9 - 9.26~dfsg+0-0ubuntu0.16.04.10

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-4091-1: poppler vulnerability

6 days 1 hour ago
poppler vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
Summary

poppler could be made to crash if it received specially crafted PDF.

Software Description
  • poppler - PDF rendering library
Details

It was discovered that poppler incorrectly handled certain PDF files. An attacker could possibly use this issue to cause a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
libpoppler85 - 0.74.0-0ubuntu1.3
poppler-utils - 0.74.0-0ubuntu1.3
Ubuntu 18.04 LTS
libpoppler73 - 0.62.0-2ubuntu2.10
poppler-utils - 0.62.0-2ubuntu2.10

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-4090-1: PostgreSQL vulnerabilities

1 week 2 days ago
postgresql-10, postgresql-11, postgresql-9.5 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

Several security issues were fixed in PostgreSQL.

Software Description
  • postgresql-11 - Object-relational SQL database
  • postgresql-10 - Object-relational SQL database
  • postgresql-9.5 - Object-relational SQL database
Details

Tom Lane discovered that PostgreSQL did not properly restrict functions declared as "SECURITY DEFINER". An attacker could use this to execute arbitrary SQL with the permissions of the function owner. (CVE-2019-10208)

Andreas Seltenreich discovered that PostgreSQL did not properly handle user-defined hash equality operators. An attacker could use this to expose sensitive information (arbitrary PostgreSQL server memory). This issue only affected Ubuntu 19.04. (CVE-2019-10209)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
postgresql-11 - 11.5-0ubuntu0.19.04.1
Ubuntu 18.04 LTS
postgresql-10 - 10.10-0ubuntu0.18.04.1
Ubuntu 16.04 LTS
postgresql-9.5 - 9.5.19-0ubuntu0.16.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart PostgreSQL to make all the necessary changes.

References

USN-4089-1: Rack vulnerability

1 week 3 days ago
ruby-rack vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
Summary

Rack could allow cross-site scripting (XSS) attacks.

Software Description
  • ruby-rack - modular Ruby webserver interface
Details

It was discovered that Rack incorrectly handled carefully crafted requests. A remote attacker could use this issue to execute a cross-site scripting (XSS) attack.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04 LTS
ruby-rack - 1.6.4-4ubuntu0.1
Ubuntu 16.04 LTS
ruby-rack - 1.6.4-3ubuntu0.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-4088-1: PHP vulnerability

1 week 3 days ago
php5 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM
  • Ubuntu 12.04 ESM
Summary

PHP could be made to denial of service, expose sensitive information or execute arbitrary code if it received a specially crafted regular expression.

Software Description
  • php5 - HTML-embedded scripting language interpreter
Details

It was discovered that PHP incorrectly handled certain regular expressions. An attacker could possibly use this issue to expose sensitive information, cause a denial of service or execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM
libapache2-mod-php5 - 5.5.9+dfsg-1ubuntu4.29+esm4
php5-cgi - 5.5.9+dfsg-1ubuntu4.29+esm4
php5-cli - 5.5.9+dfsg-1ubuntu4.29+esm4
php5-fpm - 5.5.9+dfsg-1ubuntu4.29+esm4
php5-xmlrpc - 5.5.9+dfsg-1ubuntu4.29+esm4
Ubuntu 12.04 ESM
libapache2-mod-php5 - 5.3.10-1ubuntu3.38
php5-cgi - 5.3.10-1ubuntu3.38
php5-cli - 5.3.10-1ubuntu3.38
php5-fpm - 5.3.10-1ubuntu3.38
php5-xmlrpc - 5.3.10-1ubuntu3.38

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-4087-1: BWA vulnerability

1 week 4 days ago
BWA vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.04 LTS
Summary

BWA could be made to crash or run programs as your login if it opened a specially crafted file.

Software Description
  • bwa - Software package for mapping DNA sequences against a large reference genome
Details

It was discovered that Burrows-Wheeler Aligner (BWA) mishandled certain crafted .alt files. An attacker could use this vulnerability to cause a denial of service (crash) or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
bwa - 0.7.17-3~ubuntu0.19.04.1
Ubuntu 18.04 LTS
bwa - 0.7.17-1ubuntu0.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-4086-1: Mercurial vulnerability

1 week 4 days ago
Mercurial vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
Summary

Mercurial could be made to overwrite files.

Software Description
  • mercurial - easy-to-use, scalable distributed version control system
Details

It was discovered that Mercurial mishandled symlinks in subrepositories. An attacker could use this vulnerability to write arbitrary files to the target’s filesystem.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
mercurial - 4.8.2-1ubuntu3.19.04.1
mercurial-common - 4.8.2-1ubuntu3.19.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

USN-4049-4: GLib regression

1 week 5 days ago
glib2.0 regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM
  • Ubuntu 12.04 ESM
Summary

USN-4049-1 introduced a regression in GLib.

Software Description
  • glib2.0 - GLib Input, Output and Streaming Library (fam module)
Details

USN-4049-1 fixed a vulnerability in GLib. The update introduced a regression. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that GLib created directories and files without properly restricting permissions. An attacker could possibly use this issue to access sensitive information.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM
libglib2.0-0 - 2.40.2-0ubuntu1.1+esm3
libglib2.0-bin - 2.40.2-0ubuntu1.1+esm3
Ubuntu 12.04 ESM
libglib2.0-0 - 2.32.4-0ubuntu1.4
libglib2.0-bin - 2.32.4-0ubuntu1.4

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Checked
1 hour 42 minutes ago