Ubuntu 6592 Published by

The following security updates are available for Ubuntu 14.04 LTS, 16.04 LTS, and 17.04:

USN-3397-1: strongSwan vulnerability
USN-3398-1: graphite2 vulnerabilities
USN-3399-1: cvs vulnerability



USN-3397-1: strongSwan vulnerability


==========================================================================
Ubuntu Security Notice USN-3397-1
August 21, 2017

strongswan vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

strongSwan could be made to crash or hang if it received specially
crafted network traffic.

Software Description:
- strongswan: IPsec VPN solution

Details:

It was discovered that strongSwan incorrectly handled verifying
specific RSA signatures. A remote attacker could use this issue
to cause strongSwan to crash, resulting in a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
  libstrongswan                   5.5.1-1ubuntu3.2
  strongswan                      5.5.1-1ubuntu3.2

Ubuntu 16.04 LTS:
  libstrongswan                   5.3.5-1ubuntu3.4
  strongswan                      5.3.5-1ubuntu3.4

Ubuntu 14.04 LTS:
  libstrongswan                   5.1.2-0ubuntu2.7
  strongswan                      5.1.2-0ubuntu2.7

In general, a standard system update will make all the necessary
changes.

References:
  https://www.ubuntu.com/usn/usn-3397-1
  CVE-2017-11185

Package Information:
  https://launchpad.net/ubuntu/+source/strongswan/5.5.1-1ubuntu3.2
  https://launchpad.net/ubuntu/+source/strongswan/5.3.5-1ubuntu3.4
  https://launchpad.net/ubuntu/+source/strongswan/5.1.2-0ubuntu2.7

USN-3398-1: graphite2 vulnerabilities


==========================================================================
Ubuntu Security Notice USN-3398-1
August 21, 2017

graphite2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

graphite2 could be made to crash or run programs if it opened a specially
crafted font.

Software Description:
- graphite2: Font rendering engine for Complex Scripts

Details:

Holger Fuhrmannek and Tyson Smith discovered that graphite2 incorrectly
handled certain malformed fonts. If a user or automated system were tricked
into opening a specially-crafted font file, a remote attacker could use
this issue to cause graphite2 to crash, resulting in a denial of service,
or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
libgraphite2-3 1.3.10-0ubuntu0.17.04.1

Ubuntu 16.04 LTS:
libgraphite2-3 1.3.10-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
libgraphite2-3 1.3.10-0ubuntu0.14.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart applications
using graphite2, such as LibreOffice, to make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3398-1
CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774,
CVE-2017-7775, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778

Package Information:
https://launchpad.net/ubuntu/+source/graphite2/1.3.10-0ubuntu0.17.04.1
https://launchpad.net/ubuntu/+source/graphite2/1.3.10-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/graphite2/1.3.10-0ubuntu0.14.04.1

USN-3399-1: cvs vulnerability


==========================================================================
Ubuntu Security Notice USN-3399-1
August 21, 2017

cvs vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

cvs could be made run programs as your login if it opened a
specially crafted cvs repository.

Software Description:
- cvs: Concurrent Versions System

Details:

Hank Leininger discovered that cvs did not properly handle SSH
for remote repositories. A remote attacker could use this to
construct a cvs repository that when accessed could run arbitrary
code with the privileges of the user.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
cvs2:1.12.13+real-22ubuntu0.1

Ubuntu 16.04 LTS:
cvs2:1.12.13+real-15ubuntu0.1

Ubuntu 14.04 LTS:
cvs2:1.12.13+real-12ubuntu0.1

In general, a standard system update will make all the necessary
changes.

References:
  https://www.ubuntu.com/usn/usn-3399-1
  CVE-2017-12836

Package Information:
  https://launchpad.net/ubuntu/+source/cvs/2:1.12.13+real-22ubuntu0.1
  https://launchpad.net/ubuntu/+source/cvs/2:1.12.13+real-15ubuntu0.1
  https://launchpad.net/ubuntu/+source/cvs/2:1.12.13+real-12ubuntu0.1