The following updates has been released for Ubuntu Linux:
USN-3664-2: Apport vulnerability
Sander Bos reported that Ubuntu 14.04 LTS was also vulnerable to this issue, but was incorrectly omitted from the previous updates. This update provides the corresponding update
for Ubuntu 14.04 LTS.
USN-3669-1: Liblouis vulnerabilities
It was discovered that Liblouis incorrectly handled certain files. 1) An attacker could possibly use this to cause a denial of service. Ubuntu 18.04 LTS only (CVE-2018-11410). 2) An attacker could possibly use this to execute arbitrary code. (CVE-2018-11440). 3) An attacker could possibly use this to cause a denial of service or execute arbitrary code. (CVE-2018-11577).
Updated packages are available for Ubuntu Linux 14.04 LTS, 16.04 LTS, 17.10, and 18.04 LTS
USN-3664-2: Apport vulnerability
Sander Bos reported that Ubuntu 14.04 LTS was also vulnerable to this issue, but was incorrectly omitted from the previous updates. This update provides the corresponding update
for Ubuntu 14.04 LTS.
USN-3669-1: Liblouis vulnerabilities
It was discovered that Liblouis incorrectly handled certain files. 1) An attacker could possibly use this to cause a denial of service. Ubuntu 18.04 LTS only (CVE-2018-11410). 2) An attacker could possibly use this to execute arbitrary code. (CVE-2018-11440). 3) An attacker could possibly use this to cause a denial of service or execute arbitrary code. (CVE-2018-11577).
Updated packages are available for Ubuntu Linux 14.04 LTS, 16.04 LTS, 17.10, and 18.04 LTS
USN-3664-2: Apport vulnerability
==========================================================================
Ubuntu Security Notice USN-3664-2
June 04, 2018
apport vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Apport could be tricked into causing a denial of service or escalate
privileges.
Software Description:
- apport: automatically generate crash reports for debugging
Details:
USN-3664-1 fixed a vulnerability in Apport. Sander Bos reported that Ubuntu
14.04 LTS was also vulnerable to this issue, but was incorrectly omitted
from the previous updates. This update provides the corresponding update
for Ubuntu 14.04 LTS.
Original advisory details:
Sander Bos discovered that Apport incorrectly handled core dumps when
certain files are missing from /proc. A local attacker could possibly use
this issue to cause a denial of service, gain root privileges, or escape
from containers.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
apport 2.14.1-0ubuntu3.29
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3664-2
https://usn.ubuntu.com/usn/usn-3664-1
CVE-2018-6552
Package Information:
https://launchpad.net/ubuntu/+source/apport/2.14.1-0ubuntu3.29
USN-3669-1: Liblouis vulnerabilities
==========================================================================
Ubuntu Security Notice USN-3669-1
June 04, 2018
liblouis vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Liblouis.
Software Description:
- liblouis: Braille translation library - utilities
Details:
It was discovered that Liblouis incorrectly handled certain files.
An attacker could possibly use this to cause a denial of service.
This issue only affected Ubuntu 18.04 LTS. (CVE-2018-11410)
It was discovered that Liblouis incorrectly handled certain files.
An attacker could possibly use this to execute arbitrary code.
(CVE-2018-11440)
It was discovered that Liblouis incorrectly handled certain files.
An attacker could possibly use this to cause a denial of service or
execute arbitrary code. (CVE-2018-11577)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
liblouis-bin 3.5.0-1ubuntu0.1
liblouis14 3.5.0-1ubuntu0.1
Ubuntu 17.10:
liblouis-bin 3.0.0-3ubuntu1.1
liblouis12 3.0.0-3ubuntu1.1
Ubuntu 16.04 LTS:
liblouis-bin 2.6.4-2ubuntu0.2
liblouis9 2.6.4-2ubuntu0.2
Ubuntu 14.04 LTS:
liblouis-bin 2.5.3-2ubuntu1.3
liblouis2 2.5.3-2ubuntu1.3
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-3669-1
CVE-2018-11410, CVE-2018-11440, CVE-2018-11577
Package Information:
https://launchpad.net/ubuntu/+source/liblouis/3.5.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/liblouis/3.0.0-3ubuntu1.1
https://launchpad.net/ubuntu/+source/liblouis/2.6.4-2ubuntu0.2
https://launchpad.net/ubuntu/+source/liblouis/2.5.3-2ubuntu1.3