The following updates has been released for Ubuntu Linux:
USN-3393-1: ClamAV vulnerabilities
USN-3394-1: libmspack vulnerabilities
USN-3395-1: c-ares vulnerability
USN-3393-1: ClamAV vulnerabilities
USN-3394-1: libmspack vulnerabilities
USN-3395-1: c-ares vulnerability
USN-3393-1: ClamAV vulnerabilities
==========================================================================
Ubuntu Security Notice USN-3393-1
August 17, 2017
clamav vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in ClamAV.
Software Description:
- clamav: Anti-virus utility for Unix
Details:
It was discovered that ClamAV incorrectly handled parsing certain e-mail
messages. A remote attacker could possibly use this issue to cause ClamAV
to crash, resulting in a denial of service. (CVE-2017-6418)
It was discovered that ClamAV incorrectly handled certain malformed CHM
files. A remote attacker could use this issue to cause ClamAV to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 14.04 LTS. In the default installation,
attackers would be isolated by the ClamAV AppArmor profile. (CVE-2017-6419)
It was discovered that ClamAV incorrectly handled parsing certain PE files
with WWPack compression. A remote attacker could possibly use this issue to
cause ClamAV to crash, resulting in a denial of service. (CVE-2017-6420)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
clamav 0.99.2+dfsg-6ubuntu0.1
Ubuntu 16.04 LTS:
clamav 0.99.2+dfsg-0ubuntu0.16.04.2
Ubuntu 14.04 LTS:
clamav 0.99.2+addedllvm-0ubuntu0.14.04.2
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3393-1
CVE-2017-6418, CVE-2017-6419, CVE-2017-6420
Package Information:
https://launchpad.net/ubuntu/+source/clamav/0.99.2+dfsg-6ubuntu0.1
https://launchpad.net/ubuntu/+source/clamav/0.99.2+dfsg-0ubuntu0.16.04.2
https://launchpad.net/ubuntu/+source/clamav/0.99.2+addedllvm-0ubuntu0.14.04.2
USN-3394-1: libmspack vulnerabilities
==========================================================================
Ubuntu Security Notice USN-3394-1
August 17, 2017
libmspack vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in libmspack.
Software Description:
- libmspack: library for Microsoft compression formats
Details:
It was discovered that libmspack incorrectly handled certain malformed CHM
files. A remote attacker could use this issue to cause libmspack to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2017-6419)
It was discovered that libmspack incorrectly handled certain malformed CAB
files. A remote attacker could use this issue to cause libmspack to crash,
resulting in a denial of service. (CVE-2017-6419)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
libmspack0 0.5-1ubuntu0.17.04.1
Ubuntu 16.04 LTS:
libmspack0 0.5-1ubuntu0.16.04.1
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3394-1
CVE-2017-11423, CVE-2017-6419
Package Information:
https://launchpad.net/ubuntu/+source/libmspack/0.5-1ubuntu0.17.04.1
https://launchpad.net/ubuntu/+source/libmspack/0.5-1ubuntu0.16.04.1
USN-3395-1: c-ares vulnerability
==========================================================================
Ubuntu Security Notice USN-3395-1
August 17, 2017
c-ares vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
c-ares could be made to crash if it received specially crafted network
traffic.
Software Description:
- c-ares: library for asynchronous name resolution
Details:
It was discovered that c-ares incorrectly handled certain NAPTR responses.
A remote attacker could possibly use this issue to cause applications using
c-ares to crash, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
libc-ares2 1.12.0-1ubuntu0.1
Ubuntu 16.04 LTS:
libc-ares2 1.10.0-3ubuntu0.2
Ubuntu 14.04 LTS:
libc-ares2 1.10.0-2ubuntu0.2
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3395-1
CVE-2017-1000381
Package Information:
https://launchpad.net/ubuntu/+source/c-ares/1.12.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/c-ares/1.10.0-3ubuntu0.2
https://launchpad.net/ubuntu/+source/c-ares/1.10.0-2ubuntu0.2