The following updates has been released for Ubuntu Linux:
USN-3550-2: ClamAV vulnerabilities
USN-3557-1: Squid vulnerabilities
USN-3558-1: systemd vulnerabilities
USN-3550-2: ClamAV vulnerabilities
USN-3557-1: Squid vulnerabilities
USN-3558-1: systemd vulnerabilities
USN-3550-2: ClamAV vulnerabilities
==========================================================================
Ubuntu Security Notice USN-3550-2
February 05, 2018
clamav vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in ClamAV.
Software Description:
- clamav: Anti-virus utility for Unix
Details:
USN-3550-1 fixed several vulnerabilities in ClamAV. This update
provides the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that ClamAV incorrectly handled parsing certain mail
messages. A remote attacker could use this issue to cause ClamAV to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2017-12374, CVE-2017-12375, CVE-2017-12379, CVE-2017-12380)
It was discovered that ClamAV incorrectly handled parsing certain PDF
files. A remote attacker could use this issue to cause ClamAV to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2017-12376)
It was discovered that ClamAV incorrectly handled parsing certain mew
packet files. A remote attacker could use this issue to cause ClamAV
to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2017-12377)
It was discovered that ClamAV incorrectly handled parsing certain TAR
files. A remote attacker could possibly use this issue to cause ClamAV
to crash, resulting in a denial of service. (CVE-2017-12378)
In the default installation, attackers would be isolated by the ClamAV
AppArmor profile.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
clamav 0.99.3+addedllvm-0ubuntu0.12.04.1
This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3550-2
https://www.ubuntu.com/usn/usn-3550-1
CVE-2017-12374, CVE-2017-12375, CVE-2017-12376, CVE-2017-12377,
CVE-2017-12378, CVE-2017-12379, CVE-2017-12380
USN-3557-1: Squid vulnerabilities
==========================================================================
Ubuntu Security Notice USN-3557-1
February 05, 2018
squid3 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Squid.
Software Description:
- squid3: Web proxy cache server
Details:
Mathias Fischer discovered that Squid incorrectly handled certain long
strings in headers. A malicious remote server could possibly cause Squid to
crash, resulting in a denial of service. This issue was only addressed in
Ubuntu 16.04 LTS. (CVE-2016-2569)
William Lima discovered that Squid incorrectly handled XML parsing when
processing Edge Side Includes (ESI). A malicious remote server could
possibly cause Squid to crash, resulting in a denial of service. This issue
was only addressed in Ubuntu 16.04 LTS. (CVE-2016-2570)
Alex Rousskov discovered that Squid incorrectly handled response-parsing
failures. A malicious remote server could possibly cause Squid to crash,
resulting in a denial of service. This issue only applied to Ubuntu 16.04
LTS. (CVE-2016-2571)
Santiago Ruano Rincón discovered that Squid incorrectly handled certain
Vary headers. A remote attacker could possibly use this issue to cause
Squid to crash, resulting in a denial of service. This issue was only
addressed in Ubuntu 16.04 LTS. (CVE-2016-3948)
Louis Dion-Marcil discovered that Squid incorrectly handled certain Edge
Side Includes (ESI) responses. A malicious remote server could possibly
cause Squid to crash, resulting in a denial of service. (CVE-2018-1000024)
Louis Dion-Marcil discovered that Squid incorrectly handled certain Edge
Side Includes (ESI) responses. A malicious remote server could possibly
cause Squid to crash, resulting in a denial of service. (CVE-2018-1000027)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.10:
squid3 3.5.23-5ubuntu1.1
Ubuntu 16.04 LTS:
squid3 3.5.12-1ubuntu7.5
Ubuntu 14.04 LTS:
squid3 3.3.8-1ubuntu6.11
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3557-1
CVE-2016-2569, CVE-2016-2570, CVE-2016-2571, CVE-2016-3948,
CVE-2018-1000024, CVE-2018-1000027
Package Information:
https://launchpad.net/ubuntu/+source/squid3/3.5.23-5ubuntu1.1
https://launchpad.net/ubuntu/+source/squid3/3.5.12-1ubuntu7.5
https://launchpad.net/ubuntu/+source/squid3/3.3.8-1ubuntu6.11
USN-3558-1: systemd vulnerabilities
==========================================================================
Ubuntu Security Notice USN-3558-1
February 05, 2018
systemd vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in systemd.
Software Description:
- systemd: system and service manager
Details:
Karim Hossen & Thomas Imbert and Nelson William Gamazo Sanchez
independently discovered that systemd-resolved incorrectly handled certain
DNS responses. A remote attacker could possibly use this issue to cause
systemd to temporarily stop responding, resulting in a denial of service.
This issue only affected Ubuntu 16.04 LTS. (CVE-2017-15908)
It was discovered that systemd incorrectly handled automounted volumes. A
local attacker could possibly use this issue to cause applications to hang,
resulting in a denial of service. (CVE-2018-1049)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
systemd 229-4ubuntu21.1
Ubuntu 14.04 LTS:
systemd 204-5ubuntu20.26
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3558-1
CVE-2017-15908, CVE-2018-1049
Package Information:
https://launchpad.net/ubuntu/+source/systemd/229-4ubuntu21.1
https://launchpad.net/ubuntu/+source/systemd/204-5ubuntu20.26