The following security updates has been released for Ubuntu Linux:
USN-3598-2: curl vulnerabilities
USN-3659-1: Spice vulnerability
USN-3598-2: curl vulnerabilities
USN-3659-1: Spice vulnerability
USN-3598-2: curl vulnerabilities
==========================================================================
Ubuntu Security Notice USN-3598-2
May 24, 2018
curl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in curl.
Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries
Details:
USN-3598-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
Phan Thanh discovered that curl incorrectly handled certain FTP paths.
An attacker could use this to cause a denial of service or possibly
execute arbitrary code. (CVE-2018-1000120)
Dario Weisser discovered that curl incorrectly handled certain LDAP
URLs. An attacker could possibly use this issue to cause a denial of
service. (CVE-2018-1000121)
Max Dymond discovered that curl incorrectly handled certain RTSP data.
An attacker could possibly use this to cause a denial of service or
even to get access to sensitive data. (CVE-2018-1000122)
Max Dymond discovered that curl incorrectly handled certain RTSP
responses. If a user or automated system were tricked into connecting
to a malicious server, a remote attacker could use this issue to cause
curl to crash, resulting in a denial of service, or possibly obtain
sensitive information. (CVE-2018-1000301)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
curl 7.22.0-3ubuntu4.21
libcurl3 7.22.0-3ubuntu4.21
libcurl3-gnutls 7.22.0-3ubuntu4.21
libcurl3-nss 7.22.0-3ubuntu4.21
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-3598-2
https://usn.ubuntu.com/usn/usn-3598-1
CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000301
USN-3659-1: Spice vulnerability
==========================================================================
Ubuntu Security Notice USN-3659-1
May 23, 2018
spice, spice-protocol vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Spice could be made to crash or run programs if it received specially
crafted network traffic.
Software Description:
- spice: SPICE protocol client and server library
- spice-protocol: SPICE protocol headers
Details:
Frediano Ziglio discovered that Spice incorrectly handled certain
client messages. An attacker could possibly use this to cause Spice to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
libspice-server1 0.14.0-1ubuntu2.1
Ubuntu 17.10:
libspice-server1 0.12.8-2.2ubuntu0.1
Ubuntu 16.04 LTS:
libspice-protocol-dev 0.12.10-1ubuntu0.1
Ubuntu 14.04 LTS:
libspice-server1 0.12.4-0nocelt2ubuntu1.6
After a standard system update you need to restart qemu guests to make
all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3659-1
CVE-2017-12194
Package Information:
https://launchpad.net/ubuntu/+source/spice/0.14.0-1ubuntu2.1
https://launchpad.net/ubuntu/+source/spice/0.12.8-2.2ubuntu0.1
https://launchpad.net/ubuntu/+source/spice-protocol/0.12.10-1ubuntu0.1
https://launchpad.net/ubuntu/+source/spice/0.12.4-0nocelt2ubuntu1.6