Ubuntu 6586 Published by

The following security updates are available for Ubuntu Linux:

[USN-6641-1] curl vulnerability
[USN-6642-1] Bind vulnerabilities
[USN-6644-1] LibTIFF vulnerabilities
[USN-6643-1] NPM IP vulnerability



[USN-6641-1] curl vulnerability


==========================================================================
Ubuntu Security Notice USN-6641-1
February 19, 2024

curl vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

curl could be made to set cookies that would bypass PSL checks.

Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries

Details:

Harry Sintonen discovered that curl incorrectly handled mixed case cookie
domains. A remote attacker could possibly use this issue to set cookies
that get sent to different and unrelated sites and domains.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  curl                            7.58.0-2ubuntu3.24+esm3
  libcurl3-gnutls            7.58.0-2ubuntu3.24+esm3
  libcurl3-nss                7.58.0-2ubuntu3.24+esm3
  libcurl4                       7.58.0-2ubuntu3.24+esm3

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  curl                            7.47.0-1ubuntu2.19+esm11
  libcurl3                       7.47.0-1ubuntu2.19+esm11
  libcurl3-gnutls            7.47.0-1ubuntu2.19+esm11
  libcurl3-nss                7.47.0-1ubuntu2.19+esm11

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6641-1
  CVE-2023-46218



[USN-6642-1] Bind vulnerabilities


==========================================================================
Ubuntu Security Notice USN-6642-1
February 19, 2024

bind9 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in Bind.

Software Description:
- bind9: Internet Domain Name Server

Details:

Shoham Danino, Anat Bremler-Barr, Yehuda Afek, and Yuval Shavitt discovered
that Bind incorrectly handled parsing large DNS messages. A remote attacker
could possibly use this issue to cause Bind to consume resources, leading
to a denial of service. (CVE-2023-4408)

Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner discovered
that Bind icorrectly handled validating DNSSEC messages. A remote attacker
could possibly use this issue to cause Bind to consume resources, leading
to a denial of service. (CVE-2023-50387)

It was discovered that Bind incorrectly handled preparing an NSEC3 closest
encloser proof. A remote attacker could possibly use this issue to cause
Bind to consume resources, leading to a denial of service. (CVE-2023-50868)

It was discovered that Bind incorrectly handled reverse zone queries when
nxdomain-redirect is enabled. A remote attacker could possibly use this
issue to cause Bind to crash, leading to a denial of service.
(CVE-2023-5517)

It was discovered that Bind incorrectly handled certain specific recursive
query patterns. A remote attacker could possibly use this issue to cause
Bind to consume memory, leading to a denial of service. (CVE-2023-6516)

Bind has been updated to 9.6.48. In addition to security fixes, the updated
packages contain bug fixes, new features, and possibly incompatible
changes.

Please see the following for more information:
https://downloads.isc.org/isc/bind9/9.16.48/doc/arm/html/notes.html

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
bind9 1:9.16.48-0ubuntu0.20.04.1

This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.

References:
https://ubuntu.com/security/notices/USN-6642-1
CVE-2023-4408, CVE-2023-50387, CVE-2023-50868, CVE-2023-5517,
CVE-2023-6516

Package Information:
https://launchpad.net/ubuntu/+source/bind9/1:9.16.48-0ubuntu0.20.04.1



[USN-6644-1] LibTIFF vulnerabilities


==========================================================================
Ubuntu Security Notice USN-6644-1
February 19, 2024

tiff vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in LibTIFF.

Software Description:
- tiff: Tag Image File Format (TIFF) library

Details:

It was discovered that LibTIFF incorrectly handled certain files. If
a user were tricked into opening a specially crafted file, an attacker
could possibly use this issue to cause the application to crash, resulting
in a denial of service. (CVE-2023-52356)

It was discovered that LibTIFF incorrectly handled certain image files
with the tiffcp utility. If a user were tricked into opening a specially
crafted image file, an attacker could possibly use this issue to cause
tiffcp to crash, resulting in a denial of service. (CVE-2023-6228)

It was discovered that LibTIFF incorrectly handled certain files. If
a user were tricked into opening a specially crafted file, an attacker
could possibly use this issue to cause the application to consume
resources, resulting in a denial of service. (CVE-2023-6277)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
libtiff-tools 4.5.1+git230720-1ubuntu1.1
libtiff6 4.5.1+git230720-1ubuntu1.1

Ubuntu 20.04 LTS:
libtiff-tools 4.1.0+git191117-2ubuntu0.20.04.12
libtiff5 4.1.0+git191117-2ubuntu0.20.04.12

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
libtiff-tools 4.0.9-5ubuntu0.10+esm5
libtiff5 4.0.9-5ubuntu0.10+esm5

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
libtiff-tools 4.0.6-1ubuntu0.8+esm15
libtiff5 4.0.6-1ubuntu0.8+esm15

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
libtiff-tools 4.0.3-7ubuntu0.11+esm12
libtiff5 4.0.3-7ubuntu0.11+esm12

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6644-1
CVE-2023-52356, CVE-2023-6228, CVE-2023-6277

Package Information:
https://launchpad.net/ubuntu/+source/tiff/4.5.1+git230720-1ubuntu1.1
https://launchpad.net/ubuntu/+source/tiff/4.1.0+git191117-2ubuntu0.20.04.12



[USN-6643-1] NPM IP vulnerability


==========================================================================
Ubuntu Security Notice USN-6643-1
February 19, 2024

node-ip vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS (Available with Ubuntu Pro)
- Ubuntu 20.04 LTS (Available with Ubuntu Pro)
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)

Summary:

NPM IP could be made to expose sensitive information over the
network.

Software Description:
- node-ip: IP address utilities for node.js

Details:

Emre Durmaz discovered that NPM IP package incorrectly distinguished
between private and public IP addresses. A remote attacker could
possibly use this issue to perform
Server-Side Request Forgery (SSRF) attacks.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  node-ip                         2.0.0+~1.1.0-1ubuntu0.1

Ubuntu 22.04 LTS (Available with Ubuntu Pro):
  node-ip                         1.1.5+~1.1.0-1ubuntu0.1~esm1

Ubuntu 20.04 LTS (Available with Ubuntu Pro):
  node-ip                         1.1.5-5ubuntu0.1~esm1

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  node-ip                         1.1.5-1ubuntu0.1~esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6643-1
  CVE-2023-42282

Package Information:
https://launchpad.net/ubuntu/+source/node-ip/2.0.0+~1.1.0-1ubuntu0.1