[USN-6641-1] curl vulnerability
[USN-6642-1] Bind vulnerabilities
[USN-6644-1] LibTIFF vulnerabilities
[USN-6643-1] NPM IP vulnerability
[USN-6641-1] curl vulnerability
==========================================================================
Ubuntu Security Notice USN-6641-1
February 19, 2024
curl vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
Summary:
curl could be made to set cookies that would bypass PSL checks.
Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries
Details:
Harry Sintonen discovered that curl incorrectly handled mixed case cookie
domains. A remote attacker could possibly use this issue to set cookies
that get sent to different and unrelated sites and domains.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
curl 7.58.0-2ubuntu3.24+esm3
libcurl3-gnutls 7.58.0-2ubuntu3.24+esm3
libcurl3-nss 7.58.0-2ubuntu3.24+esm3
libcurl4 7.58.0-2ubuntu3.24+esm3
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
curl 7.47.0-1ubuntu2.19+esm11
libcurl3 7.47.0-1ubuntu2.19+esm11
libcurl3-gnutls 7.47.0-1ubuntu2.19+esm11
libcurl3-nss 7.47.0-1ubuntu2.19+esm11
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6641-1
CVE-2023-46218
[USN-6642-1] Bind vulnerabilities
==========================================================================
Ubuntu Security Notice USN-6642-1
February 19, 2024
bind9 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in Bind.
Software Description:
- bind9: Internet Domain Name Server
Details:
Shoham Danino, Anat Bremler-Barr, Yehuda Afek, and Yuval Shavitt discovered
that Bind incorrectly handled parsing large DNS messages. A remote attacker
could possibly use this issue to cause Bind to consume resources, leading
to a denial of service. (CVE-2023-4408)
Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner discovered
that Bind icorrectly handled validating DNSSEC messages. A remote attacker
could possibly use this issue to cause Bind to consume resources, leading
to a denial of service. (CVE-2023-50387)
It was discovered that Bind incorrectly handled preparing an NSEC3 closest
encloser proof. A remote attacker could possibly use this issue to cause
Bind to consume resources, leading to a denial of service. (CVE-2023-50868)
It was discovered that Bind incorrectly handled reverse zone queries when
nxdomain-redirect is enabled. A remote attacker could possibly use this
issue to cause Bind to crash, leading to a denial of service.
(CVE-2023-5517)
It was discovered that Bind incorrectly handled certain specific recursive
query patterns. A remote attacker could possibly use this issue to cause
Bind to consume memory, leading to a denial of service. (CVE-2023-6516)
Bind has been updated to 9.6.48. In addition to security fixes, the updated
packages contain bug fixes, new features, and possibly incompatible
changes.
Please see the following for more information:
https://downloads.isc.org/isc/bind9/9.16.48/doc/arm/html/notes.html
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
bind9 1:9.16.48-0ubuntu0.20.04.1
This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.
References:
https://ubuntu.com/security/notices/USN-6642-1
CVE-2023-4408, CVE-2023-50387, CVE-2023-50868, CVE-2023-5517,
CVE-2023-6516
Package Information:
https://launchpad.net/ubuntu/+source/bind9/1:9.16.48-0ubuntu0.20.04.1
[USN-6644-1] LibTIFF vulnerabilities
==========================================================================
Ubuntu Security Notice USN-6644-1
February 19, 2024
tiff vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in LibTIFF.
Software Description:
- tiff: Tag Image File Format (TIFF) library
Details:
It was discovered that LibTIFF incorrectly handled certain files. If
a user were tricked into opening a specially crafted file, an attacker
could possibly use this issue to cause the application to crash, resulting
in a denial of service. (CVE-2023-52356)
It was discovered that LibTIFF incorrectly handled certain image files
with the tiffcp utility. If a user were tricked into opening a specially
crafted image file, an attacker could possibly use this issue to cause
tiffcp to crash, resulting in a denial of service. (CVE-2023-6228)
It was discovered that LibTIFF incorrectly handled certain files. If
a user were tricked into opening a specially crafted file, an attacker
could possibly use this issue to cause the application to consume
resources, resulting in a denial of service. (CVE-2023-6277)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 23.10:
libtiff-tools 4.5.1+git230720-1ubuntu1.1
libtiff6 4.5.1+git230720-1ubuntu1.1
Ubuntu 20.04 LTS:
libtiff-tools 4.1.0+git191117-2ubuntu0.20.04.12
libtiff5 4.1.0+git191117-2ubuntu0.20.04.12
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
libtiff-tools 4.0.9-5ubuntu0.10+esm5
libtiff5 4.0.9-5ubuntu0.10+esm5
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
libtiff-tools 4.0.6-1ubuntu0.8+esm15
libtiff5 4.0.6-1ubuntu0.8+esm15
Ubuntu 14.04 LTS (Available with Ubuntu Pro):
libtiff-tools 4.0.3-7ubuntu0.11+esm12
libtiff5 4.0.3-7ubuntu0.11+esm12
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6644-1
CVE-2023-52356, CVE-2023-6228, CVE-2023-6277
Package Information:
https://launchpad.net/ubuntu/+source/tiff/4.5.1+git230720-1ubuntu1.1
https://launchpad.net/ubuntu/+source/tiff/4.1.0+git191117-2ubuntu0.20.04.12
[USN-6643-1] NPM IP vulnerability
==========================================================================
Ubuntu Security Notice USN-6643-1
February 19, 2024
node-ip vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.10
- Ubuntu 22.04 LTS (Available with Ubuntu Pro)
- Ubuntu 20.04 LTS (Available with Ubuntu Pro)
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
Summary:
NPM IP could be made to expose sensitive information over the
network.
Software Description:
- node-ip: IP address utilities for node.js
Details:
Emre Durmaz discovered that NPM IP package incorrectly distinguished
between private and public IP addresses. A remote attacker could
possibly use this issue to perform
Server-Side Request Forgery (SSRF) attacks.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 23.10:
node-ip 2.0.0+~1.1.0-1ubuntu0.1
Ubuntu 22.04 LTS (Available with Ubuntu Pro):
node-ip 1.1.5+~1.1.0-1ubuntu0.1~esm1
Ubuntu 20.04 LTS (Available with Ubuntu Pro):
node-ip 1.1.5-5ubuntu0.1~esm1
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
node-ip 1.1.5-1ubuntu0.1~esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6643-1
CVE-2023-42282
Package Information:
https://launchpad.net/ubuntu/+source/node-ip/2.0.0+~1.1.0-1ubuntu0.1