The following updates has been released for Ubuntu Linux:
USN-4048-1: Docker vulnerabilities
USN-4049-1: GLib vulnerability
USN-4049-2: GLib vulnerability
USN-4050-1: ZeroMQ vulnerability
USN-4051-1: Apport vulnerability
USN-4052-1: Whoopsie vulnerability
USN-4048-1: Docker vulnerabilities
USN-4049-1: GLib vulnerability
USN-4049-2: GLib vulnerability
USN-4050-1: ZeroMQ vulnerability
USN-4051-1: Apport vulnerability
USN-4052-1: Whoopsie vulnerability
USN-4048-1: Docker vulnerabilities
==========================================================================
Ubuntu Security Notice USN-4048-1
July 08, 2019
Docker vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Docker could be made to overwrite files as the administrator.
Software Description:
- docker.io: Linux container runtime
Details:
Aleksa Sarai discovered that Docker was vulnerable to a directory traversal
attack. An attacker could use this vulnerability to read and write arbitrary
files on the host filesystem as root.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
docker.io 18.09.7-0ubuntu1~19.04.4
Ubuntu 18.10:
docker.io 18.09.7-0ubuntu1~18.10.3
Ubuntu 18.04 LTS:
docker.io 18.09.7-0ubuntu1~18.04.3
Ubuntu 16.04 LTS:
docker.io 18.09.7-0ubuntu1~16.04.4
This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/4048-1
CVE-2018-15664, CVE-2019-5736
Package Information:
https://launchpad.net/ubuntu/+source/docker.io/18.09.7-0ubuntu1~19.04.4
https://launchpad.net/ubuntu/+source/docker.io/18.09.7-0ubuntu1~18.10.3
https://launchpad.net/ubuntu/+source/docker.io/18.09.7-0ubuntu1~18.04.3
https://launchpad.net/ubuntu/+source/docker.io/18.09.7-0ubuntu1~16.04.4
USN-4049-1: GLib vulnerability
=========================================================================
Ubuntu Security Notice USN-4049-1
July 08, 2019
glib2.0 vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
GLib did not properly restrict directory and file permissions.
Software Description:
- glib2.0: GLib Input, Output and Streaming Library (fam module)
Details:
It was discovered that GLib created directories and files without properly
restricting permissions. An attacker could possibly use this issue to access
sensitive information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.10:
libglib2.0-0 2.58.1-2ubuntu0.2
libglib2.0-bin 2.58.1-2ubuntu0.2
Ubuntu 18.04 LTS:
libglib2.0-0 2.56.4-0ubuntu0.18.04.4
libglib2.0-bin 2.56.4-0ubuntu0.18.04.4
Ubuntu 16.04 LTS:
libglib2.0-0 2.48.2-0ubuntu4.3
libglib2.0-bin 2.48.2-0ubuntu4.3
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4049-1
CVE-2019-13012
Package Information:
https://launchpad.net/ubuntu/+source/glib2.0/2.58.1-2ubuntu0.2
https://launchpad.net/ubuntu/+source/glib2.0/2.56.4-0ubuntu0.18.04.4
https://launchpad.net/ubuntu/+source/glib2.0/2.48.2-0ubuntu4.3
USN-4049-2: GLib vulnerability
=========================================================================
Ubuntu Security Notice USN-4049-2
July 08, 2019
glib2.0 vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
- Ubuntu 12.04 ESM
Summary:
GLib did not properly restrict directory and file permissions.
Software Description:
- glib2.0: GLib Input, Output and Streaming Library (fam module)
Details:
USN-4049-1 fixed a vulnerability in GLib. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that GLib created directories and files without properly
restricting permissions. An attacker could possibly use this issue to access
sensitive information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
libglib2.0-0 2.40.2-0ubuntu1.1+esm2
libglib2.0-bin 2.40.2-0ubuntu1.1+esm2
Ubuntu 12.04 ESM:
libglib2.0-0 2.32.4-0ubuntu1.3
libglib2.0-bin 2.32.4-0ubuntu1.3
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4049-2
https://usn.ubuntu.com/4049-1
CVE-2019-13012
USN-4050-1: ZeroMQ vulnerability
==========================================================================
Ubuntu Security Notice USN-4050-1
July 08, 2019
zeromq3 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
ZeroMQ could be made to crash or run programs if it received specially crafted
network traffic.
Software Description:
- zeromq3: lightweight messaging kernel
Details:
It was discovered that ZeroMQ incorrectly handled certain application metadata.
A remote attacker could use this issue to cause ZeroMQ to crash, or possibly
execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
libzmq5 4.3.1-3ubuntu2.1
Ubuntu 18.10:
libzmq5 4.2.5-2ubuntu0.2
Ubuntu 18.04 LTS:
libzmq5 4.2.5-1ubuntu0.2
Ubuntu 16.04 LTS:
libzmq5 4.1.4-7ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4050-1
CVE-2019-13132
Package Information:
https://launchpad.net/ubuntu/+source/zeromq3/4.3.1-3ubuntu2.1
https://launchpad.net/ubuntu/+source/zeromq3/4.2.5-2ubuntu0.2
https://launchpad.net/ubuntu/+source/zeromq3/4.2.5-1ubuntu0.2
https://launchpad.net/ubuntu/+source/zeromq3/4.1.4-7ubuntu0.1
USN-4051-1: Apport vulnerability
=========================================================================
Ubuntu Security Notice USN-4051-1
July 09, 2019
apport vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Apport could be made to expose sensitive information in crash reports.
Software Description:
- apport: automatically generate crash reports for debugging
Details:
Kevin Backhouse discovered a race-condition when reading the user's local
Apport configuration. This could be used by a local attacker to cause
Apport to include arbitrary files in a resulting crash report.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
python-apport 2.20.10-0ubuntu27.1
python3-apport 2.20.10-0ubuntu27.1
Ubuntu 18.10:
python-apport 2.20.10-0ubuntu13.4
python3-apport 2.20.10-0ubuntu13.4
Ubuntu 18.04 LTS:
python-apport 2.20.9-0ubuntu7.7
python3-apport 2.20.9-0ubuntu7.7
Ubuntu 16.04 LTS:
python-apport 2.20.1-0ubuntu2.19
python3-apport 2.20.1-0ubuntu2.19
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4051-1
CVE-2019-7307
Package Information:
https://launchpad.net/ubuntu/+source/apport/2.20.10-0ubuntu27.1
https://launchpad.net/ubuntu/+source/apport/2.20.10-0ubuntu13.4
https://launchpad.net/ubuntu/+source/apport/2.20.9-0ubuntu7.7
https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.19
USN-4052-1: Whoopsie vulnerability
=========================================================================
Ubuntu Security Notice USN-4052-1
July 09, 2019
whoopsie vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Whoopsie could be made to crash or expose sensitive information if it
processed a specially crafted crash report.
Software Description:
- whoopsie: Ubuntu error tracker submission
Details:
Kevin Backhouse discovered Whoopsie incorrectly handled very large crash
reports. A local attacker could possibly use this issue to cause a denial of
service or expose sensitive information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
libwhoopsie0 0.2.64ubuntu0.1
whoopsie 0.2.64ubuntu0.1
Ubuntu 18.10:
libwhoopsie0 0.2.62ubuntu1
whoopsie 0.2.62ubuntu1
Ubuntu 18.04 LTS:
libwhoopsie0 0.2.62ubuntu0.1
whoopsie 0.2.62ubuntu0.1
Ubuntu 16.04 LTS:
libwhoopsie0 0.2.52.5ubuntu0.1
whoopsie 0.2.52.5ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4052-1
CVE-2019-11476
Package Information:
https://launchpad.net/ubuntu/+source/whoopsie/0.2.64ubuntu0.1
https://launchpad.net/ubuntu/+source/whoopsie/0.2.62ubuntu1
https://launchpad.net/ubuntu/+source/whoopsie/0.2.62ubuntu0.1
https://launchpad.net/ubuntu/+source/whoopsie/0.2.52.5ubuntu0.1