The following updates has been released for Ubuntu Linux:
USN-3666-1: Oslo middleware vulnerability
USN-3667-1: libytnef vulnerabilities
USN-3666-1: Oslo middleware vulnerability
USN-3667-1: libytnef vulnerabilities
USN-3666-1: Oslo middleware vulnerability
=========================================================================
Ubuntu Security Notice USN-3666-1
May 31, 2018
python-oslo.middleware vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
Applications using Oslo middleware could be made to expose sensitive
information.
Software Description:
- python-oslo.middleware: WSGI middleware components for OpenStack
Details:
Divya K Konoor discovered Oslo middleware was vulnerable to an information
disclosure. A local attacker could exploit this flaw to obtain sensitive
information from OpenStack component error logs.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
python-oslo.middleware 3.8.0-2ubuntu1
python-oslo.middleware-doc 3.8.0-2ubuntu1
After a standard system update you need to restart OpenStack services to
make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3666-1
CVE-2017-2592, https://launchpad.net/bugs/1628031
Package Information:
https://launchpad.net/ubuntu/+source/python-oslo.middleware/3.8.0-2ubuntu1
USN-3667-1: libytnef vulnerabilities
==========================================================================
Ubuntu Security Notice USN-3667-1
May 31, 2018
libytnef vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in libytnef.
Software Description:
- libytnef: improved decoder for application/ms-tnef attachments
Details:
It was discovered that libytnef incorrectly handled certain files.
An attacker could possibly use this to cause a denial of service.
(CVE-2017-12141, CVE-2017-9146, CVE-2017-9471, CVE-2017-9473)
It was discovered that libytnef incorrectly handled certain files.
An attacker could possibly use this to access sensitive information.
(CVE-2017-9058)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libytnef0 1.5-6ubuntu0.2
After a standard system update you need to restart applications using
libytnef, such as Evolution, to make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3667-1
CVE-2017-12141, CVE-2017-9058, CVE-2017-9146, CVE-2017-9471,
CVE-2017-9473
Package Information:
https://launchpad.net/ubuntu/+source/libytnef/1.5-6ubuntu0.2