Ubuntu 6588 Published by

The following updates has been released for Ubuntu Linux:

USN-3642-2: DPDK vulnerability
USN-3646-2: PHP vulnerabilities
USN-3648-1: curl vulnerabilities
USN-3649-1: QEMU vulnerabilities



USN-3642-2: DPDK vulnerability


==========================================================================
Ubuntu Security Notice USN-3642-2
May 16, 2018

dpdk vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.10

Summary:

DPDK could be made to expose sensitive information over the network.

Software Description:
- dpdk: set of libraries for fast packet processing

Details:

USN-3642-1 fixed a vulnerability in DPDK. This update provides the
corresponding update for Ubuntu 17.10.

Original advisory details:

Maxime Coquelin discovered that DPDK incorrectly handled guest physical
ranges. A malicious guest could use this issue to possibly access sensitive
information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
dpdk 17.05.2-0ubuntu1.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3642-2
https://usn.ubuntu.com/usn/usn-3642-1
CVE-2018-1059

Package Information:
https://launchpad.net/ubuntu/+source/dpdk/17.05.2-0ubuntu1.1

USN-3646-2: PHP vulnerabilities



==========================================================================
Ubuntu Security Notice USN-3646-2
May 16, 2018

php5 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in PHP.

Software Description:
- php5: HTML-embedded scripting language interpreter

Details:

USN-3646-1 fixed a vulnerability in PHP. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

 It was discovered that PHP incorrectly handled opcache access controls
 when configured to use PHP-FPM. A local user could possibly use this
 issue to obtain sensitive information from another user's PHP
 applications. (CVE-2018-10545)

 It was discovered that the PHP PHAR error pages incorrectly filtered
 certain data. A remote attacker could possibly use this issue to
 perform a reflected XSS attack. (CVE-2018-10547)

 It was discovered that PHP incorrectly handled LDAP. A malicious
 remote LDAP server could possibly use this issue to cause PHP to
 crash, resulting in a denial of service. (CVE-2018-10548)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
  libapache2-mod-php5 5.3.10-1ubuntu3.31
  php5-cgi 5.3.10-1ubuntu3.31
  php5-cli 5.3.10-1ubuntu3.31
  php5-fpm 5.3.10-1ubuntu3.31

In general, a standard system update will make all the necessary
changes.

References:
  https://usn.ubuntu.com/usn/usn-3646-2
  https://usn.ubuntu.com/usn/usn-3646-1
  CVE-2018-10545, CVE-2018-10547, CVE-2018-10548

USN-3648-1: curl vulnerabilities


==========================================================================
Ubuntu Security Notice USN-3648-1
May 16, 2018

curl vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in curl.

Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries

Details:

Dario Weisser discovered that curl incorrectly handled long FTP server
command replies. If a user or automated system were tricked into connecting
to a malicious FTP server, a remote attacker could use this issue to cause
curl to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 17.10 and Ubuntu 18.04 LTS.
(CVE-2018-1000300)

Max Dymond discovered that curl incorrectly handled certain RTSP responses.
If a user or automated system were tricked into connecting to a malicious
server, a remote attacker could use this issue to cause curl to crash,
resulting in a denial of service, or possibly obtain sensitive information.
(CVE-2018-1000301)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
curl 7.58.0-2ubuntu3.1
libcurl3-gnutls 7.58.0-2ubuntu3.1
libcurl3-nss 7.58.0-2ubuntu3.1
libcurl4 7.58.0-2ubuntu3.1

Ubuntu 17.10:
curl 7.55.1-1ubuntu2.5
libcurl3 7.55.1-1ubuntu2.5
libcurl3-gnutls 7.55.1-1ubuntu2.5
libcurl3-nss 7.55.1-1ubuntu2.5

Ubuntu 16.04 LTS:
curl 7.47.0-1ubuntu2.8
libcurl3 7.47.0-1ubuntu2.8
libcurl3-gnutls 7.47.0-1ubuntu2.8
libcurl3-nss 7.47.0-1ubuntu2.8

Ubuntu 14.04 LTS:
curl 7.35.0-1ubuntu2.16
libcurl3 7.35.0-1ubuntu2.16
libcurl3-gnutls 7.35.0-1ubuntu2.16
libcurl3-nss 7.35.0-1ubuntu2.16

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3648-1
CVE-2018-1000300, CVE-2018-1000301, CVE-2018-1000303

Package Information:
https://launchpad.net/ubuntu/+source/curl/7.58.0-2ubuntu3.1
https://launchpad.net/ubuntu/+source/curl/7.55.1-1ubuntu2.5
https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.8
https://launchpad.net/ubuntu/+source/curl/7.35.0-1ubuntu2.16

USN-3649-1: QEMU vulnerabilities


==========================================================================
Ubuntu Security Notice USN-3649-1
May 16, 2018

qemu vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in QEMU.

Software Description:
- qemu: Machine emulator and virtualizer

Details:

Cyrille Chatras discovered that QEMU incorrectly handled certain PS2 values
during migration. An attacker could possibly use this issue to cause QEMU
to crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 18.04 LTS. (CVE-2017-16845)

Cyrille Chatras discovered that QEMU incorrectly handled multiboot. An
attacker could use this issue to cause QEMU to crash, resulting in a denial
of service, or possibly execute arbitrary code on the host. In the default
installation, when QEMU is used with libvirt, attackers would be isolated
by the libvirt AppArmor profile. (CVE-2018-7550)

Ross Lagerwall discovered that QEMU incorrectly handled the Cirrus VGA
device. A privileged attacker inside the guest could use this issue to
cause QEMU to crash, resulting in a denial of service. This issue only
affected Ubuntu 17.10 and Ubuntu 18.04 LTS. (CVE-2018-7858)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
qemu-system 1:2.11+dfsg-1ubuntu7.1
qemu-system-arm 1:2.11+dfsg-1ubuntu7.1
qemu-system-mips 1:2.11+dfsg-1ubuntu7.1
qemu-system-ppc 1:2.11+dfsg-1ubuntu7.1
qemu-system-s390x 1:2.11+dfsg-1ubuntu7.1
qemu-system-sparc 1:2.11+dfsg-1ubuntu7.1
qemu-system-x86 1:2.11+dfsg-1ubuntu7.1

Ubuntu 17.10:
qemu-system 1:2.10+dfsg-0ubuntu3.6
qemu-system-aarch64 1:2.10+dfsg-0ubuntu3.6
qemu-system-arm 1:2.10+dfsg-0ubuntu3.6
qemu-system-mips 1:2.10+dfsg-0ubuntu3.6
qemu-system-ppc 1:2.10+dfsg-0ubuntu3.6
qemu-system-s390x 1:2.10+dfsg-0ubuntu3.6
qemu-system-sparc 1:2.10+dfsg-0ubuntu3.6
qemu-system-x86 1:2.10+dfsg-0ubuntu3.6

Ubuntu 16.04 LTS:
qemu-system 1:2.5+dfsg-5ubuntu10.28
qemu-system-aarch64 1:2.5+dfsg-5ubuntu10.28
qemu-system-arm 1:2.5+dfsg-5ubuntu10.28
qemu-system-mips 1:2.5+dfsg-5ubuntu10.28
qemu-system-ppc 1:2.5+dfsg-5ubuntu10.28
qemu-system-s390x 1:2.5+dfsg-5ubuntu10.28
qemu-system-sparc 1:2.5+dfsg-5ubuntu10.28
qemu-system-x86 1:2.5+dfsg-5ubuntu10.28

Ubuntu 14.04 LTS:
qemu-system 2.0.0+dfsg-2ubuntu1.41
qemu-system-aarch64 2.0.0+dfsg-2ubuntu1.41
qemu-system-arm 2.0.0+dfsg-2ubuntu1.41
qemu-system-mips 2.0.0+dfsg-2ubuntu1.41
qemu-system-ppc 2.0.0+dfsg-2ubuntu1.41
qemu-system-sparc 2.0.0+dfsg-2ubuntu1.41
qemu-system-x86 2.0.0+dfsg-2ubuntu1.41

After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3649-1
CVE-2017-16845, CVE-2018-7550, CVE-2018-7858

Package Information:
https://launchpad.net/ubuntu/+source/qemu/1:2.11+dfsg-1ubuntu7.1
https://launchpad.net/ubuntu/+source/qemu/1:2.10+dfsg-0ubuntu3.6
https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.28
https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.41