The following updates has been released for Ubuntu Linux:
USN-4167-2: Samba vulnerabilities
USN-4169-1: libarchive vulnerability
USN-4170-1: Whoopsie vulnerability
USN-4167-2: Samba vulnerabilities
USN-4169-1: libarchive vulnerability
USN-4170-1: Whoopsie vulnerability
USN-4167-2: Samba vulnerabilities
=========================================================================
Ubuntu Security Notice USN-4167-2
October 29, 2019
samba vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
- Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in Samba.
Software Description:
- samba: SMB/CIFS file, print, and login server for Unix
Details:
USN-4167-1 fixed several vulnerabilities in Samba. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
Michael Hanselmann discovered that the Samba client code incorrectly
handled path separators. If a user were tricked into connecting to a
malicious server, a remote attacker could use this issue to cause the
client to access local pathnames instead of network pathnames.
(CVE-2019-10218)
Adam Xu discovered that Samba incorrectly handled the dirsync LDAP control.
A remote attacker with "get changes" permissions could possibly use this
issue to cause Samba to crash, resulting in a denial of service. This issue
only affected Ubuntu 14.04 ESM. (CVE-2019-14847)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
libsmbclient 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm3
samba 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm3
Ubuntu 12.04 ESM:
libsmbclient 2:3.6.25-0ubuntu0.12.04.19
samba 2:3.6.25-0ubuntu0.12.04.19
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4167-2
https://usn.ubuntu.com/4167-1
CVE-2019-10218, CVE-2019-14847
USN-4169-1: libarchive vulnerability
=========================================================================
Ubuntu Security Notice USN-4169-1
October 29, 2019
libarchive vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 ESM
Summary:
libarchive could be made to execute arbitrary code if it received
specially crafted archive file.
Software Description:
- libarchive: Library to read/write archive files
Details:
It was discovered that libarchive incorrectly handled certain archive files.
An attacker could possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
libarchive13 3.3.3-4ubuntu0.1
Ubuntu 18.04 LTS:
libarchive13 3.2.2-3.1ubuntu0.5
Ubuntu 16.04 LTS:
libarchive13 3.1.2-11ubuntu0.16.04.7
Ubuntu 14.04 ESM:
libarchive13 3.1.2-7ubuntu2.8+esm1
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4169-1
CVE-2019-18408
Package Information:
https://launchpad.net/ubuntu/+source/libarchive/3.3.3-4ubuntu0.1
https://launchpad.net/ubuntu/+source/libarchive/3.2.2-3.1ubuntu0.5
https://launchpad.net/ubuntu/+source/libarchive/3.1.2-11ubuntu0.16.04.7
USN-4170-1: Whoopsie vulnerability
=========================================================================
Ubuntu Security Notice USN-4170-1
October 30, 2019
whoopsie vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.10
- Ubuntu 19.04
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Whoopsie could be made to crash, expose sensitive information or run
programs if it processed a specially crafted crash report.
Software Description:
- whoopsie: Ubuntu error tracker submission
Details:
Kevin Backhouse discovered Whoopsie incorrectly handled very large crash
reports. A local attacker could possibly use this issue to cause a denial
of service, expose sensitive information or execute code as the whoopsie
user.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.10:
libwhoopsie0 0.2.66ubuntu0.1
whoopsie 0.2.66ubuntu0.1
Ubuntu 19.04:
libwhoopsie0 0.2.64ubuntu0.2
whoopsie 0.2.64ubuntu0.2
Ubuntu 18.04 LTS:
libwhoopsie0 0.2.62ubuntu0.2
whoopsie 0.2.62ubuntu0.2
Ubuntu 16.04 LTS:
libwhoopsie0 0.2.52.5ubuntu0.2
whoopsie 0.2.52.5ubuntu0.2
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4170-1
CVE-2019-11484
Package Information:
https://launchpad.net/ubuntu/+source/whoopsie/0.2.66ubuntu0.1
https://launchpad.net/ubuntu/+source/whoopsie/0.2.64ubuntu0.2
https://launchpad.net/ubuntu/+source/whoopsie/0.2.62ubuntu0.2
https://launchpad.net/ubuntu/+source/whoopsie/0.2.52.5ubuntu0.2