The following security updates are available for Ubuntu 14.04 LTS, 16.04 LTS, and 17.04:
USN-3397-1: strongSwan vulnerability
USN-3398-1: graphite2 vulnerabilities
USN-3399-1: cvs vulnerability
USN-3397-1: strongSwan vulnerability
USN-3398-1: graphite2 vulnerabilities
USN-3399-1: cvs vulnerability
USN-3397-1: strongSwan vulnerability
==========================================================================
Ubuntu Security Notice USN-3397-1
August 21, 2017
strongswan vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
strongSwan could be made to crash or hang if it received specially
crafted network traffic.
Software Description:
- strongswan: IPsec VPN solution
Details:
It was discovered that strongSwan incorrectly handled verifying
specific RSA signatures. A remote attacker could use this issue
to cause strongSwan to crash, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
libstrongswan                   5.5.1-1ubuntu3.2
strongswan                      5.5.1-1ubuntu3.2
Ubuntu 16.04 LTS:
libstrongswan                   5.3.5-1ubuntu3.4
strongswan                      5.3.5-1ubuntu3.4
Ubuntu 14.04 LTS:
libstrongswan                   5.1.2-0ubuntu2.7
strongswan                      5.1.2-0ubuntu2.7
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3397-1
CVE-2017-11185
Package Information:
https://launchpad.net/ubuntu/+source/strongswan/5.5.1-1ubuntu3.2
https://launchpad.net/ubuntu/+source/strongswan/5.3.5-1ubuntu3.4
https://launchpad.net/ubuntu/+source/strongswan/5.1.2-0ubuntu2.7
USN-3398-1: graphite2 vulnerabilities
==========================================================================
Ubuntu Security Notice USN-3398-1
August 21, 2017
graphite2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
graphite2 could be made to crash or run programs if it opened a specially
crafted font.
Software Description:
- graphite2: Font rendering engine for Complex Scripts
Details:
Holger Fuhrmannek and Tyson Smith discovered that graphite2 incorrectly
handled certain malformed fonts. If a user or automated system were tricked
into opening a specially-crafted font file, a remote attacker could use
this issue to cause graphite2 to crash, resulting in a denial of service,
or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
libgraphite2-3 1.3.10-0ubuntu0.17.04.1
Ubuntu 16.04 LTS:
libgraphite2-3 1.3.10-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
libgraphite2-3 1.3.10-0ubuntu0.14.04.1
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart applications
using graphite2, such as LibreOffice, to make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3398-1
CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774,
CVE-2017-7775, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778
Package Information:
https://launchpad.net/ubuntu/+source/graphite2/1.3.10-0ubuntu0.17.04.1
https://launchpad.net/ubuntu/+source/graphite2/1.3.10-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/graphite2/1.3.10-0ubuntu0.14.04.1
USN-3399-1: cvs vulnerability
==========================================================================
Ubuntu Security Notice USN-3399-1
August 21, 2017
cvs vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
cvs could be made run programs as your login if it opened a
specially crafted cvs repository.
Software Description:
- cvs: Concurrent Versions System
Details:
Hank Leininger discovered that cvs did not properly handle SSH
for remote repositories. A remote attacker could use this to
construct a cvs repository that when accessed could run arbitrary
code with the privileges of the user.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
cvs2:1.12.13+real-22ubuntu0.1
Ubuntu 16.04 LTS:
cvs2:1.12.13+real-15ubuntu0.1
Ubuntu 14.04 LTS:
cvs2:1.12.13+real-12ubuntu0.1
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3399-1
CVE-2017-12836
Package Information:
https://launchpad.net/ubuntu/+source/cvs/2:1.12.13+real-22ubuntu0.1
https://launchpad.net/ubuntu/+source/cvs/2:1.12.13+real-15ubuntu0.1
https://launchpad.net/ubuntu/+source/cvs/2:1.12.13+real-12ubuntu0.1