The following security updates has been released for Ubuntu Linux:
USN-3788-1: Tex Live vulnerabilities
USN-3789-1: ClamAV vulnerability
USN-3791-1: Git vulnerability
USN-3788-1: Tex Live vulnerabilities
USN-3789-1: ClamAV vulnerability
USN-3791-1: Git vulnerability
USN-3788-1: Tex Live vulnerabilities
==========================================================================
Ubuntu Security Notice USN-3788-1
October 11, 2018
texlive-bin vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Tex Live.
Software Description:
- texlive-bin: TeX Live: path search library for TeX (development part)
Details:
Jakub Wilk discovered that Tex Live incorrectly handled certain files.
An attacker could possibly use this issue to execute arbitrary code.
This issue only affected Ubuntu 14.04 LTS. (CVE-2015-5700)
It was discovered that Tex Live incorrectly handled certain files.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2018-17407)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
texlive-binaries 2017.20170613.44572-8ubuntu0.1
Ubuntu 16.04 LTS:
texlive-binaries 2015.20160222.37495-1ubuntu0.1
Ubuntu 14.04 LTS:
texlive-binaries 2013.20130729.30972-2ubuntu0.1
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-3788-1
CVE-2015-5700, CVE-2018-17407
Package Information:
https://launchpad.net/ubuntu/+source/texlive-bin/2017.20170613.44572-8ubuntu0.1
https://launchpad.net/ubuntu/+source/texlive-bin/2015.20160222.37495-1ubuntu0.1
https://launchpad.net/ubuntu/+source/texlive-bin/2013.20130729.30972-2ubuntu0.1
USN-3789-1: ClamAV vulnerability
==========================================================================
Ubuntu Security Notice USN-3789-1
October 11, 2018
clamav vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
ClamAV could be made to crash if it opened a specially crafted file.
Software Description:
- clamav: Anti-virus utility for Unix
Details:
It was discovered that ClamAV incorrectly handled unpacking MEW
executables. A remote attacker could possibly use this issue to cause
ClamAV to crash, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
clamav 0.100.2+dfsg-1ubuntu0.18.04.1
Ubuntu 16.04 LTS:
clamav 0.100.2+dfsg-1ubuntu0.16.04.1
Ubuntu 14.04 LTS:
clamav 0.100.2+dfsg-1ubuntu0.14.04.1
This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-3789-1
CVE-2018-15378
Package Information:
https://launchpad.net/ubuntu/+source/clamav/0.100.2+dfsg-1ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/clamav/0.100.2+dfsg-1ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/clamav/0.100.2+dfsg-1ubuntu0.14.04.1
USN-3791-1: Git vulnerability
=========================================================================
Ubuntu Security Notice USN-3791-1
October 12, 2018
git vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Git could be made to run programs as your login if it recursively
opened a malicious git repository.
Software Description:
- git: fast, scalable, distributed revision control system
Details:
It was discovered that git did not properly validate git submodule
urls or paths. A remote attacker could possibly use this to craft a
git repository that causes arbitrary code execution when recursive
operations are used.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
git 1:2.17.1-1ubuntu0.3
Ubuntu 16.04 LTS:
git 1:2.7.4-0ubuntu1.5
Ubuntu 14.04 LTS:
git 1:1.9.1-1ubuntu0.9
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3791-1
CVE-2018-17456
Package Information:
https://launchpad.net/ubuntu/+source/git/1:2.17.1-1ubuntu0.3
https://launchpad.net/ubuntu/+source/git/1:2.7.4-0ubuntu1.5
https://launchpad.net/ubuntu/+source/git/1:1.9.1-1ubuntu0.9