The following two updates are available for Ubuntu Linux:
USN-3592-2: ClamAV vulnerabilities
USN-3593-1: Zsh vulnerabilities
USN-3592-2: ClamAV vulnerabilities
USN-3593-1: Zsh vulnerabilities
USN-3592-2: ClamAV vulnerabilities
==========================================================================
Ubuntu Security Notice USN-3592-2
March 08, 2018
clamav vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in ClamAV.
Software Description:
- clamav: Anti-virus utility for Unix
Details:
USN-3592-1 fixed several vulnerabilities in ClamAV. This update
provides the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that ClamAV incorrectly handled parsing certain PDF
files. A remote attacker could use this issue to cause ClamAV to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2018-0202)
Hanno Böck discovered that ClamAV incorrectly handled parsing certain
XAR files. A remote attacker could use this issue to cause ClamAV to
crash, resulting in a denial of service. (CVE-2018-1000085)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
clamav 0.99.4+addedllvm-0ubuntu0.12.04.2
This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-3592-2
https://usn.ubuntu.com/usn/usn-3592-1
CVE-2018-0202, CVE-2018-1000085
USN-3593-1: Zsh vulnerabilities
==========================================================================
Ubuntu Security Notice USN-3593-1
March 08, 2018
zsh vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Zsh.
Software Description:
- zsh: shell with lots of features
Details:
It was discovered that Zsh incorrectly handled certain enviroment
variables. An attacker could possibly use this issue to gain privileged
access to the system. This issue only affected Ubuntu 14.04 LTS.Â
(CVE-2014-10070)
It was discovered that Zsh incorrectly handled certain inputs.
An attacker could possibly use this to execute arbitrary code. This
issue only affected Ubuntu 14.04 LTS. (CVE-2014-10071)
It was discovered that Zsh incorrectly handled some symbolic links.
An attacker could possibly use this to execute arbitrary code. This
issue only affected Ubuntu 14.04 LTS. (CVE-2014-10072)
It was discovered that Zsh incorrectly handled certain errors. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2016-10714)
It was discovered that Zsh incorrectly handled certain commands. An
attacker could possibly use this to execute arbitrary code.Â
(CVE-2017-18205)
It was discovered that Zsh incorrectly handled certain symlinks. An
attacker could possibly use this to execute arbitrary code. This issue
only affected Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2017-18206)
It was discovered that Zsh incorrectly handled certain inputs. An
attacker could possible use to execute arbitrary code. This issue only
affected Ubuntu 17.10. (CVE-2018-7548)
It was discovered that Zsh incorrectly handled certain inputs. An
attacker could possibly use this to cause a denial of service.Â
(CVE-2018-7549)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.10:
zsh 5.2-5ubuntu1.1
Ubuntu 16.04 LTS:
zsh 5.1.1-1ubuntu2.1
Ubuntu 14.04 LTS:
zsh 5.0.2-3ubuntu6.1
After a standard system update you need to restart Zsh to make
all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3593-1
CVE-2014-10070, CVE-2014-10071, CVE-2014-10072, CVE-2016-10714,
CVE-2017-18205, CVE-2017-18206, CVE-2018-7548, CVE-2018-7549
Package Information:
https://launchpad.net/ubuntu/+source/zsh/5.2-5ubuntu1.1
https://launchpad.net/ubuntu/+source/zsh/5.1.1-1ubuntu2.1
https://launchpad.net/ubuntu/+source/zsh/5.0.2-3ubuntu6.1