Ubuntu 6328 Published by

The following updates has been released for Ubuntu Linux:

USN-4048-1: Docker vulnerabilities
USN-4049-1: GLib vulnerability
USN-4049-2: GLib vulnerability
USN-4050-1: ZeroMQ vulnerability
USN-4051-1: Apport vulnerability
USN-4052-1: Whoopsie vulnerability



USN-4048-1: Docker vulnerabilities


==========================================================================
Ubuntu Security Notice USN-4048-1
July 08, 2019

Docker vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Docker could be made to overwrite files as the administrator.

Software Description:
- docker.io: Linux container runtime

Details:

Aleksa Sarai discovered that Docker was vulnerable to a directory traversal
attack. An attacker could use this vulnerability to read and write arbitrary
files on the host filesystem as root.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.04:
docker.io 18.09.7-0ubuntu1~19.04.4

Ubuntu 18.10:
docker.io 18.09.7-0ubuntu1~18.10.3

Ubuntu 18.04 LTS:
docker.io 18.09.7-0ubuntu1~18.04.3

Ubuntu 16.04 LTS:
docker.io 18.09.7-0ubuntu1~16.04.4

This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.

References:
https://usn.ubuntu.com/4048-1
CVE-2018-15664, CVE-2019-5736

Package Information:
https://launchpad.net/ubuntu/+source/docker.io/18.09.7-0ubuntu1~19.04.4
https://launchpad.net/ubuntu/+source/docker.io/18.09.7-0ubuntu1~18.10.3
https://launchpad.net/ubuntu/+source/docker.io/18.09.7-0ubuntu1~18.04.3
https://launchpad.net/ubuntu/+source/docker.io/18.09.7-0ubuntu1~16.04.4

USN-4049-1: GLib vulnerability


=========================================================================
Ubuntu Security Notice USN-4049-1
July 08, 2019

glib2.0 vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

GLib did not properly restrict directory and file permissions.

Software Description:
- glib2.0: GLib Input, Output and Streaming Library (fam module)

Details:

It was discovered that GLib created directories and files without properly
restricting permissions. An attacker could possibly use this issue to access
sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
libglib2.0-0 2.58.1-2ubuntu0.2
libglib2.0-bin 2.58.1-2ubuntu0.2

Ubuntu 18.04 LTS:
libglib2.0-0 2.56.4-0ubuntu0.18.04.4
libglib2.0-bin 2.56.4-0ubuntu0.18.04.4

Ubuntu 16.04 LTS:
libglib2.0-0 2.48.2-0ubuntu4.3
libglib2.0-bin 2.48.2-0ubuntu4.3

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4049-1
CVE-2019-13012

Package Information:
https://launchpad.net/ubuntu/+source/glib2.0/2.58.1-2ubuntu0.2
https://launchpad.net/ubuntu/+source/glib2.0/2.56.4-0ubuntu0.18.04.4
https://launchpad.net/ubuntu/+source/glib2.0/2.48.2-0ubuntu4.3

USN-4049-2: GLib vulnerability


=========================================================================
Ubuntu Security Notice USN-4049-2
July 08, 2019

glib2.0 vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM
- Ubuntu 12.04 ESM

Summary:

GLib did not properly restrict directory and file permissions.

Software Description:
- glib2.0: GLib Input, Output and Streaming Library (fam module)

Details:

USN-4049-1 fixed a vulnerability in GLib. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that GLib created directories and files without properly
restricting permissions. An attacker could possibly use this issue to access
sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
libglib2.0-0 2.40.2-0ubuntu1.1+esm2
libglib2.0-bin 2.40.2-0ubuntu1.1+esm2

Ubuntu 12.04 ESM:
libglib2.0-0 2.32.4-0ubuntu1.3
libglib2.0-bin 2.32.4-0ubuntu1.3

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4049-2
https://usn.ubuntu.com/4049-1
CVE-2019-13012

USN-4050-1: ZeroMQ vulnerability


==========================================================================
Ubuntu Security Notice USN-4050-1
July 08, 2019

zeromq3 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

ZeroMQ could be made to crash or run programs if it received specially crafted
network traffic.

Software Description:
- zeromq3: lightweight messaging kernel

Details:

It was discovered that ZeroMQ incorrectly handled certain application metadata.
A remote attacker could use this issue to cause ZeroMQ to crash, or possibly
execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.04:
libzmq5 4.3.1-3ubuntu2.1

Ubuntu 18.10:
libzmq5 4.2.5-2ubuntu0.2

Ubuntu 18.04 LTS:
libzmq5 4.2.5-1ubuntu0.2

Ubuntu 16.04 LTS:
libzmq5 4.1.4-7ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4050-1
CVE-2019-13132

Package Information:
https://launchpad.net/ubuntu/+source/zeromq3/4.3.1-3ubuntu2.1
https://launchpad.net/ubuntu/+source/zeromq3/4.2.5-2ubuntu0.2
https://launchpad.net/ubuntu/+source/zeromq3/4.2.5-1ubuntu0.2
https://launchpad.net/ubuntu/+source/zeromq3/4.1.4-7ubuntu0.1

USN-4051-1: Apport vulnerability



=========================================================================
Ubuntu Security Notice USN-4051-1
July 09, 2019

apport vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Apport could be made to expose sensitive information in crash reports.

Software Description:
- apport: automatically generate crash reports for debugging

Details:

Kevin Backhouse discovered a race-condition when reading the user's local
Apport configuration. This could be used by a local attacker to cause
Apport to include arbitrary files in a resulting crash report.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.04:
python-apport 2.20.10-0ubuntu27.1
python3-apport 2.20.10-0ubuntu27.1

Ubuntu 18.10:
python-apport 2.20.10-0ubuntu13.4
python3-apport 2.20.10-0ubuntu13.4

Ubuntu 18.04 LTS:
python-apport 2.20.9-0ubuntu7.7
python3-apport 2.20.9-0ubuntu7.7

Ubuntu 16.04 LTS:
python-apport 2.20.1-0ubuntu2.19
python3-apport 2.20.1-0ubuntu2.19

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4051-1
CVE-2019-7307

Package Information:
https://launchpad.net/ubuntu/+source/apport/2.20.10-0ubuntu27.1
https://launchpad.net/ubuntu/+source/apport/2.20.10-0ubuntu13.4
https://launchpad.net/ubuntu/+source/apport/2.20.9-0ubuntu7.7
https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.19

USN-4052-1: Whoopsie vulnerability



=========================================================================
Ubuntu Security Notice USN-4052-1
July 09, 2019

whoopsie vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Whoopsie could be made to crash or expose sensitive information if it
processed a specially crafted crash report.

Software Description:
- whoopsie: Ubuntu error tracker submission

Details:

Kevin Backhouse discovered Whoopsie incorrectly handled very large crash
reports. A local attacker could possibly use this issue to cause a denial of
service or expose sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.04:
libwhoopsie0 0.2.64ubuntu0.1
whoopsie 0.2.64ubuntu0.1

Ubuntu 18.10:
libwhoopsie0 0.2.62ubuntu1
whoopsie 0.2.62ubuntu1

Ubuntu 18.04 LTS:
libwhoopsie0 0.2.62ubuntu0.1
whoopsie 0.2.62ubuntu0.1

Ubuntu 16.04 LTS:
libwhoopsie0 0.2.52.5ubuntu0.1
whoopsie 0.2.52.5ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4052-1
CVE-2019-11476

Package Information:
https://launchpad.net/ubuntu/+source/whoopsie/0.2.64ubuntu0.1
https://launchpad.net/ubuntu/+source/whoopsie/0.2.62ubuntu1
https://launchpad.net/ubuntu/+source/whoopsie/0.2.62ubuntu0.1
https://launchpad.net/ubuntu/+source/whoopsie/0.2.52.5ubuntu0.1