Ubuntu 6310 Published by

The following updates has been released for Ubuntu Linux:

USN-3517-1: poppler vulnerabilities
USN-3518-1: AWStats vulnerability
USN-3519-1: Tomcat vulnerabilities
USN-3520-1: PySAML2 vulnerability



USN-3517-1: poppler vulnerabilities


==========================================================================
Ubuntu Security Notice USN-3517-1
January 08, 2018

poppler vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.10
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in poppler.

Software Description:
- poppler: PDF rendering library

Details:

It was discovered that poppler incorrectly handled certain files.
If a user or automated system were tricked into opening a crafted PDF
file, an attacker could execute arbitrary. (CVE-2017-1000456)

It was discovered that poppler incorrectly handled certain files.
If a user or automated system were tricked into opening a crafted PDF
file, an attacker could cause a denial of service. This issue only
affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 16.10. 
(CVE-2017-14976)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
  libpoppler68 0.57.0-2ubuntu4.2
  poppler-utils 0.57.0-2ubuntu4.2

Ubuntu 17.04:
  libpoppler64 0.48.0-2ubuntu2.5
  poppler-utils 0.48.0-2ubuntu2.5

Ubuntu 16.04 LTS:
  libpoppler58 0.41.0-0ubuntu1.6
  poppler-utils 0.41.0-0ubuntu1.6

Ubuntu 14.04 LTS:
  libpoppler44 0.24.5-2ubuntu4.9
  poppler-utils 0.24.5-2ubuntu4.9

In general, a standard system update will make all the necessary
changes.

References:
  https://www.ubuntu.com/usn/usn-3517-1
  CVE-2017-1000456, CVE-2017-14976

Package Information:
  https://launchpad.net/ubuntu/+source/poppler/0.57.0-2ubuntu4.2
  https://launchpad.net/ubuntu/+source/poppler/0.48.0-2ubuntu2.5
  https://launchpad.net/ubuntu/+source/poppler/0.41.0-0ubuntu1.6
  https://launchpad.net/ubuntu/+source/poppler/0.24.5-2ubuntu4.9


USN-3518-1: AWStats vulnerability


==========================================================================
Ubuntu Security Notice USN-3518-1
January 08, 2018

awstats vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.10
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

AWStats could be made to run programs if it received specially crafted
network traffic.

Software Description:
- awstats: powerful and featureful web server log analyzer

Details:

It was discovered that AWStats incorrectly filtered certain parameters. A
remote attacker could possibly use this issue to execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
awstats 7.6+dfsg-1ubuntu0.17.10.1

Ubuntu 17.04:
awstats 7.6+dfsg-1ubuntu0.17.04.1

Ubuntu 16.04 LTS:
awstats 7.4+dfsg-1ubuntu0.2

Ubuntu 14.04 LTS:
awstats 7.2+dfsg-1ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3518-1
CVE-2017-1000501

Package Information:
https://launchpad.net/ubuntu/+source/awstats/7.6+dfsg-1ubuntu0.17.10.1
https://launchpad.net/ubuntu/+source/awstats/7.6+dfsg-1ubuntu0.17.04.1
https://launchpad.net/ubuntu/+source/awstats/7.4+dfsg-1ubuntu0.2
https://launchpad.net/ubuntu/+source/awstats/7.2+dfsg-1ubuntu0.1

USN-3519-1: Tomcat vulnerabilities


==========================================================================
Ubuntu Security Notice USN-3519-1
January 08, 2018

tomcat7, tomcat8 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Tomcat.

Software Description:
- tomcat8: Servlet and JSP engine
- tomcat7: Servlet and JSP engine

Details:

It was discovered that Tomcat incorrectly handled certain pipelined
requests when sendfile was used. A remote attacker could use this issue to
obtain wrong responses possibly containing sensitive information.
(CVE-2017-5647)

It was discovered that Tomcat incorrectly used the appropriate facade
object. A malicious application could possibly use this to bypass Security
Manager restrictions. (CVE-2017-5648)

It was discovered that Tomcat incorrectly handled error pages. A remote
attacker could possibly use this issue to replace or remove the custom
error page. (CVE-2017-5664)

It was discovered that Tomcat incorrectly handled the CORS filter. A remote
attacker could possibly use this issue to perform cache poisoning.
(CVE-2017-7674)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
libtomcat8-java 8.0.38-2ubuntu2.2
tomcat8 8.0.38-2ubuntu2.2

Ubuntu 16.04 LTS:
libtomcat8-java 8.0.32-1ubuntu1.5
tomcat8 8.0.32-1ubuntu1.5

Ubuntu 14.04 LTS:
libtomcat7-java 7.0.52-1ubuntu0.13
tomcat7 7.0.52-1ubuntu0.13

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3519-1
CVE-2017-5647, CVE-2017-5648, CVE-2017-5664, CVE-2017-7674

Package Information:
https://launchpad.net/ubuntu/+source/tomcat8/8.0.38-2ubuntu2.2
https://launchpad.net/ubuntu/+source/tomcat8/8.0.32-1ubuntu1.5
https://launchpad.net/ubuntu/+source/tomcat7/7.0.52-1ubuntu0.13

USN-3520-1: PySAML2 vulnerability


==========================================================================
Ubuntu Security Notice USN-3520-1
January 08, 2018

python-pysaml2 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.10
- Ubuntu 17.04
- Ubuntu 16.04 LTS

Summary:

PySAML2 could allow authentication without a password.

Software Description:
- python-pysaml2: Pure python implementation of SAML2

Details:

It was discovered that PySAML2 incorrectly accepted any password when
run with python optimizations enabled. An attacker could use this issue
to authenticate as any user without a valid password.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
  python-pysaml2 3.0.0-3ubuntu2.2
  python3-pysaml2 3.0.0-3ubuntu2.2

Ubuntu 17.04:
  python-pysaml2 3.0.0-3ubuntu1.17.04.3
  python3-pysaml2 3.0.0-3ubuntu1.17.04.3

Ubuntu 16.04 LTS:
  python-pysaml2 3.0.0-3ubuntu1.16.04.3
  python3-pysaml2 3.0.0-3ubuntu1.16.04.3

In general, a standard system update will make all the necessary
changes.

References:
  https://www.ubuntu.com/usn/usn-3520-1
  CVE-2017-1000433

Package Information:
  https://launchpad.net/ubuntu/+source/python-pysaml2/3.0.0-3ubuntu2.2
  https://launchpad.net/ubuntu/+source/python-pysaml2/3.0.0-3ubuntu1.17.04.3
  https://launchpad.net/ubuntu/+source/python-pysaml2/3.0.0-3ubuntu1.16.04.3