Ubuntu 6321 Published by

The following updates has been released for Ubuntu Linux:

USN-3658-2: procps-ng vulnerabilities
This address two security issues: 1) It was discovered that libprocps incorrectly handled the file2strvec() function. A local attacker could possibly use this to execute
 arbitrary code. (CVE-2018-1124). 2) It was discovered that procps-ng incorrectly handled memory. A local attacker could use this issue to cause a denial of service, or
 possibly execute arbitrary code. (CVE-2018-1126)

This update is available for Ubuntu Linux 12.04 ESM

USN-3671-1: Git vulnerabilities
This address twe security issues: 1) A remote attacker could possibly use this to craft a git repo that causes arbitrary code execution when "git clone --recurse-submodules" is used. (CVE-2018-11235). 2) An attacker could use this to cause a denial of service or expose sensitive information. (CVE-2018-11233)

This update is available for Ubuntu Linux 14.04 LTS, 16.04 LTS, 17.10, and 18.04 LTS

USN-3672-1: Liblouis vulnerabilities
Henri Salo discovered that Liblouis incorrectly handled certain files. An attacker could possibly use this to execute arbitrary code.

This update is available for Ubuntu Linux 14.04 LTS, 16.04 LTS, 17.10, and 18.04 LTS



USN-3658-2: procps-ng vulnerabilities



==========================================================================
Ubuntu Security Notice USN-3658-2
June 05, 2018

procps vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in procps-ng.

Software Description:
- procps: /proc file system utilities

Details:

USN-3658-1 fixed a vulnerability in procps-ng. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

 It was discovered that libprocps incorrectly handled the file2strvec()
 function. A local attacker could possibly use this to execute
 arbitrary code. (CVE-2018-1124)

 It was discovered that procps-ng incorrectly handled memory. A local
 attacker could use this issue to cause a denial of service, or
 possibly execute arbitrary code. (CVE-2018-1126)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
  procps 1:3.2.8-11ubuntu6.5

In general, a standard system update will make all the necessary
changes.

References:
  https://usn.ubuntu.com/usn/usn-3658-2
  https://usn.ubuntu.com/usn/usn-3658-1
  CVE-2018-1124, CVE-2018-1126

USN-3671-1: Git vulnerabilities


=========================================================================
Ubuntu Security Notice USN-3671-1
June 05, 2018

git vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Git.

Software Description:
- git: fast, scalable, distributed revision control system

Details:

Etienne Stalmans discovered that git did not properly validate git
submodules files. A remote attacker could possibly use this to craft a
git repo that causes arbitrary code execution when "git clone
--recurse-submodules" is used. (CVE-2018-11235)

It was discovered that an integer overflow existed in git's pathname
sanity checking code when used on NTFS filesystems. An attacker could
use this to cause a denial of service or expose sensitive information.
(CVE-2018-11233)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
git 1:2.17.1-1ubuntu0.1

Ubuntu 17.10:
git 1:2.14.1-1ubuntu4.1

Ubuntu 16.04 LTS:
git 1:2.7.4-0ubuntu1.4

Ubuntu 14.04 LTS:
git 1:1.9.1-1ubuntu0.8

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3671-1
CVE-2018-11233, CVE-2018-11235

Package Information:
https://launchpad.net/ubuntu/+source/git/1:2.17.1-1ubuntu0.1
https://launchpad.net/ubuntu/+source/git/1:2.14.1-1ubuntu4.1
https://launchpad.net/ubuntu/+source/git/1:2.7.4-0ubuntu1.4
https://launchpad.net/ubuntu/+source/git/1:1.9.1-1ubuntu0.8

USN-3672-1: Liblouis vulnerabilities

==========================================================================
Ubuntu Security Notice USN-3672-1
June 06, 2018

liblouis vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Liblouis.

Software Description:
- liblouis: Braille translation library - utilities

Details:

Henri Salo discovered that Liblouis incorrectly handled certain files.
An attacker could possibly use this to execute arbitrary code.
(CVE-2018-11683, CVE-2018-11684, CVE-2018-11685)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
liblouis-bin 3.5.0-1ubuntu0.2
liblouis14 3.5.0-1ubuntu0.2

Ubuntu 17.10:
liblouis-bin 3.0.0-3ubuntu1.2
liblouis12 3.0.0-3ubuntu1.2

Ubuntu 16.04 LTS:
liblouis-bin 2.6.4-2ubuntu0.3
liblouis9 2.6.4-2ubuntu0.3

Ubuntu 14.04 LTS:
liblouis-bin 2.5.3-2ubuntu1.4
liblouis2 2.5.3-2ubuntu1.4

In general, a standard system update will make all the necessary
changes.

References:
https://usn.ubuntu.com/usn/usn-3672-1
CVE-2018-11683, CVE-2018-11684, CVE-2018-11685

Package Information:
https://launchpad.net/ubuntu/+source/liblouis/3.5.0-1ubuntu0.2
https://launchpad.net/ubuntu/+source/liblouis/3.0.0-3ubuntu1.2
https://launchpad.net/ubuntu/+source/liblouis/2.6.4-2ubuntu0.3
https://launchpad.net/ubuntu/+source/liblouis/2.5.3-2ubuntu1.4