Ubuntu 6327 Published by

The following updates has been released for Ubuntu Linux:

USN-3887-1: snapd vulnerability
USN-3888-1: GVfs vulnerability



USN-3887-1: snapd vulnerability


=========================================================================
Ubuntu Security Notice USN-3887-1
February 12, 2019

snapd vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

snapd could be made to run programs as an administrator.

Software Description:
- snapd: Daemon and tooling that enable snap packages

Details:

Chris Moberly discovered that snapd versions 2.28 through 2.37 incorrectly
validated and parsed the remote socket address when performing access
controls on its UNIX socket. A local attacker could use this to access
privileged socket APIs and obtain administrator privileges. On Ubuntu
systems with snaps installed, snapd typically will have already
automatically refreshed itself to snapd 2.37.1 which is unaffected.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
snapd 2.35.5+18.10.1

Ubuntu 18.04 LTS:
snapd 2.34.2+18.04.1

Ubuntu 16.04 LTS:
snapd 2.34.2ubuntu0.1

Ubuntu 14.04 LTS:
snapd 2.34.2~14.04.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3887-1
CVE-2019-7304, https://launchpad.net/bugs/1813365

Package Information:
https://launchpad.net/ubuntu/+source/snapd/2.35.5+18.10.1
https://launchpad.net/ubuntu/+source/snapd/2.34.2+18.04.1
https://launchpad.net/ubuntu/+source/snapd/2.34.2ubuntu0.1
https://launchpad.net/ubuntu/+source/snapd/2.34.2~14.04.1


USN-3888-1: GVfs vulnerability


==========================================================================
Ubuntu Security Notice USN-3888-1
February 12, 2019

gvfs vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.10
- Ubuntu 18.04 LTS

Summary:

GVfs could be made to expose sensitive information if it received
a specially crafted input.

Software Description:
- gvfs: userspace virtual filesystem - GIO module

Details:

It was discovered that GVfs incorrectly handled certain inputs. An
attacker could possibly use this issue to access sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
  gvfs 1.38.1-0ubuntu1.2
  gvfs-backends 1.38.1-0ubuntu1.2

Ubuntu 18.04 LTS:
  gvfs 1.36.1-0ubuntu1.3
  gvfs-backends 1.36.1-0ubuntu1.3

In general, a standard system update will make all the necessary
changes.

References:
  https://usn.ubuntu.com/usn/usn-3888-1
  CVE-2019-3827

Package Information:
  https://launchpad.net/ubuntu/+source/gvfs/1.38.1-0ubuntu1.2
  https://launchpad.net/ubuntu/+source/gvfs/1.36.1-0ubuntu1.3