Ubuntu 6330 Published by

The following updates has been released for Ubuntu Linux:

USN-3464-1: Wget vulnerabilities
USN-3465-1: Irssi vulnerabilities
USN-3466-1: systemd vulnerability



USN-3464-1: Wget vulnerabilities



==========================================================================
Ubuntu Security Notice USN-3464-1
October 26, 2017

wget vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.10
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Wget.

Software Description:
- wget: retrieves files from the web

Details:

Antti Levomki, Christian Jalio, and Joonas Pihlaja discovered that Wget
incorrectly handled certain HTTP responses. A remote attacker could use
this issue to cause Wget to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2017-13089, CVE-2017-13090)

Dawid Golunski discovered that Wget incorrectly handled recursive or
mirroring mode. A remote attacker could possibly use this issue to bypass
intended access list restrictions. (CVE-2016-7098)

Orange Tsai discovered that Wget incorrectly handled CRLF sequences in
HTTP headers. A remote attacker could possibly use this issue to inject
arbitrary HTTP headers. (CVE-2017-6508)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
wget 1.19.1-3ubuntu1.1

Ubuntu 17.04:
wget 1.18-2ubuntu1.1

Ubuntu 16.04 LTS:
wget 1.17.1-1ubuntu1.3

Ubuntu 14.04 LTS:
wget 1.15-1ubuntu1.14.04.3

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3464-1
CVE-2016-7098, CVE-2017-13089, CVE-2017-13090, CVE-2017-6508

Package Information:
https://launchpad.net/ubuntu/+source/wget/1.19.1-3ubuntu1.1
https://launchpad.net/ubuntu/+source/wget/1.18-2ubuntu1.1
https://launchpad.net/ubuntu/+source/wget/1.17.1-1ubuntu1.3
https://launchpad.net/ubuntu/+source/wget/1.15-1ubuntu1.14.04.3

USN-3465-1: Irssi vulnerabilities


==========================================================================
Ubuntu Security Notice USN-3465-1
October 26, 2017

irssi vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.10
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Irssi.

Software Description:
- irssi: terminal based IRC client

Details:

Brian Carpenter discovered that Irssi incorrectly handled messages with
invalid time stamps. A malicious IRC server could use this issue to cause
Irssi to crash, resulting in a denial of service. (CVE-2017-10965)

Brian Carpenter discovered that Irssi incorrectly handled the internal nick
list. A malicious IRC server could use this issue to cause Irssi to crash,
resulting in a denial of service. (CVE-2017-10966)

Joseph Bisch discovered that Irssi incorrectly removed destroyed channels
from the query list. A malicious IRC server could use this issue to cause
Irssi to crash, resulting in a denial of service. (CVE-2017-15227)

Hanno Böck discovered that Irssi incorrectly handled themes. If a user were
tricked into using a malicious theme, a attacker could use this issue to
cause Irssi to crash, resulting in a denial of service. (CVE-2017-15228)

Joseph Bisch discovered that Irssi incorrectly handled certain DCC CTCP
messages. A malicious IRC server could use this issue to cause Irssi to
crash, resulting in a denial of service. (CVE-2017-15721)

Joseph Bisch discovered that Irssi incorrectly handled certain channel IDs.
A malicious IRC server could use this issue to cause Irssi to crash,
resulting in a denial of service. (CVE-2017-15722)

Joseph Bisch discovered that Irssi incorrectly handled certain long nicks
or targets. A malicious IRC server could use this issue to cause Irssi to
crash, resulting in a denial of service. (CVE-2017-15723)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
irssi 1.0.4-1ubuntu2.1

Ubuntu 17.04:
irssi 0.8.20-2ubuntu2.2

Ubuntu 16.04 LTS:
irssi 0.8.19-1ubuntu1.5

Ubuntu 14.04 LTS:
irssi 0.8.15-5ubuntu3.3

After a standard system update you need to restart Irssi to make all the
necessary changes.

References:
https://www.ubuntu.com/usn/usn-3465-1
CVE-2017-10965, CVE-2017-10966, CVE-2017-15227, CVE-2017-15228,
CVE-2017-15721, CVE-2017-15722, CVE-2017-15723

Package Information:
https://launchpad.net/ubuntu/+source/irssi/1.0.4-1ubuntu2.1
https://launchpad.net/ubuntu/+source/irssi/0.8.20-2ubuntu2.2
https://launchpad.net/ubuntu/+source/irssi/0.8.19-1ubuntu1.5
https://launchpad.net/ubuntu/+source/irssi/0.8.15-5ubuntu3.3

USN-3466-1: systemd vulnerability


==========================================================================
Ubuntu Security Notice USN-3466-1
October 26, 2017

systemd vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.10
- Ubuntu 17.04

Summary:

systemd could be made to temporarily stop responding if it received
specially crafted network traffic.

Software Description:
- systemd: system and service manager

Details:

Karim Hossen & Thomas Imbert discovered that systemd-resolved incorrectly
handled certain DNS responses. A remote attacker could possibly use this
issue to cause systemd to temporarily stop responding, resulting in a
denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
systemd 234-2ubuntu12.1

Ubuntu 17.04:
systemd 232-21ubuntu7.1

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3466-1
CVE-2017-15908

Package Information:
https://launchpad.net/ubuntu/+source/systemd/234-2ubuntu12.1
https://launchpad.net/ubuntu/+source/systemd/232-21ubuntu7.1