This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============1479653862188859999== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="zaGQy2bQbRp9oLIuGZNANEN19EHhqLTqA"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --zaGQy2bQbRp9oLIuGZNANEN19EHhqLTqA Content-Type: multipart/mixed; boundary="AjsrDgzEiOcNGOKuvFJ1TF4UJ3CEH20Kk"
--AjsrDgzEiOcNGOKuvFJ1TF4UJ3CEH20Kk Content-Type: text/plain; charset=utf-8 Content-Language: en-C Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4416-1 July 06, 2020
glibc vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.10 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in GNU C Library.
Software Description: - glibc: GNU C Library
Details:
Florian Weimer discovered that the GNU C Library incorrectly handled certain memory operations. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-12133)
It was discovered that the GNU C Library incorrectly handled certain SSE2-optimized memmove operations. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-18269)
It was discovered that the GNU C Library incorrectly handled certain pathname operations. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-11236)
It was discovered that the GNU C Library incorrectly handled certain AVX-512-optimized mempcpy operations. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-11237)
It was discovered that the GNU C Library incorrectly handled certain hostname loookups. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-19591)
Jakub Wilk discovered that the GNU C Library incorrectly handled certain memalign functions. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2018-6485)
It was discovered that the GNU C Library incorrectly ignored the LD_PREFER_MAP_32BIT_EXEC environment variable after security transitions. A local attacker could use this issue to bypass ASLR restrictions. (CVE-2019-19126)
It was discovered that the GNU C Library incorrectly handled certain regular expressions. A remote attacker could possibly use this issue to cause the GNU C Library to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-9169)
It was discovered that the GNU C Library incorrectly handled certain bit patterns. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2020-10029)
It was discovered that the GNU C Library incorrectly handled certain signal trampolines on PowerPC. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-1751)
It was discovered that the GNU C Library incorrectly handled tilde expansion. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-1752)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.10: libc6 2.30-0ubuntu2.2
Ubuntu 18.04 LTS: libc6 2.27-3ubuntu1.2
Ubuntu 16.04 LTS: libc6 2.23-0ubuntu11.2
After a standard system update you need to reboot your computer to make all the necessary changes.
References: https://usn.ubuntu.com/4416-1 CVE-2017-12133, CVE-2017-18269, CVE-2018-11236, CVE-2018-11237, CVE-2018-19591, CVE-2018-6485, CVE-2019-19126, CVE-2019-9169, CVE-2020-10029, CVE-2020-1751, CVE-2020-1752
Package Information: https://launchpad.net/ubuntu/+source/glibc/2.30-0ubuntu2.2 https://launchpad.net/ubuntu/+source/glibc/2.27-3ubuntu1.2 https://launchpad.net/ubuntu/+source/glibc/2.23-0ubuntu11.2
--AjsrDgzEiOcNGOKuvFJ1TF4UJ3CEH20Kk--
--zaGQy2bQbRp9oLIuGZNANEN19EHhqLTqA Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAl8DfgkACgkQZWnYVadE vpPjhBAAuA3JJNOvWjilBvuDosF/eF/E8rh0YrMeD0aUg6v+wDdoKByk7cwxOu4y J6+3i65Q5ZkL167BsM5P1wUpN5ENXeSFbhH4QrGIA6+AAJdVu5UBJ7/gAQTy0g/F sCTeDT0iKP9w5BWp9epkCDOb0rc0cCP0gyQO5ClZFe9kIXAIsQcC5P6bE3RfoX7w 9mXvbFX6TeldRQUXEr4tmYTy8pAqEhC9PLgSHPYWONEoEl2rtiW0rQuLFAhzk1bG BGMdYV+k0b8+60+Fvr3HxrpMXd2CeDvpLD923CWMAMenDv3eeSlI1BvL50YP44pj XQzzunQpa2b8vWPEbZwq5G2Wi9oO+Tamg3w2OJqUGhSsbZJVoC78o1iHtV3XZLgk oZt4xzsWSip9laNQoT20gFI46EkwCLRWeqEo4utqOifVzOyilqTAa34p4yT4f5bN 1yYE1S3zuYPvY6rJfTuF4sJsNiy4Cfr9x+qPtnNL3NWvD0TsnYhIhhFPaUX33jW9 i6vZT09ciDN5yHCRNG8niXQ3wD8INbowEIECiEMkbmFAfs9nEWSS5u1QbKyGh21x IuDqph8EVTJECKxBs1r8l7Clz93lMr094L0d0tIN4O5KGWQvNhBgz5tX9P3pzfUL XdcSjOr7f+WPA9uy+xwhLT8IdIXl0xKpG8OwhLzrS4GCOSO6fcE= =CVRq -----END PGP SIGNATURE-----
--zaGQy2bQbRp9oLIuGZNANEN19EHhqLTqA--
--===============1479653862188859999== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============1479653862188859999==--
|