==========================================================================
Ubuntu Security Notice USN-3298-1
May 24, 2017
miniupnpc vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 16.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
MiniUPnP could be made to crash or run programs if it received specially
crafted network traffic.
Software Description:
– miniupnpc: UPnP IGD client lightweight library
Details:
It was discovered that MiniUPnP incorrectly handled memory. A remote
attacker could use this issue to cause a denial of service or possibly
execute arbitrary code with privileges of the user running an application
that uses the MiniUPnP library.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.10:
libminiupnpc10 1.9.20140610-2ubuntu2.16.10.1
Ubuntu 16.04 LTS:
libminiupnpc10 1.9.20140610-2ubuntu2.16.04.1
Ubuntu 14.04 LTS:
libminiupnpc8 1.6-3ubuntu2.14.04.3
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3298-1
CVE-2017-8798
Package Information:
https://launchpad.net/ubuntu/+source/miniupnpc/1.9.20140610-2ubuntu2.16.10.1
https://launchpad.net/ubuntu/+source/miniupnpc/1.9.20140610-2ubuntu2.16.04.1
https://launchpad.net/ubuntu/+source/miniupnpc/1.6-3ubuntu2.14.04.3
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=WkkG
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-3298-2
May 24, 2017
miniupnpc vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 17.04
Summary:
MiniUPnP could be made to crash or run programs if it received specially
crafted network traffic.
Software Description:
– miniupnpc: UPnP IGD client lightweight library
Details:
USN-3298-1 fixed a vulnerability in MiniUPnP. This update provides the
corresponding update for Ubuntu 17.04.
Original advisory details:
It was discovered that MiniUPnP incorrectly handled memory. A remote
attacker could use this issue to cause a denial of service or possibly
execute arbitrary code with privileges of the user running an application
that uses the MiniUPnP library.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
libminiupnpc10 1.9.20140610-2ubuntu2.17.04.1
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3298-2
https://www.ubuntu.com/usn/usn-3298-1
CVE-2017-8798
Package Information:
https://launchpad.net/ubuntu/+source/miniupnpc/1.9.20140610-2ubuntu2.17.04.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
iQIcBAEBCgAGBQJZJZkOAAoJEGVp2FWnRL6Tby8QAJXlw6rarC5PilEsV8NRKb5Y
eO13fuLg5UL6tdaWWbf3WuXUPbXen/7VswJY35/uRfuFF8aJHplesmNx31WSUZMx
TA6QGC4mDI7EEl+XhzDqGVxnEPvj3MzoKgqpl9GnwwVmJ7FWt3Zul7IeKX6CHO1s
223r8Nd/+9EAAeeNAHyim0RaM8C+W7mYfqvfLlWSRBJHzjZhGTU1WmG5QBsq2n0N
haK92wUznWrYQ2EVniKyNfHkIAM717Ab5uQoo50yz3JRY5T+4KlceniMDDGth7rz
WxACQ6kGh+6GD0wwJA6WR4GX91j1nyQqgWKJMIdbzZplb16EORR2t6jzTcL9BgVS
dj8PjcZq9wFN6P3Ezga3WtDvSwsFnlLrP72Pr80dkGcPYnXo/X5VrN57nruNK4Pm
oABwzpl15gmg1U5E5RNHJDWb7WkYAe0Y8cqLStVI/1ceJ6Fe7dG30PYXnRH2QRaD
Po9WRI7hEXloigCVlFNHwRNflB2odp/Wgh4O2aNcuJ4CCUtERY0mItr2yxtMMGbZ
grN7WupWmKfOzIQ87qfh2ol+eNma7wGM+mISrM0LmswolpiZ4Btex+ZzukHGn8JC
3BWEQMyPvRotoL5dqO6SMMcdEgDyiiQaxKjhZQnasBsmxNIMMV2pItZPwWK5elR6
kXkwhYa3rlWflDEIHakm
=bIbY
—–END PGP SIGNATURE—–
—