Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-1621-1] MySQL vulnerabilities (Marc Deslauriers)
2. [USN-1622-1] Munin vulnerabilities (Marc Deslauriers)
3. [USN-1623-1] Mesa vulnerability (Marc Deslauriers)
4. [USN-1624-1] Remote Login Service vulnerability (Marc Deslauriers)
----------------------------------------------------------------------
Message: 1
Date: Mon, 05 Nov 2012 08:45:18 -0500
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-1621-1] MySQL vulnerabilities
Message-ID: <5097C2EE.8040906@canonical.com>
Content-Type: text/plain; charset="iso-8859-1"
==========================================================================
Ubuntu Security Notice USN-1621-1
November 05, 2012
mysql-5.1, mysql-5.5, mysql-dfsg-5.1 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in MySQL.
Software Description:
- mysql-5.5: MySQL database
- mysql-5.1: MySQL database
- mysql-dfsg-5.1: MySQL database
Details:
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.
MySQL has been updated to 5.1.66 in Ubuntu 10.04 LTS and Ubuntu 11.10.
Ubuntu 12.04 LTS and Ubuntu 12.10 have been updated to MySQL 5.5.28.
In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.
Please see the following for more information:
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html
http://dev.mysql.com/doc/refman/5.5/en/news-5-5-x.html
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
mysql-server-5.5 5.5.28-0ubuntu0.12.10.1
Ubuntu 12.04 LTS:
mysql-server-5.5 5.5.28-0ubuntu0.12.04.2
Ubuntu 11.10:
mysql-server-5.1 5.1.66-0ubuntu0.11.10.2
Ubuntu 10.04 LTS:
mysql-server-5.1 5.1.66-0ubuntu0.10.04.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1621-1
CVE-2012-3144, CVE-2012-3147, CVE-2012-3149, CVE-2012-3150,
CVE-2012-3156, CVE-2012-3158, CVE-2012-3160, CVE-2012-3163,
CVE-2012-3166, CVE-2012-3167, CVE-2012-3173, CVE-2012-3177,
CVE-2012-3180, CVE-2012-3197, https://launchpad.net/bugs/1068158
Package Information:
https://launchpad.net/ubuntu/+source/mysql-5.5/5.5.28-0ubuntu0.12.10.1
https://launchpad.net/ubuntu/+source/mysql-5.5/5.5.28-0ubuntu0.12.04.2
https://launchpad.net/ubuntu/+source/mysql-5.1/5.1.66-0ubuntu0.11.10.2
https://launchpad.net/ubuntu/+source/mysql-dfsg-5.1/5.1.66-0ubuntu0.10.04.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 897 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20121105/7caf4885/attachment-0001.pgp>
------------------------------
Message: 2
Date: Mon, 05 Nov 2012 09:18:19 -0500
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-1622-1] Munin vulnerabilities
Message-ID: <5097CAAB.3060506@canonical.com>
Content-Type: text/plain; charset="iso-8859-1"
==========================================================================
Ubuntu Security Notice USN-1622-1
November 05, 2012
munin vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in Munin.
Software Description:
- munin: Network-wide graphing framework
Details:
It was discovered that the Munin qmailscan plugin incorrectly handled
temporary files. A local attacker could use this issue to possibly
overwrite arbitrary files. This issue only affected Ubuntu 10.04 LTS,
Ubuntu 11.10, and Ubuntu 12.04 LTS. (CVE-2012-2103)
It was discovered that Munin incorrectly handled plugin state file
permissions. An attacker obtaining privileges of the munin user could use
this issue to escalate privileges to root. (CVE-2012-3512)
It was discovered that Munin incorrectly handled specifying an alternate
configuration file. A remote attacker could possibly use this issue to
execute arbitrary code with the privileges of the web server. This issue
only affected Ubuntu 12.10. (CVE-2012-3513)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
munin 2.0.2-1ubuntu2.2
Ubuntu 12.04 LTS:
munin 1.4.6-3ubuntu3.3
Ubuntu 11.10:
munin 1.4.5-3ubuntu4.11.10.2
Ubuntu 10.04 LTS:
munin 1.4.4-1ubuntu1.2
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1622-1
CVE-2012-2103, CVE-2012-3512, CVE-2012-3513
Package Information:
https://launchpad.net/ubuntu/+source/munin/2.0.2-1ubuntu2.2
https://launchpad.net/ubuntu/+source/munin/1.4.6-3ubuntu3.3
https://launchpad.net/ubuntu/+source/munin/1.4.5-3ubuntu4.11.10.2
https://launchpad.net/ubuntu/+source/munin/1.4.4-1ubuntu1.2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 897 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20121105/517237c4/attachment-0001.pgp>
------------------------------
Message: 3
Date: Mon, 05 Nov 2012 12:29:59 -0500
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-1623-1] Mesa vulnerability
Message-ID: <5097F797.8020202@canonical.com>
Content-Type: text/plain; charset="iso-8859-1"
==========================================================================
Ubuntu Security Notice USN-1623-1
November 05, 2012
mesa vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Mesa could be made to crash or run programs if it processed specially
crafted data.
Software Description:
- mesa: free implementation of the EGL API
Details:
It was discovered that Mesa incorrectly handled certain arrays. An attacker
could use this issue to cause Mesa to crash, resulting in a denial of
service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
libegl1-mesa 8.0.4-0ubuntu0.2
libgl1-mesa-dri 8.0.4-0ubuntu0.2
libgl1-mesa-glx 8.0.4-0ubuntu0.2
libglapi-mesa 8.0.4-0ubuntu0.2
libgles1-mesa 8.0.4-0ubuntu0.2
libgles2-mesa 8.0.4-0ubuntu0.2
libglu1-mesa 8.0.4-0ubuntu0.2
libopenvg1-mesa 8.0.4-0ubuntu0.2
libosmesa6 8.0.4-0ubuntu0.2
libxatracker1 8.0.4-0ubuntu0.2
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1623-1
CVE-2012-2864
Package Information:
https://launchpad.net/ubuntu/+source/mesa/8.0.4-0ubuntu0.2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 897 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20121105/72c889c8/attachment-0001.pgp>
------------------------------
Message: 4
Date: Mon, 05 Nov 2012 16:39:21 -0500
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-1624-1] Remote Login Service vulnerability
Message-ID: <50983209.9020208@canonical.com>
Content-Type: text/plain; charset="iso-8859-1"
==========================================================================
Ubuntu Security Notice USN-1624-1
November 05, 2012
remote-login-service vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
Summary:
Remote Login Service could be made to expose sensitive information.
Software Description:
- remote-login-service: Service to track the remote servers to use
Details:
It was discovered that Remote Login Service incorrectly purged account
information when switching users. A local attacker could use this issue to
possibly obtain sensitive information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
remote-login-service 1.0.0-0ubuntu1.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1624-1
CVE-2012-0959
Package Information:
https://launchpad.net/ubuntu/+source/remote-login-service/1.0.0-0ubuntu1.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 897 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20121105/82f67596/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 98, Issue 1
*******************************************************
News
Subscribe to:
Post Comments (Atom)
Blog Archive
-
▼
2012
(533)
-
▼
November
(12)
- ubuntu-security-announce Digest, Vol 98, Issue 13
- ubuntu-security-announce Digest, Vol 98, Issue 12
- ubuntu-security-announce Digest, Vol 98, Issue 11
- ubuntu-security-announce Digest, Vol 98, Issue 10
- ubuntu-security-announce Digest, Vol 98, Issue 9
- ubuntu-security-announce Digest, Vol 98, Issue 8
- ubuntu-security-announce Digest, Vol 98, Issue 7
- ubuntu-security-announce Digest, Vol 98, Issue 5
- ubuntu-security-announce Digest, Vol 98, Issue 4
- ubuntu-security-announce Digest, Vol 98, Issue 3
- ubuntu-security-announce Digest, Vol 98, Issue 2
- ubuntu-security-announce Digest, Vol 98, Issue 1
-
▼
November
(12)
No comments:
Post a Comment