News

Tuesday, November 06, 2012

ubuntu-security-announce Digest, Vol 98, Issue 1

Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com

To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com

You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com

When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."


Today's Topics:

1. [USN-1621-1] MySQL vulnerabilities (Marc Deslauriers)
2. [USN-1622-1] Munin vulnerabilities (Marc Deslauriers)
3. [USN-1623-1] Mesa vulnerability (Marc Deslauriers)
4. [USN-1624-1] Remote Login Service vulnerability (Marc Deslauriers)


----------------------------------------------------------------------

Message: 1
Date: Mon, 05 Nov 2012 08:45:18 -0500
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-1621-1] MySQL vulnerabilities
Message-ID: <5097C2EE.8040906@canonical.com>
Content-Type: text/plain; charset="iso-8859-1"

==========================================================================
Ubuntu Security Notice USN-1621-1
November 05, 2012

mysql-5.1, mysql-5.5, mysql-dfsg-5.1 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in MySQL.

Software Description:
- mysql-5.5: MySQL database
- mysql-5.1: MySQL database
- mysql-dfsg-5.1: MySQL database

Details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 5.1.66 in Ubuntu 10.04 LTS and Ubuntu 11.10.
Ubuntu 12.04 LTS and Ubuntu 12.10 have been updated to MySQL 5.5.28.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html
http://dev.mysql.com/doc/refman/5.5/en/news-5-5-x.html
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
mysql-server-5.5 5.5.28-0ubuntu0.12.10.1

Ubuntu 12.04 LTS:
mysql-server-5.5 5.5.28-0ubuntu0.12.04.2

Ubuntu 11.10:
mysql-server-5.1 5.1.66-0ubuntu0.11.10.2

Ubuntu 10.04 LTS:
mysql-server-5.1 5.1.66-0ubuntu0.10.04.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1621-1
CVE-2012-3144, CVE-2012-3147, CVE-2012-3149, CVE-2012-3150,
CVE-2012-3156, CVE-2012-3158, CVE-2012-3160, CVE-2012-3163,
CVE-2012-3166, CVE-2012-3167, CVE-2012-3173, CVE-2012-3177,
CVE-2012-3180, CVE-2012-3197, https://launchpad.net/bugs/1068158

Package Information:
https://launchpad.net/ubuntu/+source/mysql-5.5/5.5.28-0ubuntu0.12.10.1
https://launchpad.net/ubuntu/+source/mysql-5.5/5.5.28-0ubuntu0.12.04.2
https://launchpad.net/ubuntu/+source/mysql-5.1/5.1.66-0ubuntu0.11.10.2

https://launchpad.net/ubuntu/+source/mysql-dfsg-5.1/5.1.66-0ubuntu0.10.04.1


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 897 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20121105/7caf4885/attachment-0001.pgp>

------------------------------

Message: 2
Date: Mon, 05 Nov 2012 09:18:19 -0500
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-1622-1] Munin vulnerabilities
Message-ID: <5097CAAB.3060506@canonical.com>
Content-Type: text/plain; charset="iso-8859-1"

==========================================================================
Ubuntu Security Notice USN-1622-1
November 05, 2012

munin vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in Munin.

Software Description:
- munin: Network-wide graphing framework

Details:

It was discovered that the Munin qmailscan plugin incorrectly handled
temporary files. A local attacker could use this issue to possibly
overwrite arbitrary files. This issue only affected Ubuntu 10.04 LTS,
Ubuntu 11.10, and Ubuntu 12.04 LTS. (CVE-2012-2103)

It was discovered that Munin incorrectly handled plugin state file
permissions. An attacker obtaining privileges of the munin user could use
this issue to escalate privileges to root. (CVE-2012-3512)

It was discovered that Munin incorrectly handled specifying an alternate
configuration file. A remote attacker could possibly use this issue to
execute arbitrary code with the privileges of the web server. This issue
only affected Ubuntu 12.10. (CVE-2012-3513)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
munin 2.0.2-1ubuntu2.2

Ubuntu 12.04 LTS:
munin 1.4.6-3ubuntu3.3

Ubuntu 11.10:
munin 1.4.5-3ubuntu4.11.10.2

Ubuntu 10.04 LTS:
munin 1.4.4-1ubuntu1.2

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1622-1
CVE-2012-2103, CVE-2012-3512, CVE-2012-3513

Package Information:
https://launchpad.net/ubuntu/+source/munin/2.0.2-1ubuntu2.2
https://launchpad.net/ubuntu/+source/munin/1.4.6-3ubuntu3.3
https://launchpad.net/ubuntu/+source/munin/1.4.5-3ubuntu4.11.10.2
https://launchpad.net/ubuntu/+source/munin/1.4.4-1ubuntu1.2


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 897 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20121105/517237c4/attachment-0001.pgp>

------------------------------

Message: 3
Date: Mon, 05 Nov 2012 12:29:59 -0500
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-1623-1] Mesa vulnerability
Message-ID: <5097F797.8020202@canonical.com>
Content-Type: text/plain; charset="iso-8859-1"

==========================================================================
Ubuntu Security Notice USN-1623-1
November 05, 2012

mesa vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS

Summary:

Mesa could be made to crash or run programs if it processed specially
crafted data.

Software Description:
- mesa: free implementation of the EGL API

Details:

It was discovered that Mesa incorrectly handled certain arrays. An attacker
could use this issue to cause Mesa to crash, resulting in a denial of
service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
libegl1-mesa 8.0.4-0ubuntu0.2
libgl1-mesa-dri 8.0.4-0ubuntu0.2
libgl1-mesa-glx 8.0.4-0ubuntu0.2
libglapi-mesa 8.0.4-0ubuntu0.2
libgles1-mesa 8.0.4-0ubuntu0.2
libgles2-mesa 8.0.4-0ubuntu0.2
libglu1-mesa 8.0.4-0ubuntu0.2
libopenvg1-mesa 8.0.4-0ubuntu0.2
libosmesa6 8.0.4-0ubuntu0.2
libxatracker1 8.0.4-0ubuntu0.2

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1623-1
CVE-2012-2864

Package Information:
https://launchpad.net/ubuntu/+source/mesa/8.0.4-0ubuntu0.2


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 897 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20121105/72c889c8/attachment-0001.pgp>

------------------------------

Message: 4
Date: Mon, 05 Nov 2012 16:39:21 -0500
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-1624-1] Remote Login Service vulnerability
Message-ID: <50983209.9020208@canonical.com>
Content-Type: text/plain; charset="iso-8859-1"

==========================================================================
Ubuntu Security Notice USN-1624-1
November 05, 2012

remote-login-service vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10

Summary:

Remote Login Service could be made to expose sensitive information.

Software Description:
- remote-login-service: Service to track the remote servers to use

Details:

It was discovered that Remote Login Service incorrectly purged account
information when switching users. A local attacker could use this issue to
possibly obtain sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
remote-login-service 1.0.0-0ubuntu1.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1624-1
CVE-2012-0959

Package Information:
https://launchpad.net/ubuntu/+source/remote-login-service/1.0.0-0ubuntu1.1


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 897 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20121105/82f67596/attachment-0001.pgp>

------------------------------

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


End of ubuntu-security-announce Digest, Vol 98, Issue 1
*******************************************************

No comments:

Blog Archive