Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2006-1] MySQL vulnerabilities (Marc Deslauriers)
2. [USN-2007-1] Apport vulnerability (Marc Deslauriers)
3. [USN-2008-1] Suds vulnerability (Marc Deslauriers)
----------------------------------------------------------------------
Message: 1
Date: Thu, 24 Oct 2013 14:15:03 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2006-1] MySQL vulnerabilities
Message-ID: <526963A7.4010104@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2006-1
October 24, 2013
mysql-5.5, mysql-dfsg-5.1 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.10
- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in MySQL.
Software Description:
- mysql-5.5: MySQL database
- mysql-dfsg-5.1: MySQL database
Details:
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.
MySQL has been updated to 5.1.72 in Ubuntu 10.04 LTS. Ubuntu 12.04 LTS,
Ubuntu 12.10, Ubuntu 13.04 and Ubuntu 13.10 have been updated to
MySQL 5.5.34.
In addition to security fixes, the updated packages contain bug fixes,
new features, and possibly incompatible changes.
Please see the following for more information:
http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-72.html
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-34.html
http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.10:
mysql-server-5.5 5.5.34-0ubuntu0.13.10.1
Ubuntu 13.04:
mysql-server-5.5 5.5.34-0ubuntu0.13.04.1
Ubuntu 12.10:
mysql-server-5.5 5.5.34-0ubuntu0.12.10.1
Ubuntu 12.04 LTS:
mysql-server-5.5 5.5.34-0ubuntu0.12.04.1
Ubuntu 10.04 LTS:
mysql-server-5.1 5.1.72-0ubuntu0.10.04.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2006-1
CVE-2013-3839, CVE-2013-5807
Package Information:
https://launchpad.net/ubuntu/+source/mysql-5.5/5.5.34-0ubuntu0.13.10.1
https://launchpad.net/ubuntu/+source/mysql-5.5/5.5.34-0ubuntu0.13.04.1
https://launchpad.net/ubuntu/+source/mysql-5.5/5.5.34-0ubuntu0.12.10.1
https://launchpad.net/ubuntu/+source/mysql-5.5/5.5.34-0ubuntu0.12.04.1
https://launchpad.net/ubuntu/+source/mysql-dfsg-5.1/5.1.72-0ubuntu0.10.04.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 901 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20131024/8ab170ee/attachment-0001.pgp>
------------------------------
Message: 2
Date: Thu, 24 Oct 2013 14:15:24 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2007-1] Apport vulnerability
Message-ID: <526963BC.6060101@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2007-1
October 24, 2013
apport vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.10
- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
Summary:
Apport could be made to expose privileged information.
Software Description:
- apport: automatically generate crash reports for debugging
Details:
Martin Carpenter discovered that Apport set incorrect permissions on core
dump files generated by setuid binaries. A local attacker could possibly
use this issue to obtain privileged information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.10:
apport 2.12.5-0ubuntu2.1
Ubuntu 13.04:
apport 2.9.2-0ubuntu8.5
Ubuntu 12.10:
apport 2.6.1-0ubuntu13
Ubuntu 12.04 LTS:
apport 2.0.1-0ubuntu17.6
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2007-1
CVE-2013-1067
Package Information:
https://launchpad.net/ubuntu/+source/apport/2.12.5-0ubuntu2.1
https://launchpad.net/ubuntu/+source/apport/2.9.2-0ubuntu8.5
https://launchpad.net/ubuntu/+source/apport/2.6.1-0ubuntu13
https://launchpad.net/ubuntu/+source/apport/2.0.1-0ubuntu17.6
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 901 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20131024/001a12d3/attachment-0001.pgp>
------------------------------
Message: 3
Date: Thu, 24 Oct 2013 14:15:43 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2008-1] Suds vulnerability
Message-ID: <526963CF.4090408@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2008-1
October 24, 2013
suds vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
Summary:
Suds could be made to overwrite files.
Software Description:
- suds: Lightweight SOAP client for Python
Details:
Ralph Loader discovered that Suds incorrectly handled temporary files. A
local attacker could possibly use this issue to overwrite arbitrary files.
In the default installation of Ubuntu, this should be prevented by the Yama
link restrictions.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.04:
python-suds 0.4.1-5ubuntu0.13.04.1
Ubuntu 12.10:
python-suds 0.4.1-5ubuntu0.12.10.1
Ubuntu 12.04 LTS:
python-suds 0.4.1-2ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2008-1
CVE-2013-2217
Package Information:
https://launchpad.net/ubuntu/+source/suds/0.4.1-5ubuntu0.13.04.1
https://launchpad.net/ubuntu/+source/suds/0.4.1-5ubuntu0.12.10.1
https://launchpad.net/ubuntu/+source/suds/0.4.1-2ubuntu1.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 901 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20131024/268ab06f/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 109, Issue 8
********************************************************
News
Subscribe to:
Post Comments (Atom)
Blog Archive
-
▼
2013
(149)
-
▼
October
(9)
- ubuntu-security-announce Digest, Vol 109, Issue 9
- ubuntu-security-announce Digest, Vol 109, Issue 8
- ubuntu-security-announce Digest, Vol 109, Issue 7
- ubuntu-security-announce Digest, Vol 109, Issue 6
- ubuntu-security-announce Digest, Vol 109, Issue 5
- ubuntu-security-announce Digest, Vol 109, Issue 4
- ubuntu-security-announce Digest, Vol 109, Issue 3
- ubuntu-security-announce Digest, Vol 109, Issue 2
- ubuntu-security-announce Digest, Vol 109, Issue 1
-
▼
October
(9)
No comments:
Post a Comment