News

Tuesday, January 28, 2014

ubuntu-security-announce Digest, Vol 112, Issue 12

Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com

To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com

You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com

When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."


Today's Topics:

1. [USN-2090-1] Munin vulnerabilities (Marc Deslauriers)
2. Ubuntu 13.04 (Raring Ringtail) End of Life reached on January
27 2014 (Adam Conrad)


----------------------------------------------------------------------

Message: 1
Date: Mon, 27 Jan 2014 13:04:07 -0500
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2090-1] Munin vulnerabilities
Message-ID: <52E69F97.80704@canonical.com>
Content-Type: text/plain; charset="utf-8"

==========================================================================
Ubuntu Security Notice USN-2090-1
January 27, 2014

munin vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.10
- Ubuntu 12.10
- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in Munin.

Software Description:
- munin: Network-wide graphing framework

Details:

Christoph Biedl discovered that Munin incorrectly handled certain
multigraph data. A remote attacker could use this issue to cause Munin to
consume resources, resulting in a denial of service. (CVE-2013-6048)

Christoph Biedl discovered that Munin incorrectly handled certain
multigraph service names. A remote attacker could use this issue to cause
Munin to stop data collection, resulting in a denial of service.
(CVE-2013-6359)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.10:
munin 2.0.17-2ubuntu1.1

Ubuntu 12.10:
munin 2.0.2-1ubuntu2.3

Ubuntu 12.04 LTS:
munin 1.4.6-3ubuntu3.4

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2090-1
CVE-2013-6048, CVE-2013-6359

Package Information:
https://launchpad.net/ubuntu/+source/munin/2.0.17-2ubuntu1.1
https://launchpad.net/ubuntu/+source/munin/2.0.2-1ubuntu2.3
https://launchpad.net/ubuntu/+source/munin/1.4.6-3ubuntu3.4


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 901 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140127/482be0f3/attachment-0001.pgp>

------------------------------

Message: 2
Date: Tue, 28 Jan 2014 02:27:47 -0700
From: Adam Conrad <adconrad@ubuntu.com>
To: ubuntu-announce@lists.ubuntu.com
Cc: ubuntu-security-announce@lists.debian.org
Subject: Ubuntu 13.04 (Raring Ringtail) End of Life reached on January
27 2014
Message-ID: <20140128092747.GN15976@0c3.net>
Content-Type: text/plain; charset=us-ascii

This is a follow-up to the End of Life warning sent last month to
confirm that as of today (Jan 27, 2014), Ubuntu 13.04 is no longer
supported. No more package updates will be accepted to 13.04, and
it will be archived to old-releases.ubuntu.com in the coming weeks.

The original End of Life warning follows, with upgrade instructions:

Ubuntu announced its 13.04 (Raring Ringtail) release almost 9 months
ago, on April 25, 2013. This was the first release with our new 9
month support cycle and, as such, the support period is now nearing
its end and Ubuntu 13.04 will reach end of life on Monday, January
27th. At that time, Ubuntu Security Notices will no longer include
information or updated packages for Ubuntu 13.04.

The supported upgrade path from Ubuntu 13.04 is via Ubuntu 13.10.
Instructions and caveats for the upgrade may be found at:

https://help.ubuntu.com/community/SaucyUpgrades

Ubuntu 13.10 continues to be actively supported with security updates
and select high-impact bug fixes. Announcements of security updates
for Ubuntu releases are sent to the ubuntu-security-announce mailing
list, information about which may be found at:

https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

Since its launch in October 2004 Ubuntu has become one of the most
highly regarded Linux distributions with millions of users in homes,
schools, businesses and governments around the world. Ubuntu is Open
Source software, costs nothing to download, and users are free to
customise or alter their software in order to meet their needs.

On behalf of the Ubuntu Release Team,

Adam Conrad



------------------------------

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


End of ubuntu-security-announce Digest, Vol 112, Issue 12
*********************************************************

No comments:

Blog Archive