News

Friday, July 18, 2014

ubuntu-security-announce Digest, Vol 118, Issue 11

Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com

To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com

You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com

When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."


Today's Topics:

1. [USN-2291-1] MySQL vulnerabilities (Marc Deslauriers)
2. Ubuntu 13.10 (Saucy Salamander) End of Life reached on July
17 2014 (Adam Conrad)
3. [USN-2292-1] LWP::Protocol::https vulnerability (Marc Deslauriers)


----------------------------------------------------------------------

Message: 1
Date: Thu, 17 Jul 2014 10:24:28 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2291-1] MySQL vulnerabilities
Message-ID: <53C7DC9C.6070303@canonical.com>
Content-Type: text/plain; charset="utf-8"

==========================================================================
Ubuntu Security Notice USN-2291-1
July 17, 2014

mysql-5.5 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in MySQL.

Software Description:
- mysql-5.5: MySQL database

Details:

Multiple security issues were discovered in MySQL and this update includes
a new upstream MySQL version to fix these issues. MySQL has been updated to
5.5.38.

In addition to security fixes, the updated packages contain bug fixes,
new features, and possibly incompatible changes.

Please see the following for more information:
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-38.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
mysql-server-5.5 5.5.38-0ubuntu0.14.04.1

Ubuntu 12.04 LTS:
mysql-server-5.5 5.5.38-0ubuntu0.12.04.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2291-1
CVE-2014-2494, CVE-2014-4207, CVE-2014-4258, CVE-2014-4260

Package Information:
https://launchpad.net/ubuntu/+source/mysql-5.5/5.5.38-0ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/mysql-5.5/5.5.38-0ubuntu0.12.04.1


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140717/927be5fd/attachment-0001.pgp>

------------------------------

Message: 2
Date: Thu, 17 Jul 2014 10:19:36 -0600
From: Adam Conrad <adconrad@ubuntu.com>
To: ubuntu-announce@lists.ubuntu.com
Cc: ubuntu-security-announce@lists.ubuntu.com
Subject: Ubuntu 13.10 (Saucy Salamander) End of Life reached on July
17 2014
Message-ID: <20140717161936.GP28005@0c3.net>
Content-Type: text/plain; charset=us-ascii

This is a follow-up to the End of Life warning sent last month to
confirm that as of today (July 17, 2014), Ubuntu 13.10 is no longer
supported. No more package updates will be accepted to 13.10, and
it will be archived to old-releases.ubuntu.com in the coming weeks.

The original End of Life warning follows, with upgrade instructions:

Ubuntu announced its 13.10 (Saucy Salamander) release almost 9 months
ago, on October 17, 2013. This was the second release with our new 9
month support cycle and, as such, the support period is now nearing
its end and Ubuntu 13.10 will reach end of life on Thursday, July
17th. At that time, Ubuntu Security Notices will no longer include
information or updated packages for Ubuntu 13.10.

The supported upgrade path from Ubuntu 13.10 is via Ubuntu 14.04 LTS.
Instructions and caveats for the upgrade may be found at:

https://help.ubuntu.com/community/TrustyUpgrades

Ubuntu 14.04 LTS continues to be actively supported with security
updates and select high-impact bug fixes. Announcements of security
updates for Ubuntu releases are sent to the ubuntu-security-announce
mailing list, information about which may be found at:

https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

Since its launch in October 2004 Ubuntu has become one of the most
highly regarded Linux distributions with millions of users in homes,
schools, businesses and governments around the world. Ubuntu is Open
Source software, costs nothing to download, and users are free to
customise or alter their software in order to meet their needs.

On behalf of the Ubuntu Release Team,

Adam Conrad



------------------------------

Message: 3
Date: Thu, 17 Jul 2014 13:51:14 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2292-1] LWP::Protocol::https vulnerability
Message-ID: <53C80D12.1000300@canonical.com>
Content-Type: text/plain; charset="utf-8"

==========================================================================
Ubuntu Security Notice USN-2292-1
July 17, 2014

liblwp-protocol-https-perl vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS

Summary:

LWP::Protocol::https could be made to expose sensitive information over the
network.

Software Description:
- liblwp-protocol-https-perl: HTTPS driver for LWP::UserAgent

Details:

It was discovered that the LWP::Protocol::https perl module incorrectly
disabled peer certificate verification completely when only hostname
verification was requested to be disabled. If a remote attacker were able
to perform a man-in-the-middle attack, this flaw could possibly be
exploited in certain scenarios to alter or compromise confidential
information in applications that used the LWP::Protocol::https module.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
liblwp-protocol-https-perl 6.04-2ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2292-1
CVE-2014-3230

Package Information:
https://launchpad.net/ubuntu/+source/liblwp-protocol-https-perl/6.04-2ubuntu0.1


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140717/3f7abf71/attachment-0001.pgp>

------------------------------

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


End of ubuntu-security-announce Digest, Vol 118, Issue 11
*********************************************************

No comments:

Blog Archive