RHSA-2015:0867-1: Important: qemu-kvm security and bug fix update

Red Hat Enterprise Linux: An updated qemu-kvm package that fixes one security issue and one bug is
now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
CVE-2014-8106

RHSA-2015:0864-1: Important: kernel security and bug fix update

Red Hat Enterprise Linux: Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
CVE-2014-3215, CVE-2014-3690, CVE-2014-7825, CVE-2014-7826, CVE-2014-8171, CVE-2014-8884, CVE-2014-9529, CVE-2014-9584, CVE-2015-1421

RHSA-2015:0863-1: Moderate: glibc security and bug fix update

Red Hat Enterprise Linux: Updated glibc packages that fix two security issues and one bug are now
available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
CVE-2013-7423, CVE-2015-1781

USN-2573-1: OpenJDK 6 vulnerabilities

Ubuntu Security Notice USN-2573-1

21st April, 2015

openjdk-6 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

Several security issues were fixed in OpenJDK 6.

Software description

  • openjdk-6
    – Open Source Java implementation

Details

Several vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure, data integrity and availability. An attacker
could exploit these to cause a denial of service or expose sensitive
data over the network. (CVE-2015-0460, CVE-2015-0469)

Alexander Cherepanov discovered that OpenJDK JRE was vulnerable to
directory traversal issues with respect to handling jar files. An
attacker could use this to expose sensitive data. (CVE-2015-0480)

Florian Weimer discovered that the RSA implementation in the JCE
component in OpenJDK JRE did not follow recommended practices for
implementing RSA signatures. An attacker could use this to expose
sensitive data. (CVE-2015-0478)

A vulnerability was discovered in the OpenJDK JRE related to data
integrity. An attacker could exploit this expose sensitive data over
the network. (CVE-2015-0477)

A vulnerability was discovered in the OpenJDK JRE related to
availability. An attacker could exploit these to cause a denial
of service. (CVE-2015-0488)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
icedtea-6-jre-cacao

6b35-1.13.7-1ubuntu0.12.04.2
icedtea-6-jre-jamvm

6b35-1.13.7-1ubuntu0.12.04.2
openjdk-6-jdk

6b35-1.13.7-1ubuntu0.12.04.2
openjdk-6-source

6b35-1.13.7-1ubuntu0.12.04.2
openjdk-6-jre

6b35-1.13.7-1ubuntu0.12.04.2
openjdk-6-jre-headless

6b35-1.13.7-1ubuntu0.12.04.2
openjdk-6-demo

6b35-1.13.7-1ubuntu0.12.04.2
openjdk-6-doc

6b35-1.13.7-1ubuntu0.12.04.2
openjdk-6-jre-zero

6b35-1.13.7-1ubuntu0.12.04.2
openjdk-6-jre-lib

6b35-1.13.7-1ubuntu0.12.04.2
Ubuntu 10.04 LTS:
icedtea-6-jre-cacao

6b35-1.13.7-1ubuntu0.10.04.2
openjdk-6-jdk

6b35-1.13.7-1ubuntu0.10.04.2
openjdk-6-source

6b35-1.13.7-1ubuntu0.10.04.2
openjdk-6-jre

6b35-1.13.7-1ubuntu0.10.04.2
openjdk-6-jre-headless

6b35-1.13.7-1ubuntu0.10.04.2
openjdk-6-demo

6b35-1.13.7-1ubuntu0.10.04.2
openjdk-6-doc

6b35-1.13.7-1ubuntu0.10.04.2
openjdk-6-jre-zero

6b35-1.13.7-1ubuntu0.10.04.2
openjdk-6-jre-lib

6b35-1.13.7-1ubuntu0.10.04.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional
bug fixes. After a standard system update you need to restart any
Java applications or applets to make all the necessary changes.

References

CVE-2015-0460,

CVE-2015-0469,

CVE-2015-0477,

CVE-2015-0478,

CVE-2015-0480,

CVE-2015-0488

USN-2574-1: OpenJDK 7 vulnerabilities

Ubuntu Security Notice USN-2574-1

21st April, 2015

openjdk-7 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in OpenJDK 7.

Software description

  • openjdk-7
    – Open Source Java implementation

Details

Several vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure, data integrity and availability. An attacker
could exploit these to cause a denial of service or expose sensitive
data over the network. (CVE-2015-0460, CVE-2015-0469)

Alexander Cherepanov discovered that OpenJDK JRE was vulnerable to
directory traversal issues with respect to handling jar files. An
attacker could use this to expose sensitive data. (CVE-2015-0480)

Florian Weimer discovered that the RSA implementation in the JCE
component in OpenJDK JRE did not follow recommended practices for
implementing RSA signatures. An attacker could use this to expose
sensitive data. (CVE-2015-0478)

A vulnerability was discovered in the OpenJDK JRE related to data
integrity. An attacker could exploit this expose sensitive data over
the network. (CVE-2015-0477)

A vulnerability was discovered in the OpenJDK JRE related to
availability. An attacker could exploit these to cause a denial
of service. (CVE-2015-0488)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
openjdk-7-jre-zero

7u79-2.5.5-0ubuntu0.14.10.2
openjdk-7-source

7u79-2.5.5-0ubuntu0.14.10.2
icedtea-7-jre-jamvm

7u79-2.5.5-0ubuntu0.14.10.2
openjdk-7-jre-lib

7u79-2.5.5-0ubuntu0.14.10.2
openjdk-7-jdk

7u79-2.5.5-0ubuntu0.14.10.2
openjdk-7-jre-headless

7u79-2.5.5-0ubuntu0.14.10.2
openjdk-7-jre

7u79-2.5.5-0ubuntu0.14.10.2
openjdk-7-doc

7u79-2.5.5-0ubuntu0.14.10.2
openjdk-7-demo

7u79-2.5.5-0ubuntu0.14.10.2
Ubuntu 14.04 LTS:
openjdk-7-jre-zero

7u79-2.5.5-0ubuntu0.14.04.2
openjdk-7-source

7u79-2.5.5-0ubuntu0.14.04.2
icedtea-7-jre-jamvm

7u79-2.5.5-0ubuntu0.14.04.2
openjdk-7-jre-lib

7u79-2.5.5-0ubuntu0.14.04.2
openjdk-7-jdk

7u79-2.5.5-0ubuntu0.14.04.2
openjdk-7-jre-headless

7u79-2.5.5-0ubuntu0.14.04.2
openjdk-7-jre

7u79-2.5.5-0ubuntu0.14.04.2
openjdk-7-doc

7u79-2.5.5-0ubuntu0.14.04.2
openjdk-7-demo

7u79-2.5.5-0ubuntu0.14.04.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional
bug fixes. After a standard system update you need to restart any
Java applications or applets to make all the necessary changes.

References

CVE-2015-0460,

CVE-2015-0469,

CVE-2015-0477,

CVE-2015-0478,

CVE-2015-0480,

CVE-2015-0488

USN-2575-1: MySQL vulnerabilities

Ubuntu Security Notice USN-2575-1

21st April, 2015

mysql-5.5 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in MySQL.

Software description

  • mysql-5.5
    – MySQL database

Details

Multiple security issues were discovered in MySQL and this update includes
a new upstream MySQL version to fix these issues. MySQL has been updated to
5.5.43.

In addition to security fixes, the updated packages contain bug fixes,
new features, and possibly incompatible changes.

Please see the following for more information:
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-42.html
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-43.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
mysql-server-5.5

5.5.43-0ubuntu0.14.10.1
Ubuntu 14.04 LTS:
mysql-server-5.5

5.5.43-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
mysql-server-5.5

5.5.43-0ubuntu0.12.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-0433,

CVE-2015-0441,

CVE-2015-0499,

CVE-2015-0501,

CVE-2015-0505,

CVE-2015-2568,

CVE-2015-2571,

CVE-2015-2573