RHSA-2016:0009-1: Moderate: libldb security update

Red Hat Enterprise Linux: Updated libldb packages that fix two security issues are now available for
Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
CVE-2015-3223, CVE-2015-5330

RHSA-2016:0008-1: Moderate: openssl security update

Red Hat Enterprise Linux: Updated openssl packages that fix one security issue are now available for
Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
CVE-2015-7575

RHSA-2016:0007-1: Moderate: nss security update

Red Hat Enterprise Linux: Updated nss packages that fix one security issue are now available for Red
Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
CVE-2015-7575

RHSA-2016:0006-1: Moderate: samba security update

Red Hat Enterprise Linux: Updated samba packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
CVE-2015-3223, CVE-2015-5252, CVE-2015-5296, CVE-2015-5299, CVE-2015-7540

RHSA-2016:0005-1: Moderate: rpcbind security update

Red Hat Enterprise Linux: Updated rpcbind packages that fix one security issue are now available for
Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
CVE-2015-7236

RHSA-2016:0004-1: Important: kernel security update

Red Hat Enterprise Linux: Updated kernel packages that fix two security issues are now available for
Red Hat Enterprise Linux 6.4 Advanced Update Support.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
CVE-2015-5307, CVE-2015-8104

USN-2862-1: Pygments vulnerability

Ubuntu Security Notice USN-2862-1

7th January, 2016

pygments vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Pygments could be made to crash or run programs if it processed a specially
crafted font request.

Software description

  • pygments
    – syntax highlighting package written in Python

Details

It was discovered that Pygments incorrectly sanitized strings used to
search system fonts. An attacker could possibly use this issue to execute
arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
python3-pygments

2.0.1+dfsg-1.1svn1.1
python-pygments

2.0.1+dfsg-1.1svn1.1
Ubuntu 15.04:
python3-pygments

2.0.1+dfsg-1svn1.1
python-pygments

2.0.1+dfsg-1svn1.1
Ubuntu 14.04 LTS:
python3-pygments

1.6+dfsg-1ubuntu1.1
python-pygments

1.6+dfsg-1ubuntu1.1
Ubuntu 12.04 LTS:
python3-pygments

1.4+dfsg-2ubuntu0.1
python-pygments

1.4+dfsg-2ubuntu0.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-8557

USN-2863-1: OpenSSL vulnerability

Ubuntu Security Notice USN-2863-1

7th January, 2016

openssl vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

OpenSSL could be made to expose sensitive information over the network.

Software description

  • openssl
    – Secure Socket Layer (SSL) cryptographic library and tools

Details

Karthikeyan Bhargavan and Gaetan Leurent discovered that OpenSSL
incorrectly allowed MD5 to be used for TLS 1.2 connections. If a remote
attacker were able to perform a man-in-the-middle attack, this flaw could
be exploited to view sensitive information.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
libssl1.0.0

1.0.1-4ubuntu5.33

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2015-7575

USN-2864-1: NSS vulnerability

Ubuntu Security Notice USN-2864-1

7th January, 2016

nss vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

NSS could be made to expose sensitive information over the network.

Software description

  • nss
    – Network Security Service library

Details

Karthikeyan Bhargavan and Gaetan Leurent discovered that NSS incorrectly
allowed MD5 to be used for TLS 1.2 connections. If a remote attacker were
able to perform a man-in-the-middle attack, this flaw could be exploited to
view sensitive information.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
libnss3

2:3.19.2.1-0ubuntu0.15.10.2
Ubuntu 15.04:
libnss3

2:3.19.2.1-0ubuntu0.15.04.2
Ubuntu 14.04 LTS:
libnss3

2:3.19.2.1-0ubuntu0.14.04.2
Ubuntu 12.04 LTS:
libnss3

3.19.2.1-0ubuntu0.12.04.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart any applications that
use NSS, such as Evolution and Chromium, to make all the necessary changes.

References

CVE-2015-7575