RHSA-2016:0466-1: Moderate: openssh security update

Red Hat Enterprise Linux: Updated openssh packages that fix two security issues are now available
for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
CVE-2015-5600, CVE-2016-3115

RHSA-2016:0465-1: Moderate: openssh security update

Red Hat Enterprise Linux: Updated openssh packages that fix two security issues are now available
for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
CVE-2016-1908, CVE-2016-3115

USN-2937-1: WebKitGTK+ vulnerabilities

Ubuntu Security Notice USN-2937-1

21st March, 2016

webkitgtk vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in WebKitGTK+.

Software description

  • webkitgtk
    – Web content engine library for GTK+

Details

A large number of security issues were discovered in the WebKitGTK+ Web and
JavaScript engines. If a user were tricked into viewing a malicious
website, a remote attacker could exploit a variety of issues related to web
browser security, including cross-site scripting attacks, denial of service
attacks, and arbitrary code execution.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
libjavascriptcoregtk-3.0-0

2.4.10-0ubuntu0.15.10.1
libjavascriptcoregtk-1.0-0

2.4.10-0ubuntu0.15.10.1
libwebkitgtk-1.0-0

2.4.10-0ubuntu0.15.10.1
libwebkitgtk-3.0-0

2.4.10-0ubuntu0.15.10.1
Ubuntu 14.04 LTS:
libjavascriptcoregtk-3.0-0

2.4.10-0ubuntu0.14.04.1
libjavascriptcoregtk-1.0-0

2.4.10-0ubuntu0.14.04.1
libwebkitgtk-1.0-0

2.4.10-0ubuntu0.14.04.1
libwebkitgtk-3.0-0

2.4.10-0ubuntu0.14.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use WebKitGTK+, such as Epiphany and Evolution, to make all the
necessary changes.

References

CVE-2014-1748,

CVE-2015-1071,

CVE-2015-1076,

CVE-2015-1081,

CVE-2015-1083,

CVE-2015-1120,

CVE-2015-1122,

CVE-2015-1127,

CVE-2015-1153,

CVE-2015-1155,

CVE-2015-3658,

CVE-2015-3659,

CVE-2015-3727,

CVE-2015-3731,

CVE-2015-3741,

CVE-2015-3743,

CVE-2015-3745,

CVE-2015-3747,

CVE-2015-3748,

CVE-2015-3749,

CVE-2015-3752,

CVE-2015-5788,

CVE-2015-5794,

CVE-2015-5801,

CVE-2015-5809,

CVE-2015-5822,

CVE-2015-5928

USN-2938-1: Git vulnerabilities

Ubuntu Security Notice USN-2938-1

21st March, 2016

git vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Git could be made to crash or run programs as your login if it received
changes from a specially crafted remote repository.

Software description

  • git
    – fast, scalable, distributed revision control system

Details

Laël Cellier discovered that Git incorrectly handled path strings in
crafted Git repositories. A remote attacker could use this issue to cause
a denial of service or possibly execute arbitrary code with the
privileges of the user invoking Git. (CVE-2016-2315, CVE-2016-2324)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
git

1:2.5.0-1ubuntu0.2
Ubuntu 14.04 LTS:
git

1:1.9.1-1ubuntu0.3
Ubuntu 12.04 LTS:
git

1:1.7.9.5-1ubuntu0.3

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-2315,

CVE-2016-2324