Fedora EPEL 7 Security Update: python-oauth2-1.5.211-8.el7

Resolved Bugs
1007766 – python-oauth2: various flaws [fedora-all]
1007746 – CVE-2013-4346 python-oauth2: _check_signature() ignores the nonce value when validating signed urls
1007758 – CVE-2013-4347 python-oauth2: Uses poor PRNG in nonce<br
Actually apply patch to fix CVE-2013-4347 (thanks to Jason Green, Matt Wilson).
Fix CVE-2013-4346 and CVE-2013-4347, thanks to Philippe Makowski.
Fix CVE-2013-4346 and CVE-2013-4347, thanks to Philippe Makowski.

Fedora EPEL 5 Security Update: phpMyAdmin4-4.0.10.4-1.el5

Resolved Bugs
1148664 – CVE-2014-7217 phpmyadmin: cross-site scripting (XSS) flaw fixed in versions 4.0.10.4, 4.1.14.5, and 4.2.9.1 (PMASA-2014-11)
1148667 – CVE-2014-7217 phpMyAdmin3: phpmyadmin: cross-site scripting (XSS) flaw fixed in versions 4.0.10.4, 4.1.14.5, and 4.2.9.1 (PMASA-2014-11) [epel-5]
1148666 – CVE-2014-7217 phpmyadmin: cross-site scripting (XSS) flaw fixed in versions 4.0.10.4, 4.1.14.5, and 4.2.9.1 (PMASA-2014-11) [epel-5]<br
phpMyAdmin 4.0.10.4 (2014-10-01)
================================
* [security] XSS vulnerabilities in table search and table structure pages

Fedora EPEL 6 Security Update: python-oauth2-1.5.211-8.el6

Resolved Bugs
1007766 – python-oauth2: various flaws [fedora-all]
1007746 – CVE-2013-4346 python-oauth2: _check_signature() ignores the nonce value when validating signed urls
1007758 – CVE-2013-4347 python-oauth2: Uses poor PRNG in nonce<br
Actually apply patch to fix CVE-2013-4347 (thanks to Jason Green, Matt Wilson).
Fix CVE-2013-4346 and CVE-2013-4347, thanks to Philippe Makowski.
Fix CVE-2013-4346 and CVE-2013-4347, thanks to Philippe Makowski.

TWiki Security Alert CVE-2014-7236: Remote Perl code execution with query string to debug TWiki plugins

Posted by Peter Thoeny on Oct 09

This is an advisory for TWiki administrators: The debugenableplugins request parameter allows arbitrary Perl code
execution.

TWiki ( http://twiki.org ) is an Open Source Enterprise Wiki and Web Application Platform used by millions of people.

* Vulnerable Software Version
* Attack Vectors
* Impact
* Severity Level
* MITRE Name for this Vulnerability
* Details
* Countermeasures
* Hotfix for TWiki Production Release 6.0.0…

TWiki Security Alert CVE-2014-7237: Apache configuration file upload on TWiki on Windows server

Posted by Peter Thoeny on Oct 09

This is an advisory for TWiki administrators: Attaching a specially named file allows remote upload of an Apache
configuration file. This applies to native TWiki installations on Windows, the TWiki-VM (virtual machine) running in a
Windows server environment is not affected.

TWiki ( http://twiki.org ) is an Open Source Enterprise Wiki and Web Application Platform used by millions of people.

* Vulnerable Software Version
* Attack Vectors…

Infra – CentOS Wiki instance migration

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

We have to do some hardware/software maintenance on the machine
actually hosting the Wiki service (http://wiki.centos.org). Instead of
just taking the wiki instance down during that maintenance, we've
decided to relocate it to a temporary host, proceed to maintenance,
and then migrate it back to the previous node.

Migration is scheduled for Friday October 10th, 11:00 am UTC time.
You can convert to local time with $(date -d '2014-10-10 11:00 UTC')

Migration will happen in several steps:
1 - we "freeze" the wiki on the actual node, transfer data, update the
A record, restore the service on the temporary node (disruption ~ 30min)
2 - we proceed to the needed maintenance on first node (no disruption
in service, but no estimated time)
3 - depending on time needed for step [2], and assuming we have no
hardware issue, we proceed like step [1], but in reverse (so
disruption ~30 minutes again)

Thanks for your comprehending and patience.

on behalf of the Infra team,
- -- 

Fabian Arrotin
The CentOS Project | http://www.centos.org
gpg key: 56BEC54E | twitter: < at >arrfab
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)

iEYEARECAAYFAlQ2g0kACgkQnVkHo1a+xU4flACfc1IjPeHelBntwt4eNTd6SBvM
wXAAnAqtOg4Ko4nqd0QVUfX7ZcQevD5K
=v15z
-----END PGP SIGNATURE-----