Thomas Jarosch of Intra2net AG reported that using the file command
on a specially-crafted ELF binary could lead to a denial of service
due to uncontrolled resource consumption (CVE-2014-8116).
Thomas Jarosch of Intra2net AG reported that using the file command
on a specially-crafted ELF binary could lead to a denial of service
due to uncontrolled recursion (CVE-2014-8117).
The updated file packages has been upgraded to the latest 5.22 version
which is not vulnerable to these issues.
In MIT krb5, when kadmind is configured to use LDAP for the KDC
database, an authenticated remote attacker can cause a NULL dereference
by attempting to use a named ticket policy object as a password policy
for a principal. The attacker needs to be authenticated as a user
who has the elevated privilege for setting password policy by adding
or modifying principals (CVE-2014-5353).
Pwgen was found to generate weak non-tty passwords by default, which
could be brute-forced with a commendable success rate, which could
raise security concerns (CVE-2013-4440).
Pwgen was found to silently falling back to use standard pseudo
generated numbers on the systems that heavily use entropy. Systems,
such as those with a lot of daemons providing encryption services,
the entropy was found to be exhausted, which forces pwgen to fall
back to use standard pseudo generated numbers (CVE-2013-4442).
Michal Zalewski reported an out-of-bounds memory access vulnerability
in unrtf. Processing a malformed RTF file could lead to a segfault
while accessing a pointer that may be under the attacker’s control.
This would lead to a denial of service (application crash) or,
potentially, the execution of arbitrary code (CVE-2014-9274).
Hanno Bck also reported a number of other crashes in unrtf
(CVE-2014-9275).
In MediaWiki before 1.23.8, thumb.php outputs wikitext message as
raw HTML, which could lead to cross-site scripting. Permission to
edit MediaWiki namespace is required to exploit this.
In MediaWiki before 1.23.8, a malicious site can bypass CORS
restrictions in in API calls if it only included an allowed domain
as part of its name.
Red Hat Enterprise Linux: Updated php packages that fix two security issues are now available for
Red Hat Enterprise Linux 6.5 Extended Update Support.
Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
CVE-2014-3669, CVE-2014-3670
Red Hat Enterprise Linux: Updated python-keystoneclient packages that fix one security issue are now
available for Red Hat Enterprise Linux OpenStack Platform 4.0.
Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
CVE-2014-7144
Red Hat Enterprise Linux: Updated jasper-devel packages are now available for Red Hat OpenShift Enterprise
release 2.2. These packages are required to avoid dependency issues with the
base channel for Red Hat Enterprise Linux 6.6.
Red Hat Enterprise Linux: Updated jasper-devel packages are now available for Red Hat OpenShift Enterprise
release 2.1. These packages are required to avoid dependency issues with the
base channel for Red Hat Enterprise Linux 6.6.