Red Hat Security Advisory 2015-0165-01

Red Hat Security Advisory 2015-0165-01 – Subversion is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled REPORT requests. A remote, unauthenticated attacker could use a specially crafted REPORT request to crash mod_dav_svn. It was discovered that Subversion clients retrieved cached authentication credentials using the MD5 hash of the server realm string without also checking the server’s URL. A malicious server able to provide a realm that triggers an MD5 collision could possibly use this flaw to obtain the credentials for a different realm.

Ubuntu Security Notice USN-2498-1

Ubuntu Security Notice 2498-1 – It was discovered that Kerberos incorrectly sent old keys in response to a -randkey -keepold request. An authenticated remote attacker could use this issue to forge tickets by leveraging administrative access. This issue only affected Ubuntu 10.04 LTS, Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. It was discovered that the libgssapi_krb5 library incorrectly processed security context handles. A remote attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.

Red Hat Security Advisory 2015-0164-01

Red Hat Security Advisory 2015-0164-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel’s splice() system call validated its parameters. On certain file systems, a local, unprivileged user could use this flaw to write past the maximum file size, and thus crash the system.

Ubuntu Security Notice USN-2495-1

Ubuntu Security Notice 2495-1 – A use-after-free bug was discovered in the DOM implementation in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. It was discovered that V8 did not properly consider frame access restrictions when throwing exceptions in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same origin restrictions. Various other issues were also addressed.

Debian Security Advisory 3159-1

Debian Linux Security Advisory 3159-1 – It was discovered that the REXML parser, part of the interpreter for the Ruby language, could be coerced into allocating large string objects that could consume all available memory on the system. This could allow remote attackers to cause a denial of service (crash).

Red Hat Security Advisory 2015-0166-01

Red Hat Security Advisory 2015-0166-01 – Subversion is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled REPORT requests. A remote, unauthenticated attacker could use a specially crafted REPORT request to crash mod_dav_svn. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled certain requests for URIs that trigger a lookup of a virtual transaction name. A remote, unauthenticated attacker could send a request for a virtual transaction name that does not exist, causing mod_dav_svn to crash.

CESA-2015:0166 Moderate CentOS 7 subversionSecurity Update

CentOS Errata and Security Advisory 2015:0166 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0166.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
ad1d62c0aa11709378918e05cd8f66425901af7759d8ef8119918991bc4a1dcd  mod_dav_svn-1.7.14-7.el7_0.x86_64.rpm
4095d987c67eb61556befe167d0f74ad0b777f1a4fe1a94b24441c94b283e933  subversion-1.7.14-7.el7_0.i686.rpm
f63835d6f425a1628c58afdb484cb89de3bd1e26869dee151b665f2472e6e48a  subversion-1.7.14-7.el7_0.x86_64.rpm
51ca7f8c8a5413385f99f6dd0acddce223603f7a9f3718983bc5c99eb01ad40d  subversion-devel-1.7.14-7.el7_0.i686.rpm
8f612efc6b30488c81e08597cf653f55897a6b837bf4236252e0c9afdc478975  subversion-devel-1.7.14-7.el7_0.x86_64.rpm
7ffc0bf23a85735e8444c4641c186e7c5a4d8cb57b883301c9038fac2b18f49f  subversion-gnome-1.7.14-7.el7_0.i686.rpm
201a8e4b1971d99e45e705004361b0a6ba8165bd1690a5352acdc82035247d25  subversion-gnome-1.7.14-7.el7_0.x86_64.rpm
ae5430e9cfcbfd5bc2655827f4cfcc7c57c7301c8402b632c1ee0a8db03bae34  subversion-javahl-1.7.14-7.el7_0.i686.rpm
26335d6ee4935df7332fd8e2160da8439a03d5ad0777f4e86edb2fa0335874be  subversion-javahl-1.7.14-7.el7_0.x86_64.rpm
af9c6ade8371afde8f05b7d74bae455c75065804fc3dba52e7fec1868d02ac3e  subversion-kde-1.7.14-7.el7_0.i686.rpm
7ebb23191473eb503dd2a960e014406dcbc86cde1fd9a9651d83732c65049ec3  subversion-kde-1.7.14-7.el7_0.x86_64.rpm
43ad268e519c29af89eefcd9cd785189bfcb1953398ac4a4b0ae5b0ec8e51726  subversion-libs-1.7.14-7.el7_0.i686.rpm
88de3d6dde9da26988a107be00f10726b27a00f530f5529b4bc24ad924c89618  subversion-libs-1.7.14-7.el7_0.x86_64.rpm
1ea88f946da1d932fa4b1b123eae486dd0dd599e6b6368c31f701b8603538a99  subversion-perl-1.7.14-7.el7_0.i686.rpm
2855e7f06197f820ae35ed99be61fbf39b36df38cfcdd8dfe1221af0ad62b606  subversion-perl-1.7.14-7.el7_0.x86_64.rpm
c912c363a08ac2cdcb7ffab146a1b20c825df729883051d8e558a7a5384ad7ac  subversion-python-1.7.14-7.el7_0.x86_64.rpm
346e2e09bfd19ca048ff437999e02136ac8d58670c2df9c3ab14097dcf83c257  subversion-ruby-1.7.14-7.el7_0.i686.rpm
fe1a3f846fa82245479230d0ae834ceefee70756dc41f015dd57736fadcae0f0  subversion-ruby-1.7.14-7.el7_0.x86_64.rpm
b4a223ec01851dbc0add439b90e8de40597e3ea21b054903a3a2794597df960a  subversion-tools-1.7.14-7.el7_0.x86_64.rpm

Source:
80de3e657ce5343d61d45c3b52453a23d3ac6d069aab1186996ee3d91370b455  subversion-1.7.14-7.el7_0.src.rpm



Microsoft Releases Critical Security Update for Internet Explorer

Original release date: February 10, 2015

Microsoft has released a critical security update to address multiple vulnerabilities in Internet Explorer. Exploitation of one of these vulnerabilities could allow a remote attacker to take control of an affected system if the user views a specially crafted webpage.

Users and administrators are encouraged to review Microsoft Bulletin MS15-009 for details and apply the necessary update.


This product is provided subject to this Notification and this Privacy & Use policy.

DSA-3161 dbus – security update

Simon McVittie discovered a local denial of service flaw in dbus, an
asynchronous inter-process communication system. On systems with
systemd-style service activation, dbus-daemon does not prevent forged
ActivationFailure messages from non-root processes. A malicious local
user could use this flaw to trick dbus-daemon into thinking that systemd
failed to activate a system service, resulting in an error reply back to
the requester.