Red Hat Security Advisory 2015-0165-01 – Subversion is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled REPORT requests. A remote, unauthenticated attacker could use a specially crafted REPORT request to crash mod_dav_svn. It was discovered that Subversion clients retrieved cached authentication credentials using the MD5 hash of the server realm string without also checking the server’s URL. A malicious server able to provide a realm that triggers an MD5 collision could possibly use this flaw to obtain the credentials for a different realm.
Monthly Archives: February 2015
Ubuntu Security Notice USN-2498-1
Ubuntu Security Notice 2498-1 – It was discovered that Kerberos incorrectly sent old keys in response to a -randkey -keepold request. An authenticated remote attacker could use this issue to forge tickets by leveraging administrative access. This issue only affected Ubuntu 10.04 LTS, Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. It was discovered that the libgssapi_krb5 library incorrectly processed security context handles. A remote attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.
Red Hat Security Advisory 2015-0164-01
Red Hat Security Advisory 2015-0164-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel’s splice() system call validated its parameters. On certain file systems, a local, unprivileged user could use this flaw to write past the maximum file size, and thus crash the system.
Ubuntu Security Notice USN-2495-1
Ubuntu Security Notice 2495-1 – A use-after-free bug was discovered in the DOM implementation in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. It was discovered that V8 did not properly consider frame access restrictions when throwing exceptions in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same origin restrictions. Various other issues were also addressed.
Debian Security Advisory 3159-1
Debian Linux Security Advisory 3159-1 – It was discovered that the REXML parser, part of the interpreter for the Ruby language, could be coerced into allocating large string objects that could consume all available memory on the system. This could allow remote attackers to cause a denial of service (crash).
Red Hat Security Advisory 2015-0166-01
Red Hat Security Advisory 2015-0166-01 – Subversion is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled REPORT requests. A remote, unauthenticated attacker could use a specially crafted REPORT request to crash mod_dav_svn. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled certain requests for URIs that trigger a lookup of a virtual transaction name. A remote, unauthenticated attacker could send a request for a virtual transaction name that does not exist, causing mod_dav_svn to crash.
CESA-2015:0166 Moderate CentOS 7 subversionSecurity Update
CentOS Errata and Security Advisory 2015:0166 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0166.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: ad1d62c0aa11709378918e05cd8f66425901af7759d8ef8119918991bc4a1dcd mod_dav_svn-1.7.14-7.el7_0.x86_64.rpm 4095d987c67eb61556befe167d0f74ad0b777f1a4fe1a94b24441c94b283e933 subversion-1.7.14-7.el7_0.i686.rpm f63835d6f425a1628c58afdb484cb89de3bd1e26869dee151b665f2472e6e48a subversion-1.7.14-7.el7_0.x86_64.rpm 51ca7f8c8a5413385f99f6dd0acddce223603f7a9f3718983bc5c99eb01ad40d subversion-devel-1.7.14-7.el7_0.i686.rpm 8f612efc6b30488c81e08597cf653f55897a6b837bf4236252e0c9afdc478975 subversion-devel-1.7.14-7.el7_0.x86_64.rpm 7ffc0bf23a85735e8444c4641c186e7c5a4d8cb57b883301c9038fac2b18f49f subversion-gnome-1.7.14-7.el7_0.i686.rpm 201a8e4b1971d99e45e705004361b0a6ba8165bd1690a5352acdc82035247d25 subversion-gnome-1.7.14-7.el7_0.x86_64.rpm ae5430e9cfcbfd5bc2655827f4cfcc7c57c7301c8402b632c1ee0a8db03bae34 subversion-javahl-1.7.14-7.el7_0.i686.rpm 26335d6ee4935df7332fd8e2160da8439a03d5ad0777f4e86edb2fa0335874be subversion-javahl-1.7.14-7.el7_0.x86_64.rpm af9c6ade8371afde8f05b7d74bae455c75065804fc3dba52e7fec1868d02ac3e subversion-kde-1.7.14-7.el7_0.i686.rpm 7ebb23191473eb503dd2a960e014406dcbc86cde1fd9a9651d83732c65049ec3 subversion-kde-1.7.14-7.el7_0.x86_64.rpm 43ad268e519c29af89eefcd9cd785189bfcb1953398ac4a4b0ae5b0ec8e51726 subversion-libs-1.7.14-7.el7_0.i686.rpm 88de3d6dde9da26988a107be00f10726b27a00f530f5529b4bc24ad924c89618 subversion-libs-1.7.14-7.el7_0.x86_64.rpm 1ea88f946da1d932fa4b1b123eae486dd0dd599e6b6368c31f701b8603538a99 subversion-perl-1.7.14-7.el7_0.i686.rpm 2855e7f06197f820ae35ed99be61fbf39b36df38cfcdd8dfe1221af0ad62b606 subversion-perl-1.7.14-7.el7_0.x86_64.rpm c912c363a08ac2cdcb7ffab146a1b20c825df729883051d8e558a7a5384ad7ac subversion-python-1.7.14-7.el7_0.x86_64.rpm 346e2e09bfd19ca048ff437999e02136ac8d58670c2df9c3ab14097dcf83c257 subversion-ruby-1.7.14-7.el7_0.i686.rpm fe1a3f846fa82245479230d0ae834ceefee70756dc41f015dd57736fadcae0f0 subversion-ruby-1.7.14-7.el7_0.x86_64.rpm b4a223ec01851dbc0add439b90e8de40597e3ea21b054903a3a2794597df960a subversion-tools-1.7.14-7.el7_0.x86_64.rpm Source: 80de3e657ce5343d61d45c3b52453a23d3ac6d069aab1186996ee3d91370b455 subversion-1.7.14-7.el7_0.src.rpm
Microsoft Releases Critical Security Update for Internet Explorer
Original release date: February 10, 2015
Microsoft has released a critical security update to address multiple vulnerabilities in Internet Explorer. Exploitation of one of these vulnerabilities could allow a remote attacker to take control of an affected system if the user views a specially crafted webpage.
Users and administrators are encouraged to review Microsoft Bulletin MS15-009 for details and apply the necessary update.
This product is provided subject to this Notification and this Privacy & Use policy.
DSA-3160 xorg-server – security update
Olivier Fourdan discovered that missing input validation in the Xserver’s
handling of XkbSetGeometry requests may result in an information leak
or denial of service.
DSA-3161 dbus – security update
Simon McVittie discovered a local denial of service flaw in dbus, an
asynchronous inter-process communication system. On systems with
systemd-style service activation, dbus-daemon does not prevent forged
ActivationFailure messages from non-root processes. A malicious local
user could use this flaw to trick dbus-daemon into thinking that systemd
failed to activate a system service, resulting in an error reply back to
the requester.