RHN Satellite and Proxy: An updated rhn-upgrade package that fixes several bugs is now available for Red
Hat Satellite 5.7.
Monthly Archives: February 2015
USN-2494-1: file vulnerabilities
Ubuntu Security Notice USN-2494-1
4th February, 2015
file vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary
file could be made to crash if it opened a specially crafted file.
Software description
- file
– Tool to determine file types
Details
Francisco Alonso discovered that file incorrectly handled certain ELF
files. An attacker could use this issue to cause file to crash, resulting
in a denial of service. (CVE-2014-3710)
Thomas Jarosch discovered that file incorrectly handled certain ELF files.
An attacker could use this issue to cause file to hang or crash, resulting
in a denial of service. (CVE-2014-8116)
Thomas Jarosch discovered that file incorrectly limited recursion. An
attacker could use this issue to cause file to hang or crash, resulting in
a denial of service. (CVE-2014-8117)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 14.10:
-
file
1:5.19-1ubuntu1.2
- Ubuntu 14.04 LTS:
-
file
1:5.14-2ubuntu3.3
- Ubuntu 12.04 LTS:
-
file
5.09-2ubuntu0.6
- Ubuntu 10.04 LTS:
-
file
5.03-5ubuntu1.5
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
USN-2469-2: Django regression
Ubuntu Security Notice USN-2469-2
4th February, 2015
python-django regression
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary
USN-2469-1 caused a regression in Django.
Software description
- python-django
– High-level Python web development framework
Details
USN-2469-1 fixed vulnerabilities in Django. The security fix for
CVE-2015-0221 introduced a regression on Ubuntu 10.04 LTS and Ubuntu 12.04
LTS when serving static content through GZipMiddleware. This update fixes
the problem.
We apologize for the inconvenience.
Original advisory details:
Jedediah Smith discovered that Django incorrectly handled underscores in
WSGI headers. A remote attacker could possibly use this issue to spoof
headers in certain environments. (CVE-2015-0219)
Mikko Ohtamaa discovered that Django incorrectly handled user-supplied
redirect URLs. A remote attacker could possibly use this issue to perform a
cross-site scripting attack. (CVE-2015-0220)
Alex Gaynor discovered that Django incorrectly handled reading files in
django.views.static.serve(). A remote attacker could possibly use this
issue to cause Django to consume resources, resulting in a denial of
service. (CVE-2015-0221)
Keryn Knight discovered that Django incorrectly handled forms with
ModelMultipleChoiceField. A remote attacker could possibly use this issue
to cause a large number of SQL queries, resulting in a database denial of
service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10.
(CVE-2015-0222)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 12.04 LTS:
-
python-django
1.3.1-4ubuntu1.15
- Ubuntu 10.04 LTS:
-
python-django
1.1.1-2ubuntu1.16
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
INURLBR MD5 Checker
This is a PHP script that uses md5.gromweb.com to see if a provided md5 is a known value.
Fedora 20 Security Update: bugzilla-4.2.13-1.fc20
Resolved Bugs
1185484 – CVE-2014-8630 Bugzilla: Command Injection into product names and other attributes [fedora-all]
1070979 – Access to /var/lib/bugzilla/data/webdot is denied by default bugzilla.conf
1185483 – CVE-2014-8630 Bugzilla: Command Injection into product names and other attributes<br
This is a security update for Bugzilla which fixes two issues:
* A user with editcomponents permissions could possibly inject system
commands in product names and possibly other attributes.
* Methods from imported modules could possibly be executed using
the WebService API.
The first issue is tracked as CVE-2014-8630.
See https://www.bugzilla.org/security/4.0.15/ for all the details.
Fedora 20 Security Update: puppetlabs-stdlib-4.5.1-2.20150121git7a91f20.fc20
Resolved Bugs
1182579 – CVE-2015-1029 puppetlabs-stdlib: local information leakage and local privilege escalation vulnerability [fedora-all]
1182578 – CVE-2015-1029 puppetlabs-stdlib: local information leakage and local privilege escalation vulnerability
1182580 – CVE-2015-1029 puppetlabs-stdlib: local information leakage and local privilege escalation vulnerability [epel-all]<br
Install metadata.json for Puppet to pick stdlib release when “puppet module list” is called
Security fix for CVE-2015-1029
Security fix for CVE-2015-1029
Security fix for CVE-2015-1029
Fedora 21 Security Update: puppetlabs-stdlib-4.5.1-2.20150121git7a91f20.fc21
Resolved Bugs
1182578 – CVE-2015-1029 puppetlabs-stdlib: local information leakage and local privilege escalation vulnerability
1182580 – CVE-2015-1029 puppetlabs-stdlib: local information leakage and local privilege escalation vulnerability [epel-all]
1182579 – CVE-2015-1029 puppetlabs-stdlib: local information leakage and local privilege escalation vulnerability [fedora-all]<br
Install metadata.json for Puppet to pick stdlib release when “puppet module list” is called
Security fix for CVE-2015-1029
Security fix for CVE-2015-1029
Security fix for CVE-2015-1029
Fedora 21 Security Update: bugzilla-4.4.8-1.fc21.1
Resolved Bugs
1185484 – CVE-2014-8630 Bugzilla: Command Injection into product names and other attributes [fedora-all]
1185483 – CVE-2014-8630 Bugzilla: Command Injection into product names and other attributes
1070979 – Access to /var/lib/bugzilla/data/webdot is denied by default bugzilla.conf<br
This is a security update for Bugzilla which fixes two issues:
* A user with editcomponents permissions could possibly inject system
commands in product names and possibly other attributes.
* Methods from imported modules could possibly be executed using
the WebService API.
The first issue is tracked as CVE-2014-8630.
See https://www.bugzilla.org/security/4.0.15/ for all the details.