Red Hat Security Advisory 2015-0782-01

Red Hat Security Advisory 2015-0782-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel’s Infiniband subsystem did not properly sanitize input parameters while registering memory regions from user space via the verbs API. A local user with access to a /dev/infiniband/uverbsX device could use this flaw to crash the system or, potentially, escalate their privileges on the system. A use-after-free flaw was found in the way the Linux kernel’s SCTP implementation handled authentication key reference counting during INIT collisions. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system.

Red Hat Security Advisory 2015-0783-01

Red Hat Security Advisory 2015-0783-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel’s Infiniband subsystem did not properly sanitize input parameters while registering memory regions from user space via the verbs API. A local user with access to a /dev/infiniband/uverbsX device could use this flaw to crash the system or, potentially, escalate their privileges on the system. An insufficient bound checking flaw was found in the Xen hypervisor’s implementation of acceleration support for the “REP MOVS” instructions. A privileged HVM guest user could potentially use this flaw to crash the host.

Mandriva Linux Security Advisory 2015-195

Mandriva Linux Security Advisory 2015-195 – The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting attacks via a control character in a URL, as demonstrated by a x08javascript: URL. The updated packages provides a solution for this security issue.

Mandriva Linux Security Advisory 2015-196

Mandriva Linux Security Advisory 2015-196 – cups-browsed in cups-filters before 1.0.66 contained a bug in the remove_bad_chars function, where it failed to reliably filter out illegal characters if there were two or more subsequent illegal characters, allowing execution of arbitrary commands with the rights of the lp user, using forged print service announcements on DNS-SD servers.

HP Security Bulletin HPSBGN03306 1

HP Security Bulletin HPSBGN03306 1 – Potential security vulnerabilities have been identified with HP IceWall SSO MCRP, SSO Dfw, and SSO Agent running OpenSSL. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS). Revision 1 of this advisory.

Fedora EPEL 5 Security Update: mantis-1.2.19-1.el5

Resolved Bugs
800667 – mantis: many security flaws [epel-5]
924342 – CVE-2013-1883 mantis: Site / db server DoS via certain View Issues page search query [epel-5]
1165154 – mantis: XSS on Configuration Report page [epel-all]
1171715 – CVE-2014-9279 CVE-2014-9280 mantis: various flaws [epel-5]
1169164 – mantis: various flaws [epel-5]
948997 – CVE-2013-1931 CVE-2013-1934 mantis various flaws [epel-5]
1164622 – mantis: cross-site scripting (XSS) issues to be fixed in the upcoming 1.2.18 release [epel-5]
1168164 – CVE-2014-9089 mantis: SQL injection in view_all_set.php [epel-5]
1183596 – CVE-2014-9573 CVE-2014-9572 CVE-2014-9571 mantis: multiple issues [epel-all]
1141310 – CVE-2014-6387 mantis: null byte poisoning in LDAP authentication
1162048 – CVE-2014-8598 CVE-2014-7146 mantis: issues in the XML Import/Export plug-in to be fixed in the upcoming 1.2.18 release [epel-5]
1063114 – CVE-2014-1609 CVE-2014-1608 mantis: SQL injection issues [epel-5]
1168622 – CVE-2014-9117 mantis: CAPTCHA bypass in registration form [epel-5]
1141314 – mantis: null byte poisoning in LDAP authentication [epel-5]
1159680 – CVE-2014-8554 mantis: incomplete fix for CVE-2014-1609 [epel-5]
1164633 – mantis: information disclosure issue to be fixed in the upcoming 1.2.18 release [epel-5]
1170183 – mantis: XSS in extended project browser [epel-5]
1191134 – mantis: XSS in adm_config_report.php [epel-all]
902333 – mantis: Reporter privilege user can change bug state to NEW [epel-5]<br
With this update we are going to move to the 1.2 series from upstream, so we close all known security issues and newer security fixes can be applied easily.
PLEASE NOTE:
This update needs *DB SCHEMA CHANGES* to get correctly deployed,
so please be sure to test it on a backup instance.
Please refer to upstream documentation for upgrade steps.