Red Hat Enterprise Linux: An updated selinux-policy package that fixes one bug is now available for Red
Hat Enterprise Linux 6.
Monthly Archives: June 2015
RHSA-2015:1135-1: Important: php security and bug fix update
Red Hat Enterprise Linux: Updated php packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
CVE-2014-8142, CVE-2014-9652, CVE-2014-9705, CVE-2014-9709, CVE-2015-0231, CVE-2015-0232, CVE-2015-0273, CVE-2015-2301, CVE-2015-2348, CVE-2015-2783, CVE-2015-2787, CVE-2015-3307, CVE-2015-3329, CVE-2015-3330, CVE-2015-3411, CVE-2015-3412, CVE-2015-4021, CVE-2015-4022, CVE-2015-4024, CVE-2015-4025, CVE-2015-4026, CVE-2015-4147, CVE-2015-4148, CVE-2015-4598, CVE-2015-4599, CVE-2015-4600, CVE-2015-4601, CVE-2015-4602, CVE-2015-4603, CVE-2015-4604, CVE-2015-4605
USN-2651-1: GNU patch vulnerabilities
Ubuntu Security Notice USN-2651-1
22nd June, 2015
patch vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
Several security issues were fixed in GNU patch.
Software description
- patch
– Apply a diff file to an original
Details
Jakub Wilk discovered that GNU patch did not correctly handle file paths in
patch files. An attacker could specially craft a patch file that could
overwrite arbitrary files with the privileges of the user invoking the program.
This issue only affected Ubuntu 12.04 LTS. (CVE-2010-4651)
László Böszörményi discovered that GNU patch did not correctly handle some
patch files. An attacker could specially craft a patch file that could cause a
denial of service. (CVE-2014-9637)
Jakub Wilk discovered that GNU patch did not correctly handle symbolic links in
git style patch files. An attacker could specially craft a patch file that
could overwrite arbitrary files with the privileges of the user invoking the
program. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10.
(CVE-2015-1196)
Jakub Wilk discovered that GNU patch did not correctly handle file renames in
git style patch files. An attacker could specially craft a patch file that
could overwrite arbitrary files with the privileges of the user invoking the
program. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10.
(CVE-2015-1395)
Jakub Wilk discovered the fix for CVE-2015-1196 was incomplete for GNU patch.
An attacker could specially craft a patch file that could overwrite arbitrary
files with the privileges of the user invoking the program. This issue only
affected Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2015-1396)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 14.10:
-
patch
2.7.1-5ubuntu0.3
- Ubuntu 14.04 LTS:
-
patch
2.7.1-4ubuntu2.3
- Ubuntu 12.04 LTS:
-
patch
2.6.1-3ubuntu0.1
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
WordPress Nextend Facebook Connect 1.5.4 Cross Site Scripting
WordPress NextEnd Connect plugin version 1.5.4 suffers from a cross site scripting vulnerability.
Fedora 22 Security Update: rubygem-activesupport-4.2.0-2.fc22
Fixes for:
CVE-2015-3226
Escape HTML entities in JSON keys
CVE-2015-3227
XML documents that are too deep can cause an stack overflow, which in turn will cause a potential DoS attack.
Fedora 21 Security Update: rubygem-activesupport-4.1.5-2.fc21
Fixes for:
CVE-2015-3226
Escape HTML entities in JSON keys
CVE-2015-3227
XML documents that are too deep can cause an stack overflow, which in turn will cause a potential DoS attack.
Fedora 21 Security Update: trafficserver-5.3.0-1.fc21
Resolved Bugs
1102559 – Add AArch64 support to trafficserver
1103173 – trafficserver: insecure temporary file usage [fedora-all]
1179204 – trafficserver: incorrect handling of “Max-Forwards” header [fedora-21]
1103174 – trafficserver: insecure temporary file usage [epel-6]
1133387 – CVE-2014-3525 trafficserver: unspecified flaw related to health checks fixed in versions 4.2.1.1 and 5.0.1 [epel-6]
1179205 – trafficserver: incorrect handling of “Max-Forwards” header [epel-7]
994224 – trafficserver must be compiled with -fno-strict-aliasing, but it is not
955127 – trafficserver package should be built with PIE flags<br
https://cwiki.apache.org/confluence/display/TS/What%27s+New+in+v5.3.x
Fedora 22 Security Update: trafficserver-5.3.0-1.fc22
Resolved Bugs
1103173 – trafficserver: insecure temporary file usage [fedora-all]
1103174 – trafficserver: insecure temporary file usage [epel-6]
1102559 – Add AArch64 support to trafficserver
1179204 – trafficserver: incorrect handling of “Max-Forwards” header [fedora-21]
1133387 – CVE-2014-3525 trafficserver: unspecified flaw related to health checks fixed in versions 4.2.1.1 and 5.0.1 [epel-6]
1179205 – trafficserver: incorrect handling of “Max-Forwards” header [epel-7]
994224 – trafficserver must be compiled with -fno-strict-aliasing, but it is not
955127 – trafficserver package should be built with PIE flags<br
https://cwiki.apache.org/confluence/display/TS/What%27s+New+in+v5.3.x
WordPress Revslider Arbitrary File Upload / Download / XSS
WordPress Revslider plugin suffers from cross site scripting and remote shell upload vulnerabilities.
DSA-3294 wireshark – security update
Multiple vulnerabilities were discovered in the dissectors for WCCP
and GSM DTAP, which could result in denial of service.