Red Hat Security Advisory 2015-1650-01 – Red Hat OpenShift Enterprise is a cloud computing Platform-as-a-Service solution designed for on-premise or private cloud deployments. An improper permission check issue was discovered in the server admission control component in OpenShift. A user with build permissions could use this flaw to execute arbitrary shell commands on a build pod with the privileges of the root user. This issue was discovered by Cesar Wong of the Red Hat OpenShift Enterprise Team.
Monthly Archives: August 2015
Ubuntu Security Notice USN-2721-1
Ubuntu Security Notice 2721-1 – It was discovered that the Subversion mod_dav_svn module incorrectly handled REPORT requests for a resource that does not exist. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. It was discovered that the Subversion mod_dav_svn module incorrectly handled requests requiring a lookup for a virtual transaction name that does not exist. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS. Various other issues were also addressed.
Ubuntu Security Notice USN-2702-3
Ubuntu Security Notice 2702-3 – USN-2702-1 fixed vulnerabilities in Firefox. After upgrading, some users in the US reported that their default search engine switched to Yahoo. This update fixes the problem. Various other issues were also addressed.
Red Hat Security Advisory 2015-1646-01
Red Hat Security Advisory 2015-1646-01 – MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. It was found that the MySQL client library permitted but did not require a client to use SSL/TLS when establishing a secure connection to a MySQL server using the “–ssl” option. A man-in-the-middle attacker could use this flaw to strip the SSL/TLS protection from a connection between a client and a server. This update fixes several vulnerabilities in the MariaDB database server.
Red Hat Security Advisory 2015-1647-01
Red Hat Security Advisory 2015-1647-01 – MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. It was found that the MySQL client library permitted but did not require a client to use SSL/TLS when establishing a secure connection to a MySQL server using the “–ssl” option. A man-in-the-middle attacker could use this flaw to strip the SSL/TLS protection from a connection between a client and a server. This update fixes several vulnerabilities in the MariaDB database server.
Debian Security Advisory 3339-1
Debian Linux Security Advisory 3339-1 – Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the execution of arbitrary code, breakouts of the Java sandbox, information disclosure, denial of service or insecure cryptography.
Debian Security Advisory 3340-1
Debian Linux Security Advisory 3340-1 – Dawid Golunski discovered that when running under PHP-FPM in a threaded environment, Zend Framework, a PHP framework, did not properly handle XML data in multibyte encoding. This could be used by remote attackers to perform an XML External Entity attack via crafted XML data.
HP Security Bulletin HPSBUX03400 SSRT102211 1
HP Security Bulletin HPSBUX03400 SSRT102211 1 – A potential security vulnerability has been identified with HP-UX running BIND. This vulnerability could be exploited remotely to create a Denial of Service (DoS). Revision 1 of this advisory.
Security Flash Heap Use-After-Free In SurfaceFilterList::C​reateFromScriptAtom
Flash suffers from a use-after-free vulnerability in SurfaceFilterList::CreateFromScriptAtom.
Flash Bypass Of Length Vs. Cookie Validation
Flash version 18.0.0.209 contains new mitigations to defend against corruptions of Vector. (and other) lengths. One of these mitigations, at Vector access time, compares the Vector’s in-memory length with a representation of the same length XOR’ed with a secret cookie. The bypass comes about because the secret cookie value is stored inside a structure, and a pointer to that structure is stored alongside the Vector length.