[security bulletin] HPSBGN03515 rev.1 – HP Smart Profile Server Data Analytics Layer (SPS DAL), Remote Cross-Site-Scripting (XSS), Disclosure of Information
Monthly Archives: October 2015
Bugtraq: [CVE-2015-2552] Windows 8+ – Trusted Boot Security Feature Bypass Vulnerability
[CVE-2015-2552] Windows 8+ – Trusted Boot Security Feature Bypass Vulnerability
Bugtraq: US DoD's Dc3dd v7.2.6 suffers from a Buffer Overflow vulnerability – Advanced Information Security Corporation – Zero Day Research
US DoD’s Dc3dd v7.2.6 suffers from a Buffer Overflow vulnerability – Advanced Information Security Corporation – Zero Day Research
RHBA-2015:1891-1: Satellite 5.7 bug fix update
RHN Satellite and Proxy: Updated cobbler, pyliblzma, spacewalk-backend, spacewalk-java and spacewalk-web
packages that fix several bugs are now available for Red Hat Satellite 5.7.
RHBA-2015:1892-1: qemu-kvm-rhev bug fix and enhancement update
Red Hat Enterprise Linux: Updated qemu-kvm-rhev packages that fix several bugs and add various
enhancements are now available.
USN-2769-1: Apache Commons HttpClient vulnerabilities
Ubuntu Security Notice USN-2769-1
14th October, 2015
commons-httpclient vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
Several security issues were fixed in commons-httpclient.
Software description
- commons-httpclient
– A Java(TM) library for creating HTTP clients
Details
It was discovered that Apache Commons HttpClient did not properly verify the
Common Name or subjectAltName fields of X.509 certificates. An attacker could
exploit this to perform a man in the middle attack to view sensitive
information or alter encrypted communications. This issue only affected Ubuntu
12.04 LTS. (CVE-2012-5783)
Florian Weimer discovered the fix for CVE-2012-5783 was incomplete for Apache
Commons HttpClient. An attacker could exploit this to perform a man in the
middle attack to view sensitive information or alter encrypted communications.
This issue only affected Ubuntu 12.04 LTS. (CVE-2012-6153)
Subodh Iyengar and Will Shackleton discovered the fix for CVE-2012-5783 was
incomplete for Apache Commons HttpClient. An attacker could exploit this to
perform a man in the middle attack to view sensitive information or alter
encrypted communications. (CVE-2014-3577)
It was discovered that Apache Commons HttpClient did not properly handle read
timeouts during HTTPS handshakes. A remote attacker could trigger this flaw to
cause a denial of service. (CVE-2015-5262)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 15.04:
-
libcommons-httpclient-java
3.1-10.2ubuntu0.15.04.1
- Ubuntu 14.04 LTS:
-
libcommons-httpclient-java
3.1-10.2ubuntu0.14.04.1
- Ubuntu 12.04 LTS:
-
libcommons-httpclient-java
3.1-10ubuntu0.1
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
USN-2709-2: pollinate update
Ubuntu Security Notice USN-2709-2
14th October, 2015
pollinate update
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
Summary
The system would not have expected entropy available.
Software description
- pollinate
– seed the pseudo random number generator in virtual machines
Details
USN-2709-1 updated pollinate’s certificate for entropy.ubuntu.com but did
not include a new certificate authority certificate.
This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
The pollinate package bundles the certificate for entropy.ubuntu.com. This
update refreshes the certificate to match the new certificate for the
server.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 15.04:
-
pollinate
4.11-0ubuntu2.2
- Ubuntu 14.04 LTS:
-
pollinate
4.7-0ubuntu1.4
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
Ubuntu Security Notice USN-2769-1
Ubuntu Security Notice 2769-1 – It was discovered that Apache Commons HttpClient did not properly verify the Common Name or subjectAltName fields of X.509 certificates. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. This issue only affected Ubuntu 12.04 LTS. Florian Weimer discovered the fix for CVE-2012-5783 was incomplete for Apache Commons HttpClient. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. This issue only affected Ubuntu 12.04 LTS. Various other issues were also addressed.
Ubuntu Security Notice USN-2709-2
Ubuntu Security Notice 2709-2 – USN-2709-1 updated pollinate’s certificate for entropy.ubuntu.com but did not include a new certificate authority certificate. This update fixes the problem. Various other issues were also addressed.