Resolved Bugs
1197815 – CVE-2015-0886 jBCrypt: integer overflow in the crypt_raw method
1197816 – CVE-2015-0886 jBCrypt: integer overflow in the crypt_raw method [fedora-all]<br
Security fix for CVE-2015-0886
Category Archives: Fedora
Fedora – Security Updates
Fedora 21 Security Update: kernel-3.18.8-201.fc21
Resolved Bugs
1196581 – CVE-2015-1421 kernel: net: slab corruption from use after free on INIT collisions
1196595 – CVE-2015-1421 kernel: net: slab corruption from use after free on INIT collisions [fedora-all]
1190947 – Add support for Atheros AR5B195 combo card (the AR3011 bluetooth part)
1190933 – kernel 3.18: read-only root due to journal_async_commit in /etc/fstab
1188439 – Dell XPS 13 9343 (2015) touchpad freeze
1193907 – CVE-2015-0275 kernel: fs: ext4: fallocate zero range page size > block size BUG()
1195178 – CVE-2015-0275 kernel: fs: ext4: fallocate zero range page size > block size BUG() [fedora-all]
1194612 – Please move mptspi.ko.xz (and related modules) to kernel-core
1189864 – kernel: potential memory corruption (denial of service) in vhost/scsi driver
1192079 – kernel: potential memory corruption (denial of service) in vhost/scsi driver [fedora-all]
1192519 – CVE-2015-1593 kernel: Linux stack ASLR implementation Integer overflow
1192520 – kernel: Linux stack ASLR implementation Integer overflow [fedora-all]<br
Update to latest upstream stable release, Linux v3.18.8. Numerous bugfixes across the tree.
Fedora 20 Security Update: cups-filters-1.0.53-6.fc20
This fixes a security flaw in cups-browsed.
Fedora 20 Security Update: jBCrypt-0.4-1.fc20
Fedora 20 Security Update: kernel-3.18.8-100.fc20
Resolved Bugs
1196581 – CVE-2015-1421 kernel: net: slab corruption from use after free on INIT collisions
1196595 – CVE-2015-1421 kernel: net: slab corruption from use after free on INIT collisions [fedora-all]
1190947 – Add support for Atheros AR5B195 combo card (the AR3011 bluetooth part)
1190933 – kernel 3.18: read-only root due to journal_async_commit in /etc/fstab
1188439 – Dell XPS 13 9343 (2015) touchpad freeze
1193907 – CVE-2015-0275 kernel: fs: ext4: fallocate zero range page size > block size BUG()
1195178 – CVE-2015-0275 kernel: fs: ext4: fallocate zero range page size > block size BUG() [fedora-all]
1189864 – kernel: potential memory corruption (denial of service) in vhost/scsi driver
1192079 – kernel: potential memory corruption (denial of service) in vhost/scsi driver [fedora-all]
1192519 – CVE-2015-1593 kernel: Linux stack ASLR implementation Integer overflow
1192520 – kernel: Linux stack ASLR implementation Integer overflow [fedora-all]<br
Update to the latest stable upstream release, Linux v3.18.8. Numerous fixes across the tree.
Fedora 22 Security Update: cups-filters-1.0.66-1.fc22
New upstream bug-fix release which fixes a security flaw in cups-browsed.
Fedora 22 Security Update: librsync-1.0.0-1.fc22,csync2-1.34-15.fc22,duplicity-0.6.25-3.fc22,rdiff-backup-1.2.8-14.fc22
Resolved Bugs
1126718 – librsync: rsync: checksum collisions leading to a denial of service [fedora-all]
1126712 – CVE-2014-8242 librsync: MD4 collision file corruption<br
Changes in librsync 1.0.0 (2015-01-23)
======================================
* SECURITY: CVE-2014-8242: librsync previously used a truncated MD4 “strong” check sum to match blocks. However, MD4 is not cryptographically strong. It’s possible that an attacker who can control the contents of one part of a file could use it to control other regions of the file, if it’s transferred using librsync/rdiff. For example this might occur in a database, mailbox, or VM image containing some attacker-controlled data. To mitigate this issue, signatures will by default be computed with a 256-bit BLAKE2 hash. Old versions of librsync will complain about a bad magic number when given these signature files. Backward compatibility can be obtained using the new `rdiff sig –hash=md4` option or through specifying the “signature magic” in the API, but this should not be used when either the old or new file contain untrusted data. Deltas generated from those signatures will also use BLAKE2 during generation, but produce output that can be read by old versions. See https://github.com/librsync/librsync/issues/5. Thanks to Michael Samuel for reporting this and offering an initial patch.
* Various build fixes, thanks Timothy Gu.
* Improved rdiff man page from Debian.
* Improved librsync.spec file for building RPMs.
* Fixed bug #1110812 ‘internal error: job made no progress’; on large files.
* Moved hosting to https://github.com/librsync/librsync/
* Travis-CI.org integration test at https://travis-ci.org/librsync/librsync/
* Remove bundled copy of popt; it must be installed separately.
* You can set `$LIBTOOLIZE` before running `autogen.sh`, for example on OS X Homebrew where it is called `glibtoolize`.
Fedora EPEL 7 Security Update: cabextract-1.5-1.el7
Fedora EPEL 6 Security Update: cabextract-1.5-1.el6
Fedora 20 Security Update: qt3-3.3.8b-62.fc20
Resolved Bugs
1197273 – CVE-2015-0295 QT: BMP image handler crash
1197275 – CVE-2015-0295 qt3: QT: BMP image handler crash [fedora-all]<br
This update fixes CVE-2015-0295, a division by zero when loading some specific invalid BMP/DIB image files, which could be exploited for denial of service (application crash) attacks. The security patch is backported from Qt 4.