It was discovered that mod_wsgi incorrectly handled errors when
setting up the working directory and group access rights. A malicious
application could possibly use this issue to cause a local privilege
escalation when using daemon mode (CVE-2014-8583).
In the QuickDER decoder in NSS before 3.17.3, ASN.1 DER decoding of
lengths is too permissive, allowing undetected smuggling of arbitrary
data (CVE-2014-1569).
This update adds support for the TLS Fallback Signaling Cipher Suite
Value (TLS_FALLBACK_SCSV) in NSS, which can be used to prevent protocol
downgrade attacks against applications which re-connect using a lower
SSL/TLS protocol version when the initial connection indicating the
highest supported protocol version fails. This can prevent a forceful
downgrade of the communication to SSL 3.0, mitigating CVE-2014-3566,
also known as POODLE. SSL 3.0 support has also been disabled by
default in this Firefox and Thunderbird update, further mitigating
POODLE.
Heap-based buffer overflow in the process_copy_in function in GNU
Cpio 2.11 allows remote attackers to cause a denial of service via
a large block value in a cpio archive (CVE-2014-9112).
Additionally, a null pointer dereference in the copyin_link function
which could cause a denial of service has also been fixed.
It was found that RPM wrote file contents to the target
installation directory under a temporary name, and verified its
cryptographic signature only after the temporary file has been
written completely. Under certain conditions, the system interprets
the unverified temporary file contents and extracts commands from
it. This could allow an attacker to modify signed RPM files in such
a way that they would execute code chosen by the attacker during
package installation (CVE-2013-6435).
It was found that RPM could encounter an integer overflow, leading to
a stack-based buffer overflow, while parsing a crafted CPIO header
in the payload section of an RPM file. This could allow an attacker
to modify signed RPM files in such a way that they would execute code
chosen by the attacker during package installation (CVE-2014-8118).
Dragana Damjanovic discovered that OpenVPN incorrectly handled certain
control channel packets. An authenticated attacker could use this
issue to cause an OpenVPN server to crash, resulting in a denial of
service (CVE-2014-8104).
The openvpn packages has been updated to the 2.3.2 version and patched
to correct this issue.
Josh Duart of the Google Security Team discovered heap-based buffer
overflow flaws in JasPer, which could lead to denial of service
(application crash) or the execution of arbitrary code (CVE-2014-9029).
Format string vulnerability in the yyerror function in
lib/cgraph/scan.l in Graphviz allows remote attackers to have
unspecified impact via format string specifiers in unknown vector,
which are not properly handled in an error string (CVE-2014-9157).
During migration, the values read from migration stream during ram load
are not validated. Especially offset in host_from_stream_offset() and
also the length of the writes in the callers of the said function. A
user able to alter the savevm data (either on the disk or over the
wire during migration) could use either of these flaws to corrupt QEMU
process memory on the (destination) host, which could potentially
result in arbitrary code execution on the host with the privileges
of the QEMU process (CVE-2014-7840).
Paolo Bonzini of Red Hat discovered that the blit region checks were
insufficient in the Cirrus VGA emulator in qemu. A privileged guest
user could use this flaw to write into qemu address space on the host,
potentially escalating their privileges to those of the qemu host
process (CVE-2014-8106).
Updated yaml and perl-YAML-LibYAML packages fix security vulnerability:
An assertion failure was found in the way the libyaml library parsed
wrapped strings. An attacker able to load specially crafted YAML input
into an application using libyaml could cause the application to crash
(CVE-2014-9130).
The perl-YAML-LibYAML package is also affected, as it was derived
from the same code. Both have been patched to fix this issue.
Multiple vulnerabilities has been discovered and corrected in
phpmyadmin:
libraries/common.inc.php in phpMyAdmin 4.0.x before 4.0.10.7, 4.1.x
before 4.1.14.8, and 4.2.x before 4.2.13.1 allows remote attackers to
cause a denial of service (resource consumption) via a long password
(CVE-2014-9218).
Cross-site scripting (XSS) vulnerability in the redirection feature in
url.php in phpMyAdmin 4.2.x before 4.2.13.1 allows remote attackers
to inject arbitrary web script or HTML via the url parameter
(CVE-2014-9219).
This upgrade provides the latest phpmyadmin version (4.2.13.1) to
address these vulnerabilities.