Fedora EPEL 6 Security Update: facter-1.6.18-7.el6

Resolved Bugs
1101346 – CVE-2014-3248 puppet: Ruby modules could be loaded from the current working directory
1107891 – CVE-2014-3248 facter: puppet: Ruby modules could be loaded from the current working directory [fedora-19]
1107892 – CVE-2014-3248 facter: puppet: Ruby modules could be loaded from the current working directory [epel-all]<br
1101346 – CVE-2014-3248: puppet: Ruby modules could be loaded from the current working directory
1107891 – CVE-2014-3248: facter: puppet: Ruby modules could be loaded from the current working directory [fedora-19]
Also picks up latests minor tweaks from F19 branch.
Patch facter 1.6 series for Bug 1107891 – CVE-2014-3248
See http://puppetlabs.com/security/cve/cve-2014-3248 for more
information from upstream.

CVE-2013-4539

Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image.

CVE-2013-4538

Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c in QEMU before 1.7.2 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image.

Software and Security Information