Drupal Core versions 7.32 and below remote SQL injection exploit. Written in PHP.
Monthly Archives: October 2014
RHBA-2014:1656-1: Red Hat OpenShift Enterprise 2.1 openshift-origin-cartridge-jenkins bug fix
Red Hat Enterprise Linux: An updated openshift-origin-cartridge-jenkins package that fixes a bug is now
available for Red Hat OpenShift Enterprise 2.1.
RHBA-2014:1663-1: Red Hat OpenShift Enterprise 2.0 php and libcgroup bug fix update
Red Hat Enterprise Linux: Updated php and libcgroup packages are now available for Red Hat OpenShift
Enterprise release 2.0. These packages are required to avoid dependency issues
with the base channel for Red Hat Enterprise Linux 6.6.
RHBA-2014:1662-1: Red Hat OpenShift Enterprise 1.2 php and libcgroup bug fix update
Red Hat Enterprise Linux: Updated php and libcgroups packages are now available for Red Hat OpenShift
Enterprise release 1.2. These packages are required to avoid dependency issues
with the base channel for Red Hat Enterprise Linux 6.6.
RHBA-2014:1661-1: Red Hat OpenShift Enterprise 1.2 libcgroup bug fix update
Red Hat Enterprise Linux: Updated php and libcgroup packages are now available for Red Hat OpenShift
Enterprise release 1.2. These packages are required to avoid dependency issues
with the base channel for Red Hat Enterprise Linux 6.6.
RHBA-2014:1660-1: Red Hat OpenShift Enterprise 2.0 libcgroup bug fix update
Red Hat Enterprise Linux: Updated libcgroup packages are now available for Red Hat OpenShift Enterprise
release 2.0. These packages are required to avoid dependency issues with the
base channel for Red Hat Enterprise Linux 6.6.
RHBA-2014:1659-1: Red Hat OpenShift Enterprise 2.1 libcgroup bug fix update
Red Hat Enterprise Linux: Updated libcgroup packages are now available for Red Hat OpenShift Enterprise
release 2.1. These packages are required to avoid dependency issues with the
base channel for Red Hat Enterprise Linux 6.6.
OpenSSL 3.0 Protocol Vulnerability
Original release date: October 17, 2014
US-CERT is aware of a design vulnerability found in the way SSL 3.0 handles block cipher mode padding. Exploitation of this vulnerability may allow a remote attacker to decrypt and extract information from inside an encrypted transaction.
US-CERT recommends users and administrators review TA14-290A for additional information and apply any necessary updates to address this vulnerability.
This product is provided subject to this Notification and this Privacy & Use policy.
USN-2385-1: OpenSSL vulnerabilities
Ubuntu Security Notice USN-2385-1
16th October, 2014
openssl vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary
Several security issues were fixed in OpenSSL.
Software description
- openssl
– Secure Socket Layer (SSL) cryptographic library and tools
Details
It was discovered that OpenSSL incorrectly handled memory when parsing
DTLS SRTP extension data. A remote attacker could possibly use this issue
to cause OpenSSL to consume resources, resulting in a denial of service.
This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
(CVE-2014-3513)
It was discovered that OpenSSL incorrectly handled memory when verifying
the integrity of a session ticket. A remote attacker could possibly use
this issue to cause OpenSSL to consume resources, resulting in a denial of
service. (CVE-2014-3567)
In addition, this update introduces support for the TLS Fallback Signaling
Cipher Suite Value (TLS_FALLBACK_SCSV). This new feature prevents protocol
downgrade attacks when certain applications such as web browsers attempt
to reconnect using a lower protocol version for interoperability reasons.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 14.04 LTS:
-
libssl1.0.0
1.0.1f-1ubuntu2.7
- Ubuntu 12.04 LTS:
-
libssl1.0.0
1.0.1-4ubuntu5.20
- Ubuntu 10.04 LTS:
-
libssl0.9.8
0.9.8k-7ubuntu8.22
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to reboot your computer to make all
the necessary changes.
References
USN-2386-1: OpenJDK 6 vulnerabilities
Ubuntu Security Notice USN-2386-1
16th October, 2014
openjdk-6 vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary
Several security issues were fixed in OpenJDK 6.
Software description
- openjdk-6
– Open Source Java implementation
Details
A vulnerability was discovered in the OpenJDK JRE related to information
disclosure and data integrity. An attacker could exploit this to expose
sensitive data over the network. (CVE-2014-6457)
Several vulnerabilities were discovered in the OpenJDK JRE related to data
integrity. (CVE-2014-6502, CVE-2014-6512, CVE-2014-6519, CVE-2014-6558)
Several vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure. An attacker could exploit these to expose sensitive
data over the network. (CVE-2014-6504, CVE-2014-6511, CVE-2014-6517,
CVE-2014-6531)
Two vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure, data integrity and availability. An attacker could
exploit these to cause a denial of service or expose sensitive data over
the network. (CVE-2014-6506, CVE-2014-6513)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 12.04 LTS:
-
icedtea-6-jre-cacao
6b33-1.13.5-1ubuntu0.12.04
-
icedtea-6-jre-jamvm
6b33-1.13.5-1ubuntu0.12.04
-
openjdk-6-jre
6b33-1.13.5-1ubuntu0.12.04
-
openjdk-6-jre-headless
6b33-1.13.5-1ubuntu0.12.04
-
openjdk-6-jre-zero
6b33-1.13.5-1ubuntu0.12.04
-
openjdk-6-jre-lib
6b33-1.13.5-1ubuntu0.12.04
- Ubuntu 10.04 LTS:
-
openjdk-6-jre-headless
6b33-1.13.5-1ubuntu0.10.04
-
openjdk-6-jre-lib
6b33-1.13.5-1ubuntu0.10.04
-
icedtea-6-jre-cacao
6b33-1.13.5-1ubuntu0.10.04
-
openjdk-6-jre
6b33-1.13.5-1ubuntu0.10.04
-
openjdk-6-jre-zero
6b33-1.13.5-1ubuntu0.10.04
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.
This update contains known regressions in the community supported JamVM
alternative Java Virtual Machine and a future update will correct these
issues. See https://launchpad.net/bugs/1382205 for details. We apologize
for the inconvenience.