RHSA-2015:2620-1: Moderate: CFME 5.4.4 bug fixes, and enhancement update

Red Hat Enterprise Linux: Updated cfme packages that fix a security issue, several bugs,
and add various enhancements are now available for Red Hat
CloudForms 3.2.

Red Hat Product Security has rated this update as having Moderate
Security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
CVE-2015-7502

USN-2838-1: cups-filters vulnerability

Ubuntu Security Notice USN-2838-1

16th December, 2015

cups-filters vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.10
  • Ubuntu 15.04
  • Ubuntu 14.04 LTS

Summary

cups-filters could be made to run programs as the lp user if it processed a
specially crafted print job.

Software description

  • cups-filters
    – OpenPrinting CUPS Filters

Details

Adam Chester discovered that the cups-filters foomatic-rip filter
incorrectly stripped shell escape characters. A remote attacker could
possibly use this issue to execute arbitrary code as the lp user.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.10:
cups-filters

1.0.76-1ubuntu0.2
Ubuntu 15.04:
cups-filters

1.0.67-0ubuntu2.6
Ubuntu 14.04 LTS:
cups-filters

1.0.52-0ubuntu1.7

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-8560

USN-2838-2: foomatic-filters vulnerability

Ubuntu Security Notice USN-2838-2

16th December, 2015

foomatic-filters vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

foomatic-filters could be made to run programs as the lp user if it
processed a specially crafted print job.

Software description

  • foomatic-filters
    – OpenPrinting printer support – filters

Details

Adam Chester discovered that the foomatic-filters foomatic-rip filter
incorrectly stripped shell escape characters. A remote attacker could
possibly use this issue to execute arbitrary code as the lp user.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
foomatic-filters

4.0.16-0ubuntu0.4

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-8560

USN-2839-1: CUPS update

Ubuntu Security Notice USN-2839-1

16th December, 2015

cups update

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

A security improvement has been made to CUPS.

Software description

  • cups
    – Common UNIX Printing System(tm)

Details

As a security improvement against the POODLE attack, this update disables
SSLv3 support in the CUPS web interface.

For legacy environments where SSLv3 support is still required, it can be
re-enabled by adding “SSLOptions AllowSSL3” to /etc/cups/cupsd.conf.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
cups

1.7.2-0ubuntu1.7

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

LP: 1505328

CESA-2015:2657 Critical CentOS 6 firefox SecurityUpdate

CentOS Errata and Security Advisory 2015:2657 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-2657.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
d878f9f3704a32b0f6a32031a6d2753fb71e62fa5cdb2946fba1387b83839713  firefox-38.5.0-2.el6.centos.i686.rpm

x86_64:
d878f9f3704a32b0f6a32031a6d2753fb71e62fa5cdb2946fba1387b83839713  firefox-38.5.0-2.el6.centos.i686.rpm
ad885533c10648ffd203624dd51f6d066e4de23ece34439ed12b903b6e34a78c  firefox-38.5.0-2.el6.centos.x86_64.rpm

Source:
303db0ec83d7a6ea8fc31b43075a12c87a46f1dea5d7a63b99645a9d6876bc02  firefox-38.5.0-2.el6.centos.src.rpm



CVE-2015-5304

Red Hat JBoss Enterprise Application Platform (EAP) before 6.4.5 does not properly authorize access to shut down the server, which allows remote authenticated users with the Monitor, Deployer, or Auditor role to cause a denial of service via unspecified vectors.

CVE-2015-8357

Directory traversal vulnerability in the bitrix.xscan module before 1.0.4 for Bitrix allows remote authenticated users to rename arbitrary files, and consequently obtain sensitive information or cause a denial of service, via a .. (dot dot) in the file parameter to admin/bitrix.xscan_worker.php.

CVE-2015-8358

Directory traversal vulnerability in the bitrix.mpbuilder module before 1.0.12 for Bitrix allows remote administrators to include and execute arbitrary local files via a .. (dot dot) in the element name of the “work” array parameter to admin/bitrix.mpbuilder_step2.php.