You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa elog

Sigurnosni nedostaci programskog paketa elog

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2020-f49fe7f011
2020-01-25 06:33:58.981322
——————————————————————————–

Name : elog
Product : Fedora 31
Version : 3.1.4
Release : 1.20190113git283534d97d5a.fc31
URL : https://midas.psi.ch/elog/
Summary : Logbook system to manage notes through a Web interface
Description :
ELOG is part of a family of applications known as weblogs. Their general
purpose is:

1. To make it easy for people to put information online in a chronological
fashion, in the form of short, time-stamped text messages (“entries”) with
optional HTML markup for presentation, and optional file attachments
(images, archives, etc.)

2. To make it easy for other people to access this information through a
Web interface, browse entries, search, download files, and optionally add,
update, delete or comment on entries.

ELOG is a remarkable implementation of a weblog in at least two respects:

1. Its simplicity of use: you don’t need to be a seasoned server operator
and/or an experimented database administrator to run ELOG ; one executable
file (under Unix or Windows), a simple configuration text file, and it works.
No Web server or relational database required. It is also easy to translate
the interface to the appropriate language for your users.

2. Its versatility: through its single configuration file, ELOG can be made
to display an infinity of variants of the weblog concept. There are options
for what to display, how to display it, what commands are available and to
whom, access control, etc. Moreover, a single server can host several
weblogs, and each weblog can be totally different from the rest.

——————————————————————————–
Update Information:

Security fix for CVE-2019-3993, CVE-2019-3994, CVE-2019-3995, CVE-2019-3992,
CVE-2019-3996
——————————————————————————–
ChangeLog:

* Mon Jan 13 2020 Ben Rosser <rosser.bjr@gmail.com> – 3.1.4-1.20190113git283534d97d5a
– Update to post-release snapshot of 3.1.4.
– Fix several security issues.
——————————————————————————–
References:

[ 1 ] Bug #1787064 – CVE-2019-3993 elog: allows recover an user password hash by sending a crafted HTTP POST request
https://bugzilla.redhat.com/show_bug.cgi?id=1787064
[ 2 ] Bug #1787060 – CVE-2019-3994 elog: use-after-free by sending multiple crafted HTTP POST requests
https://bugzilla.redhat.com/show_bug.cgi?id=1787060
[ 3 ] Bug #1787055 – CVE-2019-3995 elog: NULL pointer dereference via crafted HTTP GET request
https://bugzilla.redhat.com/show_bug.cgi?id=1787055
[ 4 ] Bug #1787051 – CVE-2019-3992 elog: allows access the server configuration file by sending a HTTP GET request
https://bugzilla.redhat.com/show_bug.cgi?id=1787051
[ 5 ] Bug #1786750 – CVE-2019-3996 elog: unauthenticated remote users can proxy HTTP GET requests via crafted POST requests
https://bugzilla.redhat.com/show_bug.cgi?id=1786750
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-f49fe7f011’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2020-9f8bc040c8
2020-01-24 18:50:35.138423
——————————————————————————–

Name : elog
Product : Fedora 30
Version : 3.1.4
Release : 1.20190113git283534d97d5a.fc30
URL : https://midas.psi.ch/elog/
Summary : Logbook system to manage notes through a Web interface
Description :
ELOG is part of a family of applications known as weblogs. Their general
purpose is:

1. To make it easy for people to put information online in a chronological
fashion, in the form of short, time-stamped text messages (“entries”) with
optional HTML markup for presentation, and optional file attachments
(images, archives, etc.)

2. To make it easy for other people to access this information through a
Web interface, browse entries, search, download files, and optionally add,
update, delete or comment on entries.

ELOG is a remarkable implementation of a weblog in at least two respects:

1. Its simplicity of use: you don’t need to be a seasoned server operator
and/or an experimented database administrator to run ELOG ; one executable
file (under Unix or Windows), a simple configuration text file, and it works.
No Web server or relational database required. It is also easy to translate
the interface to the appropriate language for your users.

2. Its versatility: through its single configuration file, ELOG can be made
to display an infinity of variants of the weblog concept. There are options
for what to display, how to display it, what commands are available and to
whom, access control, etc. Moreover, a single server can host several
weblogs, and each weblog can be totally different from the rest.

——————————————————————————–
Update Information:

Security fix for CVE-2019-3993, CVE-2019-3994, CVE-2019-3995, CVE-2019-3992,
CVE-2019-3996
——————————————————————————–
ChangeLog:

* Mon Jan 13 2020 Ben Rosser <rosser.bjr@gmail.com> – 3.1.4-1.20190113git283534d97d5a
– Update to post-release snapshot of 3.1.4.
– Fix several security issues.
* Wed Jul 24 2019 Fedora Release Engineering <releng@fedoraproject.org> – 3.1.3-9
– Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1787064 – CVE-2019-3993 elog: allows recover an user password hash by sending a crafted HTTP POST request
https://bugzilla.redhat.com/show_bug.cgi?id=1787064
[ 2 ] Bug #1787060 – CVE-2019-3994 elog: use-after-free by sending multiple crafted HTTP POST requests
https://bugzilla.redhat.com/show_bug.cgi?id=1787060
[ 3 ] Bug #1787055 – CVE-2019-3995 elog: NULL pointer dereference via crafted HTTP GET request
https://bugzilla.redhat.com/show_bug.cgi?id=1787055
[ 4 ] Bug #1787051 – CVE-2019-3992 elog: allows access the server configuration file by sending a HTTP GET request
https://bugzilla.redhat.com/show_bug.cgi?id=1787051
[ 5 ] Bug #1786750 – CVE-2019-3996 elog: unauthenticated remote users can proxy HTTP GET requests via crafted POST requests
https://bugzilla.redhat.com/show_bug.cgi?id=1786750
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-9f8bc040c8’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorToni Vugdelija
Cert idNCERT-REF-2020-01-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programske biblioteke libvpx

Otkriveni su sigurnosni nedostaci programske biblioteke libvpx za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim udaljenim napadačima omogućuju izazivanje DoS stanja,...

Close