You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa mantis

Sigurnosni nedostaci programskog paketa mantis

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2014-16504
2014-12-12 02:43:41
——————————————————————————–

Name : mantis
Product : Fedora 19
Version : 1.2.18
Release : 1.fc19
URL : http://www.mantisbt.org/
Summary : Web-based issue tracking system
Description :
Mantis is a free popular web-based issue tracking system.
It is written in the PHP scripting language and works with MySQL, MS SQL,
and PostgreSQL databases and a web server.
Almost any web browser should be able to function as a client.

Documentation can be found in: /usr/share/doc/mantis-1.2.18

When the package has finished installing, you will need to perform some
additional configuration steps; these are described in:
/usr/share/doc/mantis-1.2.18/README.Fedora

——————————————————————————–
Update Information:

Security fix for CVE-2014-9280, CVE-2014-9279, CVE-2014-6316, CVE-2014-9117, CVE-2014-9089
——————————————————————————–
ChangeLog:

* Tue Dec 9 2014 Gianluca Sforna <giallu@gmail.com> – 1.2.18-1
– new upstream release
– drop upstreamed patches
– fix several security issues, full list in upstream changelog:
http://www.mantisbt.org/bugs/changelog_page.php?version_id=191
* Fri Nov 14 2014 Gianluca Sforna <giallu@gmail.com> – 1.2.17-4
– fix CVE-2014-7146, CVE-2014-8598 (#1162046)
– fix CVE-2014-8554 (#1159295)
* Fri Oct 3 2014 Gianluca Sforna <giallu@gmail.com> – 1.2.17-3
– fix CVE-2014-6387 (#1141310)
* Sat Jun 7 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 1.2.17-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Tue Mar 4 2014 Gianluca Sforna <giallu@gmail.com> – 1.2.17-1
– new upstream release
– fix CVE-2014-2238 (#1071460)
– remove upstreamed patch
* Mon Oct 28 2013 Gianluca Sforna <giallu@gmail.com> – 1.2.15-3
– fix CVE-2013-4460 (#1022246)
* Fri Jul 26 2013 Ville Skyttä <ville.skytta@iki.fi> – 1.2.15-2
– Honor %{_pkgdocdir} where available.
* Tue Apr 16 2013 Gianluca Sforna <giallu@gmail.com> – 1.2.15-1
– new upstream release
– fix CVE-2013-1930 (#948971)
– fix CVE-2013-1931 (#948975)
– drop upstreamed patch
——————————————————————————–
References:

[ 1 ] Bug #1171709 – CVE-2014-9280 mantis: PHP Object Injection in filter API
https://bugzilla.redhat.com/show_bug.cgi?id=1171709
[ 2 ] Bug #1171713 – CVE-2014-9279 mantis: database credentials disclosure in MantisBT’s unattended upgrade script
https://bugzilla.redhat.com/show_bug.cgi?id=1171713
[ 3 ] Bug #1170542 – CVE-2014-6316 mantis: URL redirection issue
https://bugzilla.redhat.com/show_bug.cgi?id=1170542
[ 4 ] Bug #1170193 – CVE-2014-9272 mantis: XSS in string_insert_hrefs()
https://bugzilla.redhat.com/show_bug.cgi?id=1170193
[ 5 ] Bug #1170192 – CVE-2014-9281 mantis: XSS in admin panel / copy_field.php
https://bugzilla.redhat.com/show_bug.cgi?id=1170192
[ 6 ] Bug #1170188 – CVE-2014-9270 mantis: XSS in projax_api.php
https://bugzilla.redhat.com/show_bug.cgi?id=1170188
[ 7 ] Bug #1170180 – CVE-2014-9269 mantis: XSS in extended project browser
https://bugzilla.redhat.com/show_bug.cgi?id=1170180
[ 8 ] Bug #1168618 – CVE-2014-9117 mantis: CAPTCHA bypass in registration form
https://bugzilla.redhat.com/show_bug.cgi?id=1168618
[ 9 ] Bug #1168161 – CVE-2014-9089 mantis: SQL injection in view_all_set.php
https://bugzilla.redhat.com/show_bug.cgi?id=1168161
[ 10 ] Bug #1165152 – CVE-2014-8987 mantis: XSS on Configuration Report page
https://bugzilla.redhat.com/show_bug.cgi?id=1165152
[ 11 ] Bug #1164631 – CVE-2014-8988 mantis: information disclosure issue to be fixed in the upcoming 1.2.18 release
https://bugzilla.redhat.com/show_bug.cgi?id=1164631
[ 12 ] Bug #1164620 – CVE-2014-8986 mantis: cross-site scripting (XSS) issues to be fixed in the upcoming 1.2.18 release
https://bugzilla.redhat.com/show_bug.cgi?id=1164620
[ 13 ] Bug #1169162 – mantis: PHP object injection in filter API
https://bugzilla.redhat.com/show_bug.cgi?id=1169162
[ 14 ] Bug #1169194 – mantis: database credentials leak
https://bugzilla.redhat.com/show_bug.cgi?id=1169194
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update mantis’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2014-16546
2014-12-12 02:45:33
——————————————————————————–

Name : mantis
Product : Fedora 20
Version : 1.2.18
Release : 1.fc20
URL : http://www.mantisbt.org/
Summary : Web-based issue tracking system
Description :
Mantis is a free popular web-based issue tracking system.
It is written in the PHP scripting language and works with MySQL, MS SQL,
and PostgreSQL databases and a web server.
Almost any web browser should be able to function as a client.

Documentation can be found in: /usr/share/doc/mantis

When the package has finished installing, you will need to perform some
additional configuration steps; these are described in:
/usr/share/doc/mantis/README.Fedora

——————————————————————————–
Update Information:

Security fix for CVE-2014-9280, CVE-2014-9279, CVE-2014-6316, CVE-2014-9117, CVE-2014-9089
——————————————————————————–
ChangeLog:

* Tue Dec 9 2014 Gianluca Sforna <giallu@gmail.com> – 1.2.18-1
– new upstream release
– drop upstreamed patches
– fix several security issues, full list in upstream changelog:
http://www.mantisbt.org/bugs/changelog_page.php?version_id=191
* Fri Nov 14 2014 Gianluca Sforna <giallu@gmail.com> – 1.2.17-4
– fix CVE-2014-7146, CVE-2014-8598 (#1162046)
– fix CVE-2014-8554 (#1159295)
* Fri Oct 3 2014 Gianluca Sforna <giallu@gmail.com> – 1.2.17-3
– fix CVE-2014-6387 (#1141310)
* Sat Jun 7 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 1.2.17-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Tue Mar 4 2014 Gianluca Sforna <giallu@gmail.com> – 1.2.17-1
– new upstream release
– fix CVE-2014-2238 (#1071460)
– remove upstreamed patch
——————————————————————————–
References:

[ 1 ] Bug #1171709 – CVE-2014-9280 mantis: PHP Object Injection in filter API
https://bugzilla.redhat.com/show_bug.cgi?id=1171709
[ 2 ] Bug #1171713 – CVE-2014-9279 mantis: database credentials disclosure in MantisBT’s unattended upgrade script
https://bugzilla.redhat.com/show_bug.cgi?id=1171713
[ 3 ] Bug #1170542 – CVE-2014-6316 mantis: URL redirection issue
https://bugzilla.redhat.com/show_bug.cgi?id=1170542
[ 4 ] Bug #1170193 – CVE-2014-9272 mantis: XSS in string_insert_hrefs()
https://bugzilla.redhat.com/show_bug.cgi?id=1170193
[ 5 ] Bug #1170192 – CVE-2014-9281 mantis: XSS in admin panel / copy_field.php
https://bugzilla.redhat.com/show_bug.cgi?id=1170192
[ 6 ] Bug #1170188 – CVE-2014-9270 mantis: XSS in projax_api.php
https://bugzilla.redhat.com/show_bug.cgi?id=1170188
[ 7 ] Bug #1170180 – CVE-2014-9269 mantis: XSS in extended project browser
https://bugzilla.redhat.com/show_bug.cgi?id=1170180
[ 8 ] Bug #1168618 – CVE-2014-9117 mantis: CAPTCHA bypass in registration form
https://bugzilla.redhat.com/show_bug.cgi?id=1168618
[ 9 ] Bug #1168161 – CVE-2014-9089 mantis: SQL injection in view_all_set.php
https://bugzilla.redhat.com/show_bug.cgi?id=1168161
[ 10 ] Bug #1165152 – CVE-2014-8987 mantis: XSS on Configuration Report page
https://bugzilla.redhat.com/show_bug.cgi?id=1165152
[ 11 ] Bug #1164631 – CVE-2014-8988 mantis: information disclosure issue to be fixed in the upcoming 1.2.18 release
https://bugzilla.redhat.com/show_bug.cgi?id=1164631
[ 12 ] Bug #1164620 – CVE-2014-8986 mantis: cross-site scripting (XSS) issues to be fixed in the upcoming 1.2.18 release
https://bugzilla.redhat.com/show_bug.cgi?id=1164620
[ 13 ] Bug #1169162 – mantis: PHP object injection in filter API
https://bugzilla.redhat.com/show_bug.cgi?id=1169162
[ 14 ] Bug #1169194 – mantis: database credentials leak
https://bugzilla.redhat.com/show_bug.cgi?id=1169194
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update mantis’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2014-16609
2014-12-12 02:48:02
——————————————————————————–

Name : mantis
Product : Fedora 21
Version : 1.2.18
Release : 1.fc21
URL : http://www.mantisbt.org/
Summary : Web-based issue tracking system
Description :
Mantis is a free popular web-based issue tracking system.
It is written in the PHP scripting language and works with MySQL, MS SQL,
and PostgreSQL databases and a web server.
Almost any web browser should be able to function as a client.

Documentation can be found in: /usr/share/doc/mantis

When the package has finished installing, you will need to perform some
additional configuration steps; these are described in:
/usr/share/doc/mantis/README.Fedora

——————————————————————————–
Update Information:

Security fix for CVE-2014-9280, CVE-2014-9279, CVE-2014-6316, CVE-2014-9117, CVE-2014-9089
——————————————————————————–
ChangeLog:

* Tue Dec 9 2014 Gianluca Sforna <giallu@gmail.com> – 1.2.18-1
– new upstream release
– drop upstreamed patches
– fix several security issues, full list in upstream changelog:
http://www.mantisbt.org/bugs/changelog_page.php?version_id=191
* Fri Nov 14 2014 Gianluca Sforna <giallu@gmail.com> – 1.2.17-4
– fix CVE-2014-7146, CVE-2014-8598 (#1162046)
– fix CVE-2014-8554 (#1159295)
——————————————————————————–
References:

[ 1 ] Bug #1171709 – CVE-2014-9280 mantis: PHP Object Injection in filter API
https://bugzilla.redhat.com/show_bug.cgi?id=1171709
[ 2 ] Bug #1171713 – CVE-2014-9279 mantis: database credentials disclosure in MantisBT’s unattended upgrade script
https://bugzilla.redhat.com/show_bug.cgi?id=1171713
[ 3 ] Bug #1170542 – CVE-2014-6316 mantis: URL redirection issue
https://bugzilla.redhat.com/show_bug.cgi?id=1170542
[ 4 ] Bug #1170193 – CVE-2014-9272 mantis: XSS in string_insert_hrefs()
https://bugzilla.redhat.com/show_bug.cgi?id=1170193
[ 5 ] Bug #1170192 – CVE-2014-9281 mantis: XSS in admin panel / copy_field.php
https://bugzilla.redhat.com/show_bug.cgi?id=1170192
[ 6 ] Bug #1170188 – CVE-2014-9270 mantis: XSS in projax_api.php
https://bugzilla.redhat.com/show_bug.cgi?id=1170188
[ 7 ] Bug #1170180 – CVE-2014-9269 mantis: XSS in extended project browser
https://bugzilla.redhat.com/show_bug.cgi?id=1170180
[ 8 ] Bug #1168618 – CVE-2014-9117 mantis: CAPTCHA bypass in registration form
https://bugzilla.redhat.com/show_bug.cgi?id=1168618
[ 9 ] Bug #1168161 – CVE-2014-9089 mantis: SQL injection in view_all_set.php
https://bugzilla.redhat.com/show_bug.cgi?id=1168161
[ 10 ] Bug #1165152 – CVE-2014-8987 mantis: XSS on Configuration Report page
https://bugzilla.redhat.com/show_bug.cgi?id=1165152
[ 11 ] Bug #1164631 – CVE-2014-8988 mantis: information disclosure issue to be fixed in the upcoming 1.2.18 release
https://bugzilla.redhat.com/show_bug.cgi?id=1164631
[ 12 ] Bug #1164620 – CVE-2014-8986 mantis: cross-site scripting (XSS) issues to be fixed in the upcoming 1.2.18 release
https://bugzilla.redhat.com/show_bug.cgi?id=1164620
[ 13 ] Bug #1169162 – mantis: PHP object injection in filter API
https://bugzilla.redhat.com/show_bug.cgi?id=1169162
[ 14 ] Bug #1169194 – mantis: database credentials leak
https://bugzilla.redhat.com/show_bug.cgi?id=1169194
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update mantis’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2014-12-0017-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivosti jezgre operacijskog sustava

Izdana je nadogradnja za otklanjanje nekoliko ranjivosti u jezgri operacijskog sustava openSUSE 13.2 Ranjivosti zahvaćaju određene dijelove jezgre, a mogle...

Close