You are here
Home > Preporuke > Ranjivost programskog paketa bugzilla

Ranjivost programskog paketa bugzilla

  • Detalji os-a: FED
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2015-1713
2015-02-05 01:58:43
——————————————————————————–

Name : bugzilla
Product : Fedora 21
Version : 4.4.8
Release : 1.fc21.1
URL : http://www.bugzilla.org/
Summary : Bug tracking system
Description :
Bugzilla is a popular bug tracking system used by multiple open source projects
It requires a database engine installed – either MySQL, PostgreSQL or Oracle.
Without one of these database engines (local or remote), Bugzilla will not work
– see the Release Notes for details.

——————————————————————————–
Update Information:

This is a security update for Bugzilla which fixes two issues:

* A user with editcomponents permissions could possibly inject system
commands in product names and possibly other attributes.
* Methods from imported modules could possibly be executed using
the WebService API.

The first issue is tracked as CVE-2014-8630.
See https://www.bugzilla.org/security/4.0.15/ for all the details.
——————————————————————————–
ChangeLog:

* Sat Jan 31 2015 Emmanuel Seyman <emmanuel@seyman.fr> – 4.4.8-1.1
– Include correct sources
* Sat Jan 31 2015 Emmanuel Seyman <emmanuel@seyman.fr> – 4.4.8-1
– Update to 4.4.8 (fixes regressions in 4.4.7 which itself
fixed security flaws) (CVE-2014-1571, CVE-2014-8630)
– Remove bundled binary files (#1000245)
– Add webdot directory perms to apache configuration
——————————————————————————–
References:

[ 1 ] Bug #1185483 – CVE-2014-8630 Bugzilla: Command Injection into product names and other attributes
https://bugzilla.redhat.com/show_bug.cgi?id=1185483
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update bugzilla’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2015-1699
2015-02-05 01:58:08
——————————————————————————–

Name : bugzilla
Product : Fedora 20
Version : 4.2.13
Release : 1.fc20
URL : http://www.bugzilla.org/
Summary : Bug tracking system
Description :
Bugzilla is a popular bug tracking system used by multiple open source projects
It requires a database engine installed – either MySQL, PostgreSQL or Oracle.
Without one of these database engines (local or remote), Bugzilla will not work
– see the Release Notes for details.

——————————————————————————–
Update Information:

This is a security update for Bugzilla which fixes two issues:

* A user with editcomponents permissions could possibly inject system
commands in product names and possibly other attributes.
* Methods from imported modules could possibly be executed using
the WebService API.

The first issue is tracked as CVE-2014-8630.
See https://www.bugzilla.org/security/4.0.15/ for all the details.
——————————————————————————–
ChangeLog:

* Sat Jan 31 2015 Emmanuel Seyman <emmanuel@seyman.fr> – 4.4.8-1
– Update to 4.2.13 (fixes regressions in 4.2.12 which itself
fixed security flaws) (CVE-2014-1571, CVE-2014-8630)
– Remove bundled binary files (#1000245)
– Add webdot directory perms to apache configuration
* Wed Oct 8 2014 Emmanuel Seyman <emmanuel@seyman.fr> – 4.2.11-1
– Update to 4.2.11 (CVE-2014-157, CVE-2014-1573 and CVE-2014-1571)
* Fri Jul 25 2014 Emmanuel Seyman <emmanuel@seyman.fr> – 4.2.10-1
– Update to 4.2.10 which fixes a security bug (CVE-2014-1546)
* Sat Apr 19 2014 Emmanuel Seyman <emmanuel@seyman.fr> – 4.2.9-1
– Update to 4.2.9 (regression fix for 4.2.8 which was a security update)
– Drop backported patches
* Sun Jan 19 2014 Emmanuel Seyman <emmanuel@seyman.fr> – 4.2.7-3
– Fix the comparison of module versions (#1044854)
– Really honor the PROJECT environment variable (#911943)
——————————————————————————–
References:

[ 1 ] Bug #1185483 – CVE-2014-8630 Bugzilla: Command Injection into product names and other attributes
https://bugzilla.redhat.com/show_bug.cgi?id=1185483
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update bugzilla’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorTomislav Protega
Cert idNCERT-REF-2015-02-0017-ADV
CveCVE-2014-8630 CVE-2014-1571 CVE-2014-1573 CVE-2014-1546
ID izvornikaFEDORA-2015-1713 FEDORA-2015-1699
Proizvodbugzilla
Izvorhttp://www.redhat.com
Top
More in Preporuke
Sigurnosni propust programskog paketa perl-Gtk2

Ustanovljen je sigurnosni propust u modulu perl-Gtk2 unutar metode Gtk2::Gdk::Display::list_devices. Propust se očitovao neispravnim upravljanjem memorijom, što potencijalno može dovesti...

Close