You are here
Home > Preporuke > Ranjivost programskog paketa jBCrypt

Ranjivost programskog paketa jBCrypt

  • Detalji os-a: FED
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2015-3032
2015-03-04 07:07:58
——————————————————————————–

Name : jBCrypt
Product : Fedora 21
Version : 0.4
Release : 1.fc21
URL : http://www.mindrot.org/projects/jBCrypt
Summary : Strong password hashing for Java
Description :
A Java implementation of OpenBSD’s Blowfish password hashing code.

——————————————————————————–
Update Information:

Security fix for CVE-2015-0886
——————————————————————————–
ChangeLog:

* Mon Mar 2 2015 Michal Srb <msrb@redhat.com> – 0.4-1
– Update to upstream version 0.4
– Resolves: CVE-2015-0886
——————————————————————————–
References:

[ 1 ] Bug #1197815 – CVE-2015-0886 jBCrypt: integer overflow in the crypt_raw method
https://bugzilla.redhat.com/show_bug.cgi?id=1197815
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update jBCrypt’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2015-2994
2015-03-04 07:05:59
——————————————————————————–

Name : jBCrypt
Product : Fedora 20
Version : 0.4
Release : 1.fc20
URL : http://www.mindrot.org/projects/jBCrypt
Summary : Strong password hashing for Java
Description :
A Java implementation of OpenBSD’s Blowfish password hashing code.

——————————————————————————–
Update Information:

Security fix for CVE-2015-0886
——————————————————————————–
ChangeLog:

* Mon Mar 2 2015 Michal Srb <msrb@redhat.com> – 0.4-1
– Update to upstream version 0.4
– Resolves: CVE-2015-0886
——————————————————————————–
References:

[ 1 ] Bug #1197815 – CVE-2015-0886 jBCrypt: integer overflow in the crypt_raw method
https://bugzilla.redhat.com/show_bug.cgi?id=1197815
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update jBCrypt’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorTomislav Protega
Cert idNCERT-REF-2015-03-0034-ADV
CveCVE-2015-0886
ID izvornikaFEDORA-2015-3120 FEDORA-2015-3032 FEDORA-2015-2994
ProizvodjBCrypt
Izvorhttp://www.redhat.com
Top
More in Preporuke
XSS ranjivost programske biblioteke tcllib

Otkrivena je XSS ranjivost u HTML elementu "" u programskoj biblioteci tcllib za Fedoru. Ranjivost može biti iskorištena za izbjegavanje...

Close