drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Rechteprüfung in cas-client
Name: |
Mangelnde Rechteprüfung in cas-client |
|
ID: |
FEDORA-2014-9662 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 20 |
|
Datum: |
Sa, 30. August 2014, 10:17 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4172 |
|
Applikationen: |
phpCAS |
|
Originalnachricht |
Name : cas-client Product : Fedora 20 Version : 3.3.3 Release : 1.fc20 URL : http://www.jasig.org/cas Summary : Jasig CAS Client for Java Description : Jasig CAS Client for Java is the integration point for applications that want to speak with a CAS server, either via the CAS 1.0 or CAS 2.0 protocol.
------------------------------------------------------------------------------- - Update Information:
- update to 3.3.3
- fix CVE-2014-4172 (rhbz#1131371) ------------------------------------------------------------------------------- - ChangeLog:
* Tue Aug 19 2014 gil cattaneo <puntogil@libero.it> 3.3.3-1 - update to 3.3.3 - fix CVE-2014-4172 (rhbz#1131371) ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1131350 - CVE-2014-4172 cas-client: Bypass of security constraints via URL parameter injection https://bugzilla.redhat.com/show_bug.cgi?id=1131350 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update cas-client' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|