Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in Bugzilla
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in Bugzilla
ID: FEDORA-2015-1699
Distribution: Fedora
Plattformen: Fedora 20
Datum: So, 15. Februar 2015, 11:30
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8630
Applikationen: Bugzilla

Originalnachricht

Name        : bugzilla
Product : Fedora 20
Version : 4.2.13
Release : 1.fc20
URL : http://www.bugzilla.org/
Summary : Bug tracking system
Description :
Bugzilla is a popular bug tracking system used by multiple open source projects
It requires a database engine installed - either MySQL, PostgreSQL or Oracle.
Without one of these database engines (local or remote), Bugzilla will not work
- see the Release Notes for details.

-------------------------------------------------------------------------------
-
Update Information:

This is a security update for Bugzilla which fixes two issues:

* A user with editcomponents permissions could possibly inject system
commands in product names and possibly other attributes.
* Methods from imported modules could possibly be executed using
the WebService API.

The first issue is tracked as CVE-2014-8630.
See https://www.bugzilla.org/security/4.0.15/ for all the details.
-------------------------------------------------------------------------------
-
ChangeLog:

* Sat Jan 31 2015 Emmanuel Seyman <emmanuel@seyman.fr> - 4.4.8-1
- Update to 4.2.13 (fixes regressions in 4.2.12 which itself
fixed security flaws) (CVE-2014-1571, CVE-2014-8630)
- Remove bundled binary files (#1000245)
- Add webdot directory perms to apache configuration
* Wed Oct 8 2014 Emmanuel Seyman <emmanuel@seyman.fr> - 4.2.11-1
- Update to 4.2.11 (CVE-2014-157, CVE-2014-1573 and CVE-2014-1571)
* Fri Jul 25 2014 Emmanuel Seyman <emmanuel@seyman.fr> - 4.2.10-1
- Update to 4.2.10 which fixes a security bug (CVE-2014-1546)
* Sat Apr 19 2014 Emmanuel Seyman <emmanuel@seyman.fr> - 4.2.9-1
- Update to 4.2.9 (regression fix for 4.2.8 which was a security update)
- Drop backported patches
* Sun Jan 19 2014 Emmanuel Seyman <emmanuel@seyman.fr> - 4.2.7-3
- Fix the comparison of module versions (#1044854)
- Really honor the PROJECT environment variable (#911943)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1185483 - CVE-2014-8630 Bugzilla: Command Injection into product
names and other attributes
https://bugzilla.redhat.com/show_bug.cgi?id=1185483
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update bugzilla' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung