Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in jffi
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in jffi
ID: FEDORA-2015-5430
Distribution: Fedora
Plattformen: Fedora 22
Datum: Di, 21. April 2015, 23:44
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1808
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1811
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1812
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1813
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1814
Applikationen: jffi

Originalnachricht

Name        : jffi
Product : Fedora 22
Version : 1.2.7
Release : 5.fc22
URL : http://github.com/jnr/jffi
Summary : Java Foreign Function Interface
Description :
An optimized Java interface to libffi.

-------------------------------------------------------------------------------
-
Update Information:

Security fix for CVE-2015-1806, CVE-2015-1807, CVE-2015-1813, CVE-2015-1812,
CVE-2015-1810, CVE-2015-1808, CVE-2015-1809, CVE-2015-1814, CVE-2015-1811
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1205615 - CVE-2015-1812 CVE-2015-1813 jenkins: Reflective XSS
vulnerability (SECURITY-171, SECURITY-177)
https://bugzilla.redhat.com/show_bug.cgi?id=1205615
[ 2 ] Bug #1205620 - CVE-2015-1806 jenkins: Combination filter Groovy script
unsecured (SECURITY-125)
https://bugzilla.redhat.com/show_bug.cgi?id=1205620
[ 3 ] Bug #1205623 - CVE-2015-1808 jenkins: update center metadata retrieval
DoS attack (SECURITY-163)
https://bugzilla.redhat.com/show_bug.cgi?id=1205623
[ 4 ] Bug #1205627 - CVE-2015-1810 jenkins: HudsonPrivateSecurityRealm allows
creation of reserved names (SECURITY-166)
https://bugzilla.redhat.com/show_bug.cgi?id=1205627
[ 5 ] Bug #1205616 - CVE-2015-1814 jenkins: forced API token change
(SECURITY-180)
https://bugzilla.redhat.com/show_bug.cgi?id=1205616
[ 6 ] Bug #1205622 - CVE-2015-1807 jenkins: directory traversal from
artifacts via symlink (SECURITY-162)
https://bugzilla.redhat.com/show_bug.cgi?id=1205622
[ 7 ] Bug #1205625 - CVE-2015-1809 jenkins: external entity injection via
XPath (SECURITY-165)
https://bugzilla.redhat.com/show_bug.cgi?id=1205625
[ 8 ] Bug #1205632 - CVE-2015-1811 jenkins: External entity processing in XML
can reveal sensitive local files (SECURITY-167)
https://bugzilla.redhat.com/show_bug.cgi?id=1205632
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update jffi' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung