drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in jffi
Name: |
Mehrere Probleme in jffi |
|
ID: |
FEDORA-2015-5430 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 22 |
|
Datum: |
Di, 21. April 2015, 23:44 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1808
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1811
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1812
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1813
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1814 |
|
Applikationen: |
jffi |
|
Originalnachricht |
Name : jffi Product : Fedora 22 Version : 1.2.7 Release : 5.fc22 URL : http://github.com/jnr/jffi Summary : Java Foreign Function Interface Description : An optimized Java interface to libffi.
------------------------------------------------------------------------------- - Update Information:
Security fix for CVE-2015-1806, CVE-2015-1807, CVE-2015-1813, CVE-2015-1812, CVE-2015-1810, CVE-2015-1808, CVE-2015-1809, CVE-2015-1814, CVE-2015-1811 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1205615 - CVE-2015-1812 CVE-2015-1813 jenkins: Reflective XSS vulnerability (SECURITY-171, SECURITY-177) https://bugzilla.redhat.com/show_bug.cgi?id=1205615 [ 2 ] Bug #1205620 - CVE-2015-1806 jenkins: Combination filter Groovy script unsecured (SECURITY-125) https://bugzilla.redhat.com/show_bug.cgi?id=1205620 [ 3 ] Bug #1205623 - CVE-2015-1808 jenkins: update center metadata retrieval DoS attack (SECURITY-163) https://bugzilla.redhat.com/show_bug.cgi?id=1205623 [ 4 ] Bug #1205627 - CVE-2015-1810 jenkins: HudsonPrivateSecurityRealm allows creation of reserved names (SECURITY-166) https://bugzilla.redhat.com/show_bug.cgi?id=1205627 [ 5 ] Bug #1205616 - CVE-2015-1814 jenkins: forced API token change (SECURITY-180) https://bugzilla.redhat.com/show_bug.cgi?id=1205616 [ 6 ] Bug #1205622 - CVE-2015-1807 jenkins: directory traversal from artifacts via symlink (SECURITY-162) https://bugzilla.redhat.com/show_bug.cgi?id=1205622 [ 7 ] Bug #1205625 - CVE-2015-1809 jenkins: external entity injection via XPath (SECURITY-165) https://bugzilla.redhat.com/show_bug.cgi?id=1205625 [ 8 ] Bug #1205632 - CVE-2015-1811 jenkins: External entity processing in XML can reveal sensitive local files (SECURITY-167) https://bugzilla.redhat.com/show_bug.cgi?id=1205632 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update jffi' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|