Frugalware Security Announcements (FSAs)

This is a list of security announcments that have been released for the current stable version of Frugalware

bash

Author: kikadf Vulnerable: 4.2_045-5arcturus1 Unaffected: 4.2_045-5arcturus2 Tavis Ormandy discovered that the patch applied to fix CVE-2014-6271 for bash, the GNU Bourne-Again Shell, was incomplete and could still allow some characters to be injected into another environment (CVE-2014-7169). With this update prefix and suffix for environment variable names which contain shell functions are added as hardening measure. CVEs: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169

bash

Author: kikadf Vulnerable: 4.2_045-4 Unaffected: 4.2_045-5arcturus1 Stephane Chazelas discovered a vulnerability in bash, the GNU Bourne-Again Shell, related to how environment variables are processed. In many common configurations, this vulnerability is exploitable over the network, especially if bash has been configured as the system shell. CVEs: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271

krfb

Author: kikadf Vulnerable: 4.11.1-1 Unaffected: 4.11.1-2arcturus1 Several remotely exploitable security issues have been uncovered in libvncserver, some of which might allow a remote authenticated user code execution or application crashes. CVEs: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055

libvncserver

Author: kikadf Vulnerable: 0.9.8.1-1 Unaffected: 0.9.8.1-2arcturus1 Several remotely exploitable security issues have been uncovered in libvncserver, some of which might allow a remote authenticated user code execution or application crashes. CVEs: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055

mantis

Author: kikadf Vulnerable: 1.2.8-1 Unaffected: 1.2.8-2arcturus1 Multiple SQL injection vulnerabilities have been discovered in the Mantis bug tracking system. CVEs: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1608 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1609

nginx

Author: kikadf Vulnerable: 1.4.1-1 Unaffected: 1.4.1-2arcturus1 Ivan Fratric of the Google Security Team discovered a bug in nginx, a web server, which might allow an attacker to bypass security restrictions by using a specially crafted request. Antoine Delignat-Lavaud and Karthikeyan Bhargavan discovered that it was possible to reuse cached SSL sessions in unrelated contexts, allowing virtual host confusion attacks in some configurations by an attacker in a privileged network position.

dbus

Author: kikadf Vulnerable: 1.6.8-10arcturus1 Unaffected: 1.6.8-10arcturus2 On 64-bit platforms, file descriptor passing could be abused by local users to cause heap corruption in dbus-daemon, leading to a crash, or potentially to arbitrary code execution. A denial-of-service vulnerability in dbus-daemon allowed local attackers to prevent new connections to dbus-daemon, or disconnect existing clients, by exhausting descriptor limits. Malicious local users could create D-Bus connections to dbus-daemon which could not be terminated by killing the participating processes, resulting in a denial-of-service vulnerability.

curl

Author: kikadf Vulnerable: 7.26.0-2arcturus3 Unaffected: 7.26.0-2arcturus4 By not detecting and rejecting domain names for partial literal IP addresses properly when parsing received HTTP cookies, libcurl can be fooled to both sending cookies to wrong sites and into allowing arbitrary sites to set cookies for others. libcurl wrongly allows cookies to be set for Top Level Domains (TLDs), thus making them apply broader than cookies are allowed. CVEs: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3620

python-oauth2

Author: kikadf Vulnerable: 1.5.211-3 Unaffected: 1.5.211-4arcturus1 It was found that _check_signature() in python-oauth2, an application for authorization flows for web application, ignored the nonce values when validating signed urls. It was found that in python-oauth2, an application for authorizing flows for web application, the nonce value generated isn’t random enough, because while doing bulk operations, nonce might get repeated, so there is a chance of predictability. CVEs: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4346 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4347

squid

Author: kikadf Vulnerable: 3.1.19-2arcturus1 Unaffected: 3.1.19-2arcturus2 Sebastian Krahmer discovered an off-by-one error, leading to a heap-based buffer overflow flaw, in the way Squid handled UDP SNMP requests. CVEs: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6270