lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20180622200114.GA21508@pisco.westfalen.local>
Date: Fri, 22 Jun 2018 22:01:14 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4234-1] lava-server security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4234-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
June 22, 2018                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : lava-server
CVE ID         : CVE-2018-12564 CVE-2018-12565

Two vulnerabilities were discovered in LAVA, a continuous integration
system for deploying operating systems for running tests, which could
result in information disclosure of files readable by the lavaserver
system user or the execution of arbitrary code via a XMLRPC call.

For the stable distribution (stretch), these problems have been fixed in
version 2016.12-3.

We recommend that you upgrade your lava-server packages.

For the detailed security status of lava-server please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/lava-server

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=67tj
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ