Fedora 22 updates-testing report

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The following Fedora 22 Security updates need testing:
 Age  URL
 430  https://bodhi.fedoraproject.org/updates/FEDORA-2015-5878   echoping-6.1-0.beta.r434svn.1.fc22
 379  https://bodhi.fedoraproject.org/updates/FEDORA-2015-9185   ceph-deploy-1.5.25-1.fc22
 312  https://bodhi.fedoraproject.org/updates/FEDORA-2015-12781   python-kdcproxy-0.3.2-1.fc22
 266  https://bodhi.fedoraproject.org/updates/FEDORA-2015-16239   nagios-4.0.8-1.fc22
 254  https://bodhi.fedoraproject.org/updates/FEDORA-2015-2d37e7dacf   openstack-swift-2.2.0-6.fc22
 224  https://bodhi.fedoraproject.org/updates/FEDORA-2015-9039c25f1d   miniupnpc-1.9-6.fc22
 206  https://bodhi.fedoraproject.org/updates/FEDORA-2015-7dfbe09bb4   libpng-1.6.16-4.fc22
 206  https://bodhi.fedoraproject.org/updates/FEDORA-2015-6c07ab1fa6   libpng-1.6.16-5.fc22
 173  https://bodhi.fedoraproject.org/updates/FEDORA-2015-b9e4c97ff1   sos-3.2-2.fc22
 147  https://bodhi.fedoraproject.org/updates/FEDORA-2015-f683150aa0   thttpd-2.25b-37.fc22
 123  https://bodhi.fedoraproject.org/updates/FEDORA-2016-560802e52b   xdelta-3.0.7-7.fc22
 112  https://bodhi.fedoraproject.org/updates/FEDORA-2016-24d134e494   mingw-nsis-2.50-1.fc22
  99  https://bodhi.fedoraproject.org/updates/FEDORA-2016-3cbe9ad765   python-pygments-2.1.3-1.fc22
  60  https://bodhi.fedoraproject.org/updates/FEDORA-2016-a028331ebc   poppler-0.30.0-4.fc22
  31  https://bodhi.fedoraproject.org/updates/FEDORA-2016-73a5867050   squid-3.5.10-4.fc22
  17  https://bodhi.fedoraproject.org/updates/FEDORA-2016-f5107c318e   webkitgtk4-2.12.3-1.fc22
  11  https://bodhi.fedoraproject.org/updates/FEDORA-2016-363d307082   gd-2.1.1-4.fc22
  11  https://bodhi.fedoraproject.org/updates/FEDORA-2016-40ccaff4d1   GraphicsMagick-1.3.24-1.fc22
  10  https://bodhi.fedoraproject.org/updates/FEDORA-2016-fe9112a9ff   sudo-1.8.15-2.fc22
   9  https://bodhi.fedoraproject.org/updates/FEDORA-2016-c3bd6a3496   ntp-4.2.6p5-41.fc22
   2  https://bodhi.fedoraproject.org/updates/FEDORA-2016-45402a6f3b   iperf3-3.1.3-1.fc22
   2  https://bodhi.fedoraproject.org/updates/FEDORA-2016-3daf782dfa   kernel-4.4.13-200.fc22
   0  https://bodhi.fedoraproject.org/updates/FEDORA-2016-3b49c9aa49   nfdump-1.6.15-1.fc22
   0  https://bodhi.fedoraproject.org/updates/FEDORA-2016-03c0ed3127   php-zendframework-zendxml-1.0.2-2.fc22 php-ZendFramework2-2.4.10-1.fc22


The following Fedora 22 Critical Path updates have yet to be approved:
 Age URL
 305  https://bodhi.fedoraproject.org/updates/FEDORA-2015-13210   yum-3.4.3-508.fc22
 224  https://bodhi.fedoraproject.org/updates/FEDORA-2015-2123de044f   libgphoto2-2.5.8-1.fc22
 206  https://bodhi.fedoraproject.org/updates/FEDORA-2015-6c07ab1fa6   libpng-1.6.16-5.fc22
 206  https://bodhi.fedoraproject.org/updates/FEDORA-2015-7dfbe09bb4   libpng-1.6.16-4.fc22
  60  https://bodhi.fedoraproject.org/updates/FEDORA-2016-a028331ebc   poppler-0.30.0-4.fc22
  57  https://bodhi.fedoraproject.org/updates/FEDORA-2016-027faabac4   libreport-2.6.4-2.fc22 abrt-2.6.1-11.fc22
  55  https://bodhi.fedoraproject.org/updates/FEDORA-2016-af1f30412b   pygtk2-2.24.0-14.fc22
  51  https://bodhi.fedoraproject.org/updates/FEDORA-2016-41df7ccbc8   lldpad-1.0.1-4.git036e314.fc22
  11  https://bodhi.fedoraproject.org/updates/FEDORA-2016-363d307082   gd-2.1.1-4.fc22
  10  https://bodhi.fedoraproject.org/updates/FEDORA-2016-fe9112a9ff   sudo-1.8.15-2.fc22
   7  https://bodhi.fedoraproject.org/updates/FEDORA-2016-2cdb5d5a7c   vim-7.4.1868-1.fc22
   4  https://bodhi.fedoraproject.org/updates/FEDORA-2016-409af1ecfd   lua-5.3.3-1.fc22
   2  https://bodhi.fedoraproject.org/updates/FEDORA-2016-22cdb97bb4   thunderbird-45.1.1-1.fc22
   2  https://bodhi.fedoraproject.org/updates/FEDORA-2016-f4a2bc1983   mdadm-3.3.4-3.fc22
   2  https://bodhi.fedoraproject.org/updates/FEDORA-2016-3daf782dfa   kernel-4.4.13-200.fc22
   0  https://bodhi.fedoraproject.org/updates/FEDORA-2016-26df5bf249   nss-util-3.24.0-1.0.fc22 nss-softokn-3.24.0-1.0.fc22 nss-3.24.0-1.0.fc22


The following builds have been pushed to Fedora 22 updates-testing

    fuse-emulator-1.2.0-2.fc22
    fuse-emulator-utils-1.2.0-3.fc22
    glibc-arm-linux-gnu-2.23-4.fc22
    libspectrum-1.2.0-2.fc22
    lilypond-2.19.43-1.fc22
    lilypond-doc-2.19.43-1.fc22
    nfdump-1.6.15-1.fc22
    nss-3.24.0-1.2.fc22
    nss-softokn-3.24.0-1.0.fc22
    nss-util-3.24.0-1.0.fc22
    php-ZendFramework2-2.4.10-1.fc22
    php-libvirt-0.5.2-1.fc22
    php-zendframework-zendxml-1.0.2-2.fc22

Details about builds:


================================================================================
 fuse-emulator-1.2.0-2.fc22 (FEDORA-2016-519e1fbbf9)
 The Free UNIX Spectrum Emulator
--------------------------------------------------------------------------------
Update Information:

Update to latest upstream. Use correct libspectrum version.  ----  Updated to
latest upstream.  ----  Update to the latest upstream.
--------------------------------------------------------------------------------


================================================================================
 fuse-emulator-utils-1.2.0-3.fc22 (FEDORA-2016-519e1fbbf9)
 Additional utils for the Fuse spectrum emulator
--------------------------------------------------------------------------------
Update Information:

Update to latest upstream. Use correct libspectrum version.  ----  Updated to
latest upstream.  ----  Update to the latest upstream.
--------------------------------------------------------------------------------


================================================================================
 glibc-arm-linux-gnu-2.23-4.fc22 (FEDORA-2016-19fabfc432)
 Cross Compiled GNU C Library targeted at arm-linux-gnu
--------------------------------------------------------------------------------
Update Information:

New package.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1312963 - Review Request: glibc-arm-linux-gnu - Cross Compiled GNU C Library targeted at arm-linux-gnu
        https://bugzilla.redhat.com/show_bug.cgi?id=1312963
--------------------------------------------------------------------------------


================================================================================
 libspectrum-1.2.0-2.fc22 (FEDORA-2016-519e1fbbf9)
 A library for reading spectrum emulator file formats
--------------------------------------------------------------------------------
Update Information:

Update to latest upstream. Use correct libspectrum version.  ----  Updated to
latest upstream.  ----  Update to the latest upstream.
--------------------------------------------------------------------------------


================================================================================
 lilypond-2.19.43-1.fc22 (FEDORA-2016-f52724ba1f)
 A typesetting system for music notation
--------------------------------------------------------------------------------
Update Information:

2.19.43
--------------------------------------------------------------------------------


================================================================================
 lilypond-doc-2.19.43-1.fc22 (FEDORA-2016-f52724ba1f)
 HTML documentation for LilyPond
--------------------------------------------------------------------------------
Update Information:

2.19.43
--------------------------------------------------------------------------------


================================================================================
 nfdump-1.6.15-1.fc22 (FEDORA-2016-3b49c9aa49)
 NetFlow collecting and processing tools
--------------------------------------------------------------------------------
Update Information:

nfdump 1.6.15 released.  ---  - Fix Security issue http://www.security-assessmen
t.com/files/documents/advisory/Nfdump%20nfcapd%201.6.14%20-%20Multiple%20Vulnera
bilities.pdf - Fix obyte, opps and obps output records - Fix wrong bps type case
in cvs output. Fix opbs ipbs typos  nfdump 1.6.14 released.  ---  - Create
libnfdump for dynamic linking - Add -R to ModifyCompression - Add std sampler ID
4 Bytes and allow random sampler (tag 50) - Add BZ2 compression along existing
LZ0 - Add direct write to flowtools converter ft2nfdump - Fix CentOS compile
issues with flow-tools converter - Fix FreeBSD,OpenBSD build problems - Fix
timestamp overflow in sflow.c - Fix IP Fragmentation in sflow collector - Fix
compile errors on other platforms - Fix zero alignment bug, if only half of an
extension is sent - Fix nfanon time window bug in subsequent files in -R list -
Fix CommonRecordV0Type conversion bug - Fix nfexport bug, if only one single map
exists
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1335204 - nfdump: multiple remote denial of service vulnerabilities
        https://bugzilla.redhat.com/show_bug.cgi?id=1335204
--------------------------------------------------------------------------------


================================================================================
 nss-3.24.0-1.2.fc22 (FEDORA-2016-26df5bf249)
 Network Security Services
--------------------------------------------------------------------------------
Update Information:

Updates the nss family of packages to upstream NSS 3.24.  For details about new
functionality and a list of bugs fixed in this release please see the upstream
releases notes  https://developer.mozilla.org/en-
US/docs/Mozilla/Projects/NSS/NSS_3.24_release_notes
--------------------------------------------------------------------------------


================================================================================
 nss-softokn-3.24.0-1.0.fc22 (FEDORA-2016-26df5bf249)
 Network Security Services Softoken Module
--------------------------------------------------------------------------------
Update Information:

Updates the nss family of packages to upstream NSS 3.24.  For details about new
functionality and a list of bugs fixed in this release please see the upstream
releases notes  https://developer.mozilla.org/en-
US/docs/Mozilla/Projects/NSS/NSS_3.24_release_notes
--------------------------------------------------------------------------------


================================================================================
 nss-util-3.24.0-1.0.fc22 (FEDORA-2016-26df5bf249)
 Network Security Services Utilities Library
--------------------------------------------------------------------------------
Update Information:

Updates the nss family of packages to upstream NSS 3.24.  For details about new
functionality and a list of bugs fixed in this release please see the upstream
releases notes  https://developer.mozilla.org/en-
US/docs/Mozilla/Projects/NSS/NSS_3.24_release_notes
--------------------------------------------------------------------------------


================================================================================
 php-ZendFramework2-2.4.10-1.fc22 (FEDORA-2016-03c0ed3127)
 Zend Framework 2
--------------------------------------------------------------------------------
Update Information:

## 2.4.10 (2016-05-09)  - Fix HeaderValue throwing an exception on legal
characters  ## 2.4.9 (2015-11-23)  ### SECURITY UPDATES  - **ZF2015-09**:
`Zend\Captcha\Word` generates a "word" for a CAPTCHA challenge   by selecting a
sequence of random letters from a character set. Prior to this   vulnerability
announcement, the selection was performed using PHP's internal   `array_rand()`
function. This function does not generate sufficient entropy   due to its usage
of `rand()` instead of more cryptographically secure methods   such as
`openssl_pseudo_random_bytes()`. This could potentially lead to   information
disclosure should an attacker be able to brute force the random   number
generation. This release contains a patch that replaces the   `array_rand()`
calls to use `Zend\Math\Rand::getInteger()`, which provides   better RNG. -
**ZF2015-10**: `Zend\Crypt\PublicKey\Rsa\PublicKey` has a call to
`openssl_public_encrypt()`   which used PHP's default `$padding` argument, which
specifies   `OPENSSL_PKCS1_PADDING`, indicating usage of PKCS1v1.5 padding. This
padding   has a known vulnerability, the   [Bleichenbacher's chosen-ciphertext
attack](http://crypto.stackexchange.com/questions/12688/can-you-explain-
bleichenbachers-cca-attack-on-pkcs1-v1-5),   which can be used to recover an RSA
private key. This release contains a patch   that changes the padding argument
to use `OPENSSL_PKCS1_OAEP_PADDING`.    Users upgrading to this version may have
issues decrypting previously stored   values, due to the change in padding. If
this occurs, you can pass the   constant `OPENSSL_PKCS1_PADDING` to a new
`$padding` argument in   `Zend\Crypt\PublicKey\Rsa::encrypt()` and `decrypt()`
(though typically this   should only apply to the latter):    ```php
$decrypted = $rsa->decrypt($data, $key, $mode, OPENSSL_PKCS1_PADDING);   ```
where `$rsa` is an instance of `Zend\Crypt\PublicKey\Rsa`.    (The `$key` and
`$mode` argument defaults are `null` and
`Zend\Crypt\PublicKey\Rsa::MODE_AUTO`, if you were not using them previously.)
We recommend re-encrypting any such values using the new defaults.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1343990 - [epel7][security] php-ZendFramework2-2.4.10 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=1343990
  [ 2 ] Bug #1289318 - CVE-2015-7503 php-ZendFramework2: Usage of vulnerable PKCS#1 v1.5 padding allows to recover RSA private key [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1289318
  [ 3 ] Bug #1343995 - [f23][f22][security] php-ZendFramework2-2.4.10 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=1343995
  [ 4 ] Bug #1289317 - CVE-2015-7503 php-ZendFramework2: Usage of vulnerable PKCS#1 v1.5 padding allows to recover RSA private key [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1289317
--------------------------------------------------------------------------------


================================================================================
 php-libvirt-0.5.2-1.fc22 (FEDORA-2016-466d863873)
 PHP language bindings for Libvirt
--------------------------------------------------------------------------------
Update Information:

Upgrade to 0.5.2 to support newer libvirt capabilities
--------------------------------------------------------------------------------


================================================================================
 php-zendframework-zendxml-1.0.2-2.fc22 (FEDORA-2016-03c0ed3127)
 Zend Framework ZendXml component
--------------------------------------------------------------------------------
Update Information:

## 2.4.10 (2016-05-09)  - Fix HeaderValue throwing an exception on legal
characters  ## 2.4.9 (2015-11-23)  ### SECURITY UPDATES  - **ZF2015-09**:
`Zend\Captcha\Word` generates a "word" for a CAPTCHA challenge   by selecting a
sequence of random letters from a character set. Prior to this   vulnerability
announcement, the selection was performed using PHP's internal   `array_rand()`
function. This function does not generate sufficient entropy   due to its usage
of `rand()` instead of more cryptographically secure methods   such as
`openssl_pseudo_random_bytes()`. This could potentially lead to   information
disclosure should an attacker be able to brute force the random   number
generation. This release contains a patch that replaces the   `array_rand()`
calls to use `Zend\Math\Rand::getInteger()`, which provides   better RNG. -
**ZF2015-10**: `Zend\Crypt\PublicKey\Rsa\PublicKey` has a call to
`openssl_public_encrypt()`   which used PHP's default `$padding` argument, which
specifies   `OPENSSL_PKCS1_PADDING`, indicating usage of PKCS1v1.5 padding. This
padding   has a known vulnerability, the   [Bleichenbacher's chosen-ciphertext
attack](http://crypto.stackexchange.com/questions/12688/can-you-explain-
bleichenbachers-cca-attack-on-pkcs1-v1-5),   which can be used to recover an RSA
private key. This release contains a patch   that changes the padding argument
to use `OPENSSL_PKCS1_OAEP_PADDING`.    Users upgrading to this version may have
issues decrypting previously stored   values, due to the change in padding. If
this occurs, you can pass the   constant `OPENSSL_PKCS1_PADDING` to a new
`$padding` argument in   `Zend\Crypt\PublicKey\Rsa::encrypt()` and `decrypt()`
(though typically this   should only apply to the latter):    ```php
$decrypted = $rsa->decrypt($data, $key, $mode, OPENSSL_PKCS1_PADDING);   ```
where `$rsa` is an instance of `Zend\Crypt\PublicKey\Rsa`.    (The `$key` and
`$mode` argument defaults are `null` and
`Zend\Crypt\PublicKey\Rsa::MODE_AUTO`, if you were not using them previously.)
We recommend re-encrypting any such values using the new defaults.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1343990 - [epel7][security] php-ZendFramework2-2.4.10 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=1343990
  [ 2 ] Bug #1289318 - CVE-2015-7503 php-ZendFramework2: Usage of vulnerable PKCS#1 v1.5 padding allows to recover RSA private key [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1289318
  [ 3 ] Bug #1343995 - [f23][f22][security] php-ZendFramework2-2.4.10 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=1343995
  [ 4 ] Bug #1289317 - CVE-2015-7503 php-ZendFramework2: Usage of vulnerable PKCS#1 v1.5 padding allows to recover RSA private key [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1289317
--------------------------------------------------------------------------------
--
test mailing list
test@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe:
https://lists.fedoraproject.org/admin/lists/test@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora Desktop]     [Fedora SELinux]     [Photo Sharing]     [Yosemite Forum]     [KDE Users]

  Powered by Linux