Monday, November 5, 2018

[USN-3808-1] Ruby vulnerabilities

==========================================================================
Ubuntu Security Notice USN-3808-1
November 05, 2018

ruby1.9.1, ruby2.0, ruby2.3, ruby2.5 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Ruby.

Software Description:
- ruby2.5: Interpreter of object-oriented scripting language Ruby
- ruby2.3: Object-oriented scripting language
- ruby1.9.1: Object-oriented scripting language
- ruby2.0: Object-oriented scripting language

Details:

It was discovered that Ruby incorrectly handled certain X.509
certificates. An attacker could possibly use this issue to
bypass the certificate check. (CVE-2018-16395)

It was discovered that Ruby incorrectly handled certain
inputs. An attacker could possibly use this issue to execute
arbitrary code. (CVE-2018-16396)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
  libruby2.5                      2.5.1-5ubuntu4.1
  ruby2.5                         2.5.1-5ubuntu4.1

Ubuntu 18.04 LTS:
  libruby2.5                      2.5.1-1ubuntu1.1
  ruby2.5                         2.5.1-1ubuntu1.1

Ubuntu 16.04 LTS:
  libruby2.3                      2.3.1-2~16.04.11
  ruby2.3                         2.3.1-2~16.04.11

Ubuntu 14.04 LTS:
  libruby1.9.1                    1.9.3.484-2ubuntu1.13
  libruby2.0                      2.0.0.484-1ubuntu2.11
  ruby1.9.1                       1.9.3.484-2ubuntu1.13
  ruby1.9.3                       1.9.3.484-2ubuntu1.13
  ruby2.0                         2.0.0.484-1ubuntu2.11

In general, a standard system update will make all the necessary
changes.

References:
  https://usn.ubuntu.com/usn/usn-3808-1
  CVE-2018-16395, CVE-2018-16396

Package Information:
  https://launchpad.net/ubuntu/+source/ruby2.5/2.5.1-5ubuntu4.1
  https://launchpad.net/ubuntu/+source/ruby2.5/2.5.1-1ubuntu1.1
  https://launchpad.net/ubuntu/+source/ruby2.3/2.3.1-2~16.04.11
  https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.484-2ubuntu1.13
  https://launchpad.net/ubuntu/+source/ruby2.0/2.0.0.484-1ubuntu2.11

mass-removal of LANG=anything-not-C.UTF-8 in packages

Dear maintainers,

I'm working again on implementing
https://fedoraproject.org/wiki/Changes/Remove_glibc-langpacks-all_from_buildroot.
The first step is to replace LC_ALL=en_US.UTF-8 with LC_ALL=C.UTF-8
(and similarly for LANG=, LC_CTYPE=, etc.) in all spec files. This
will be backwards and forwards compatible, in the sense that packages
that use C.UTF-8 should build OK on older and newer Fedoras.

Once that's done, I'll file the PRs to actually replace glibc-langpacks-all
with glibc-minimal-langpacks in mock and koji.

I'll do a mass update to use C.UTF-8 for the packages in the list that
follows, next week. I'll do test builds locally, and I'll only push to
dist-git if the local builds succeed. Let me know if you want your
package to be excluded.

Zbyszek

Maintainers by package:
OpenTK orphan
apache-poi gil lef mbooth
ardour5 nphilipp tartina
bash-completion mrunge ooprala sheltren svashisht
borgbackup bpereto fschwarz
clover2 mtasaka
elixir codeblock fnux martinlanghoff puiterwijk s4504kr
fail2ban athimm atkac jgu orion
fantasdic mtasaka
felix-osgi-core jcapik mizdebsk
fmf psss
gfan jjames pcpa tremble
ghc petersen
git amahdal besser82 chrisw pcahyna pstodulk skisela tmz
hibernate3 gil lef
hive coolsvap moceap orphan pmackinn
hunspell-az caolanm
hunspell-fa caolanm
hunspell-ga caolanm
hunspell-gv caolanm
hunspell-ky caolanm
ibus-typing-booster anishpatil mfabian
ipython churchyard cstratak dcantrel ignatenkobrain lbalhar mrunge salimma tomspur
jblas zbyszek
kgb-bot averi
langtable mfabian
lazygal rathann
libmp4v2 amigadave moezroy rathann sergiomb thias
libraqm moceap
migemo mtasaka
# migemo is special, I'll just add BR:glibc-langpack-ja
mongodb hhorak jpacner maxamillion mskalick panovotn strobert tdawson
openqa adamwill
paraview deji orion sagitter
passenger jkaluza kanarip tdawson
php-horde-Horde-Imap-Client remi
php-horde-Horde-JavascriptMinify remi
php-horde-Horde-Util remi
php-kdyby-events orphan
php-kdyby-strict-objects orphan
php-latte orphan
php-nette-application orphan
php-nette-bootstrap orphan
php-nette-caching orphan
php-nette-component-model orphan
php-nette-database orphan
php-nette-deprecated orphan
php-nette-di orphan
php-nette-finder orphan
php-nette-forms orphan
php-nette-http orphan
php-nette-mail orphan
php-nette-neon orphan
php-nette-php-generator orphan
php-nette-reflection orphan
php-nette-robot-loader orphan
php-nette-safe-stream orphan
php-nette-security orphan
php-nette-tester orphan
php-nette-tokenizer orphan
php-nette-utils orphan
php-phpspec remi siwinski
php-tracy orphan
pyp2rpm bkabrda cstratak ishcherb kevin mcyprian rkuska
python-CommonMark jujens
python-acoustid terjeros
python-blessed abompard aviso
python-click cstratak fab mstuchli rkuska
python-deprecation jpena
python-django bkabrda churchyard jdornak mrunge salimma sgallagh
python-djangoql vkrizan
python-evic besser82
python-execnet ktdreyer thm
python-ipython_genutils orion
python-mapnik tomh
python-mtg tc01
python-musicbrainzngs amluto
python-pankoclient pkilambi
python-path laxathom
python-pexpect amcnabb fabiand ignatenkobrain radez tomspur
python-pypandoc orion zbyszek
python-pytest-pep8 cstratak orion
python-pythonz-bd mcyprian orphan
python-seesaw tc01
python-setproctitle hguemar stevetraylen
python-setuptools_git apevec
python-sphinx-autodoc-typehints tdecacqu
python-sphinx-intl jujens
python-spur orion
python-tables tnorth zbyszek
python-vcstools cottsay rmattes
python-webassets dcallagh kumarpraveen pjp sundaram
python-whitenoise piotrp
python2-django1.11 pviktori
python2-ipython lbalhar
rubygem-gettext mtasaka sseago
rubygem-http_parser.rb ilgrad spredzy
rubygem-nokogiri kanarip mtasaka tdawson tremble
rubygem-org-ruby vondruch
rubygem-ruby-openid orphan
udiskie jstanek
varnish ingvar luhliarik
xorg-x11-drv-intel ajax glisse

Packages by maintainer:
abompard python-blessed
adamwill openqa
ajax xorg-x11-drv-intel
amahdal git
amcnabb python-pexpect
amigadave libmp4v2
amluto python-musicbrainzngs
anishpatil ibus-typing-booster
apevec python-setuptools_git
athimm fail2ban
atkac fail2ban
averi kgb-bot
aviso python-blessed
besser82 git python-evic
bkabrda pyp2rpm python-django
bpereto borgbackup
caolanm hunspell-az hunspell-fa hunspell-ga hunspell-gv hunspell-ky
chrisw git
churchyard ipython python-django
codeblock elixir
coolsvap hive
cottsay python-vcstools
cstratak ipython pyp2rpm python-click python-pytest-pep8
dcallagh python-webassets
dcantrel ipython
deji paraview
fab python-click
fabiand python-pexpect
fnux elixir
fschwarz borgbackup
gil apache-poi hibernate3
glisse xorg-x11-drv-intel
hguemar python-setproctitle
hhorak mongodb
ignatenkobrain ipython python-pexpect
ilgrad rubygem-http_parser.rb
ingvar varnish
ishcherb pyp2rpm
jcapik felix-osgi-core
jdornak python-django
jgu fail2ban
jjames gfan
jkaluza passenger
jpacner mongodb
jpena python-deprecation
jstanek udiskie
jujens python-CommonMark python-sphinx-intl
kanarip passenger rubygem-nokogiri
kevin pyp2rpm
ktdreyer python-execnet
kumarpraveen python-webassets
laxathom python-path
lbalhar ipython python2-ipython
lef apache-poi hibernate3
luhliarik varnish
martinlanghoff elixir
maxamillion mongodb
mbooth apache-poi
mcyprian pyp2rpm python-pythonz-bd
mfabian ibus-typing-booster langtable
mizdebsk felix-osgi-core
moceap hive libraqm
moezroy libmp4v2
mrunge bash-completion ipython python-django
mskalick mongodb
mstuchli python-click
mtasaka clover2 fantasdic migemo rubygem-gettext rubygem-nokogiri
nphilipp ardour5
ooprala bash-completion
orion fail2ban paraview python-ipython_genutils python-pypandoc python-pytest-pep8 python-spur
orphan OpenTK hive php-kdyby-events php-kdyby-strict-objects php-latte php-nette-application php-nette-bootstrap php-nette-caching php-nette-component-model php-nette-database php-nette-deprecated php-nette-di php-nette-finder php-nette-forms php-nette-http php-nette-mail php-nette-neon php-nette-php-generator php-nette-reflection php-nette-robot-loader php-nette-safe-stream php-nette-security php-nette-tester php-nette-tokenizer php-nette-utils php-tracy python-pythonz-bd rubygem-ruby-openid
panovotn mongodb
pcahyna git
pcpa gfan
petersen ghc
piotrp python-whitenoise
pjp python-webassets
pkilambi python-pankoclient
pmackinn hive
psss fmf
pstodulk git
puiterwijk elixir
pviktori python2-django1.11
radez python-pexpect
rathann lazygal libmp4v2
remi php-horde-Horde-Imap-Client php-horde-Horde-JavascriptMinify php-horde-Horde-Util php-phpspec
rkuska pyp2rpm python-click
rmattes python-vcstools
s4504kr elixir
sagitter paraview
salimma ipython python-django
sergiomb libmp4v2
sgallagh python-django
sheltren bash-completion
siwinski php-phpspec
skisela git
spredzy rubygem-http_parser.rb
sseago rubygem-gettext
stevetraylen python-setproctitle
strobert mongodb
sundaram python-webassets
svashisht bash-completion
tartina ardour5
tc01 python-mtg python-seesaw
tdawson mongodb passenger rubygem-nokogiri
tdecacqu python-sphinx-autodoc-typehints
terjeros python-acoustid
thias libmp4v2
thm python-execnet
tmz git
tnorth python-tables
tomh python-mapnik
tomspur ipython python-pexpect
tremble gfan rubygem-nokogiri
vkrizan python-djangoql
vondruch rubygem-org-ruby
zbyszek jblas python-pypandoc python-tables
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org

[CentOS-announce] CESA-2018:3403 Important CentOS 6 thunderbird Security Update

CentOS Errata and Security Advisory 2018:3403 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2018:3403

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
8df523679c35149a2785c6056419e4087d991acf7a5415761d5353b5d7612840 thunderbird-60.2.1-5.el6.centos.i686.rpm

x86_64:
4ba750dbed745049285ca8c7345b4bc8366efd5bda230f8d09a1604e2544c2b3 thunderbird-60.2.1-5.el6.centos.x86_64.rpm

Source:
fa1c647433cdb857e464a18c595ad567662feb698ff9beb544e3e8b9bca32773 thunderbird-60.2.1-5.el6.centos.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2018:3454 CentOS 6 tzdata BugFix Update

CentOS Errata and Bugfix Advisory 2018:3454

Upstream details at : https://access.redhat.com/errata/RHBA-2018:3454

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
687d4198ba7ddcc02ab3e32b7a757e82474c862a77b6f877fe433aedb42f665d tzdata-2018g-1.el6.noarch.rpm
4673a5ff13fc83c51d537c997c7161affb1a94445798c2976d133309cbb70418 tzdata-java-2018g-1.el6.noarch.rpm

x86_64:
687d4198ba7ddcc02ab3e32b7a757e82474c862a77b6f877fe433aedb42f665d tzdata-2018g-1.el6.noarch.rpm
4673a5ff13fc83c51d537c997c7161affb1a94445798c2976d133309cbb70418 tzdata-java-2018g-1.el6.noarch.rpm

Source:
a38862e075a0669152f341ff55a6675b8f1476fdd876d51b408b10011e99f8e8 tzdata-2018g-1.el6.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2018:3406 Critical CentOS 6 python-paramiko Security Update

CentOS Errata and Security Advisory 2018:3406 Critical

Upstream details at : https://access.redhat.com/errata/RHSA-2018:3406

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
ba22dc027fdb5a2399c658d74ec55e6efe08225d65e9aaf3ff5837319c0a67eb python-paramiko-1.7.5-5.el6_10.noarch.rpm

x86_64:
ba22dc027fdb5a2399c658d74ec55e6efe08225d65e9aaf3ff5837319c0a67eb python-paramiko-1.7.5-5.el6_10.noarch.rpm

Source:
f0e20741d17d1c06461711205d12b0edf44e5011cf15c7173dcb305a4c49e46d python-paramiko-1.7.5-5.el6_10.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[USN-3806-1] systemd vulnerability

-----BEGIN PGP SIGNATURE-----
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=Laiz
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-3806-1
November 05, 2018

systemd vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

systemd-networkd could be made to crash or run programs if it received
specially crafted network traffic.

Software Description:
- systemd: system and service manager

Details:

Felix Wilhelm discovered that the systemd-networkd DHCPv6 client
incorrectly handled certain DHCPv6 messages. In configurations where
systemd-networkd is being used, an attacker on the same network could use
this issue to cause systemd-networkd to crash, resulting in a denial of
service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
systemd 239-7ubuntu10.1

Ubuntu 18.04 LTS:
systemd 237-3ubuntu10.4

Ubuntu 16.04 LTS:
systemd 229-4ubuntu21.6

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3806-1
CVE-2018-15688

Package Information:
https://launchpad.net/ubuntu/+source/systemd/239-7ubuntu10.1
https://launchpad.net/ubuntu/+source/systemd/237-3ubuntu10.4
https://launchpad.net/ubuntu/+source/systemd/229-4ubuntu21.6

[USN-3807-1] NetworkManager vulnerability

-----BEGIN PGP SIGNATURE-----
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=hlmU
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-3807-1
November 05, 2018

network-manager vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

NetworkManager could be made to crash or run programs if it received
specially crafted network traffic.

Software Description:
- network-manager: Network connection manager

Details:

Felix Wilhelm discovered that the NetworkManager internal DHCPv6 client
incorrectly handled certain DHCPv6 messages. In non-default configurations
where the internal DHCP client is enabled, an attacker on the same network
could use this issue to cause NetworkManager to crash, resulting in a
denial of service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
network-manager 1.12.4-1ubuntu1.1

Ubuntu 18.04 LTS:
network-manager 1.10.6-2ubuntu1.1

Ubuntu 16.04 LTS:
network-manager 1.2.6-0ubuntu0.16.04.3

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3807-1
CVE-2018-15688

Package Information:
https://launchpad.net/ubuntu/+source/network-manager/1.12.4-1ubuntu1.1
https://launchpad.net/ubuntu/+source/network-manager/1.10.6-2ubuntu1.1
https://launchpad.net/ubuntu/+source/network-manager/1.2.6-0ubuntu0.16.04.3

Friday, November 2, 2018

OpenBSD Errata: November 2nd, 2018 (syspatch)

Errata patches for syspatch have been released for OpenBSD 6.3 and 6.4.

The syspatch utility incorrectly handles symbolic links.

Binary updates for the amd64, i386, and arm64 platforms are available
via the syspatch utility. Source code patches can be found on the
respective errata pages:

https://www.openbsd.org/errata63.html
https://www.openbsd.org/errata64.html

[announce] Ensuring Perl's Viability on FreeBSD: A NYCBUG-NY.PM Collaboration, 2018-11-07 @ 18:30

All
Its time for another installment of NYC*BUG. Our next meeting is a
joint venture with New York Perl Mongers.

This months topic is "Ensuring Perl's Viability on FreeBSD: A
NYCBUG-NY.PM Collaboration, James E Keenan, Andrew Villano "

Jim and Andrew will cover their ongoing work to run the perl
smoketests on FreeBSD and as Jim put its ".. Although the talk is
focused on what we've been doing on FreeBSD, we'll
have some late-breaking news related to OpenBSD and NetBSD as well.

We hope to see you all there .

Suspenders, 108 Greenwich Street,
2nd Floor
https://goo.gl/maps/m22qh7Gv9kn

--
mark saad | nonesuch@longcount.org

_______________________________________________
announce mailing list
announce@lists.nycbug.org
http://lists.nycbug.org/mailman/listinfo/announce

Thursday, November 1, 2018

[USN-3805-2] curl vulnerability

==========================================================================
Ubuntu Security Notice USN-3805-2
November 01, 2018

curl vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in curl.

Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries

Details:

USN-3805-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

 Brian Carpenter discovered that the curl command-line tool incorrectly
 handled error messages. A remote attacker could possibly use this
 issue to obtain sensitive information. (CVE-2018-16842)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
  curl                            7.22.0-3ubuntu4.24
  libcurl3                        7.22.0-3ubuntu4.24
  libcurl3-gnutls                 7.22.0-3ubuntu4.24
  libcurl3-nss                    7.22.0-3ubuntu4.24

In general, a standard system update will make all the necessary
changes.

References:
  https://usn.ubuntu.com/usn/usn-3805-2
  https://usn.ubuntu.com/usn/usn-3805-1
  CVE-2018-16842

Say thanks during Fedora Appreciation Week (Nov. 5-11)

-----BEGIN PGP SIGNATURE-----
Comment: Using GnuPG with Thunderbird - https://www.enigmail.net/
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=j1Fa
-----END PGP SIGNATURE-----
This year, the first-ever Fedora Appreciation Week will run from Monday,
November 5th to Sunday, November 11th. Fedora Appreciation Week is an
annual event organized by the Fedora Community Operations (CommOps)
team. It's a week-long event to celebrate efforts of Fedora Project
contributors and to say "thank you" to each other.

This year, the Appreciation Week runs during the fifteenth anniversary
of the Fedora Project. The Fedora Project has changed in many ways since
2003, but not the importance of our contributor community. This is a
week to celebrate the friends, colleagues, and contributors who are part
of this fifteen-year open source saga. Learn more about the event here.

https://fedoramagazine.org/say-thanks-appreciation-week-2018/

--
Cheers,
Justin W. Flory
jflory7@gmail.com

lists.linuxfromscratch.org mailing list memberships reminder

This is a reminder, sent out once a month, about your
lists.linuxfromscratch.org mailing list memberships. It includes your
subscription info and how to use it to change it or unsubscribe from a
list.

You can visit the URLs to change your membership status or
configuration, including unsubscribing, setting digest-style delivery
or disabling delivery altogether (e.g., for a vacation), and so on.

In addition to the URL interfaces, you can also use email to make such
changes. For more info, send a message to the '-request' address of
the list (for example, mailman-request@lists.linuxfromscratch.org)
containing just the word 'help' in the message body, and an email
message will be sent to you with instructions.

If you have questions, problems, comments, etc, send them to
mailman-owner@lists.linuxfromscratch.org. Thanks!

Passwords for reallost1.fbsd2233449@blogger.com:

List Password // URL
---- --------
lfs-announce@lists.linuxfromscratch.org vaozebru
http://lists.linuxfromscratch.org/options/lfs-announce/reallost1.fbsd2233449%40blogger.com