[Bug 219941] New: Tor < 0.1.1.26 has security problem
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=219941
Summary: Tor < 0.1.1.26 has security problem
Product: Fedora Extras
Version: fc6
Platform: All
URL: http://archives.seul.org/or/announce/Dec-
2006/msg00000.html
OS/Version: Linux
Status: NEW
Severity: urgent
Priority: urgent
Component: tor
AssignedTo: enrico.scholz(a)informatik.tu-chemnitz.de
ReportedBy: roozbeh(a)farsiweb.info
QAContact: extras-qa(a)fedoraproject.org
CC: extras-qa(a)fedoraproject.org,fedora-security-
list(a)redhat.com
Description of problem:
Tor 0.1.1.26 fixes a serious privacy bug for people who use the
HttpProxyAuthenticator config option: Tor would send your proxy auth
directly to the directory server when you're tunnelling directory
requests through Tor. Specifically, this happens when publishing or
accessing hidden services, or when you have set FascistFirewall or
ReachableAddresses and you're accessing a directory server that's not
reachable directly.
Version-Release number of selected component (if applicable):
tor-0.1.1.25-1.fc6
--
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
16 years, 12 months
[Bug 210825] New: RSA signature forgery issues in BouncyCastle < 1.34
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210825
Summary: RSA signature forgery issues in BouncyCastle < 1.34
Product: Fedora Core
Version: fc5
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: normal
Component: java-1.4.2-gcj-compat
AssignedTo: fitzsim(a)redhat.com
ReportedBy: ville.skytta(a)iki.fi
CC: fedora-security-list(a)redhat.com
>From BouncyCastle 1.34 release notes:
Security Advisory If you are using RSA with a public exponent of three you
must upgrade to this release if you want to avoid recent forgery attacks that
have been described against specific implementations of the RSA signature
algorithm.
java-1.4.2-gcj-compat in FC5 ship with BC 1.31 and may thus be affected.
--
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
17 years
[Bug 213983] Plone Needs an Important Security Patch for CVE-2006-4249
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
Summary: Plone Needs an Important Security Patch for CVE-2006-4249
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=213983
ville.skytta(a)iki.fi changed:
What |Removed |Added
----------------------------------------------------------------------------
Summary|Plone Needs an Important |Plone Needs an Important
|Security Patch |Security Patch for CVE-2006-
| |4249
Keywords| |Security
CC| |fedora-security-
| |list(a)redhat.com
------- Additional Comments From ville.skytta(a)iki.fi 2006-12-08 14:10 EST -------
For the record, this is CVE-2006-4249
--
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
17 years
[Bug 218824] New: CVE-2006-6301: denyhosts 2.5 hosts.deny DoS
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218824
Summary: CVE-2006-6301: denyhosts 2.5 hosts.deny DoS
Product: Fedora Extras
Version: fc6
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: normal
Component: denyhosts
AssignedTo: tibbs(a)math.uh.edu
ReportedBy: ville.skytta(a)iki.fi
QAContact: extras-qa(a)fedoraproject.org
CC: extras-qa(a)fedoraproject.org,fedora-security-
list(a)redhat.com
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-6301
"DenyHosts 2.5 does not properly parse sshd logs file, which allows remote
attackers to add arbitrary hosts to the /etc/hosts.deny file and cause a denial
of service by adding arbitrary IP addresses to the sshd log file, as
demonstrated by loggig in to ssh using a login name containing certain strings
with an IP address, which is not properly handled by a regular expression."
Based on version numbers, affects FE-3+ and EPEL-4+
--
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
17 years
[Bug 218030] koffice: update to 1.6.1
by Red Hat Bugzilla
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
Summary: koffice: update to 1.6.1
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218030
rdieter(a)math.unl.edu changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |CLOSED
Resolution| |NEXTRELEASE
------- Additional Comments From rdieter(a)math.unl.edu 2006-12-06 10:18 EST -------
koffice-1.6.1-1.fc4 build queue'd (job id 23038)
--
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
17 years