[SECURITY] Fedora 21 Update: mantis-1.2.18-1.fc21
updates at fedoraproject.org
updates at fedoraproject.org
Sat Dec 20 08:51:48 UTC 2014
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2014-16609
2014-12-12 02:48:02
--------------------------------------------------------------------------------
Name : mantis
Product : Fedora 21
Version : 1.2.18
Release : 1.fc21
URL : http://www.mantisbt.org/
Summary : Web-based issue tracking system
Description :
Mantis is a free popular web-based issue tracking system.
It is written in the PHP scripting language and works with MySQL, MS SQL,
and PostgreSQL databases and a web server.
Almost any web browser should be able to function as a client.
Documentation can be found in: /usr/share/doc/mantis
When the package has finished installing, you will need to perform some
additional configuration steps; these are described in:
/usr/share/doc/mantis/README.Fedora
--------------------------------------------------------------------------------
Update Information:
Security fix for CVE-2014-9280, CVE-2014-9279, CVE-2014-6316, CVE-2014-9117, CVE-2014-9089
--------------------------------------------------------------------------------
ChangeLog:
* Tue Dec 9 2014 Gianluca Sforna <giallu at gmail.com> - 1.2.18-1
- new upstream release
- drop upstreamed patches
- fix several security issues, full list in upstream changelog:
http://www.mantisbt.org/bugs/changelog_page.php?version_id=191
* Fri Nov 14 2014 Gianluca Sforna <giallu at gmail.com> - 1.2.17-4
- fix CVE-2014-7146, CVE-2014-8598 (#1162046)
- fix CVE-2014-8554 (#1159295)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1171709 - CVE-2014-9280 mantis: PHP Object Injection in filter API
https://bugzilla.redhat.com/show_bug.cgi?id=1171709
[ 2 ] Bug #1171713 - CVE-2014-9279 mantis: database credentials disclosure in MantisBT's unattended upgrade script
https://bugzilla.redhat.com/show_bug.cgi?id=1171713
[ 3 ] Bug #1170542 - CVE-2014-6316 mantis: URL redirection issue
https://bugzilla.redhat.com/show_bug.cgi?id=1170542
[ 4 ] Bug #1170193 - CVE-2014-9272 mantis: XSS in string_insert_hrefs()
https://bugzilla.redhat.com/show_bug.cgi?id=1170193
[ 5 ] Bug #1170192 - CVE-2014-9281 mantis: XSS in admin panel / copy_field.php
https://bugzilla.redhat.com/show_bug.cgi?id=1170192
[ 6 ] Bug #1170188 - CVE-2014-9270 mantis: XSS in projax_api.php
https://bugzilla.redhat.com/show_bug.cgi?id=1170188
[ 7 ] Bug #1170180 - CVE-2014-9269 mantis: XSS in extended project browser
https://bugzilla.redhat.com/show_bug.cgi?id=1170180
[ 8 ] Bug #1168618 - CVE-2014-9117 mantis: CAPTCHA bypass in registration form
https://bugzilla.redhat.com/show_bug.cgi?id=1168618
[ 9 ] Bug #1168161 - CVE-2014-9089 mantis: SQL injection in view_all_set.php
https://bugzilla.redhat.com/show_bug.cgi?id=1168161
[ 10 ] Bug #1165152 - CVE-2014-8987 mantis: XSS on Configuration Report page
https://bugzilla.redhat.com/show_bug.cgi?id=1165152
[ 11 ] Bug #1164631 - CVE-2014-8988 mantis: information disclosure issue to be fixed in the upcoming 1.2.18 release
https://bugzilla.redhat.com/show_bug.cgi?id=1164631
[ 12 ] Bug #1164620 - CVE-2014-8986 mantis: cross-site scripting (XSS) issues to be fixed in the upcoming 1.2.18 release
https://bugzilla.redhat.com/show_bug.cgi?id=1164620
[ 13 ] Bug #1169162 - mantis: PHP object injection in filter API
https://bugzilla.redhat.com/show_bug.cgi?id=1169162
[ 14 ] Bug #1169194 - mantis: database credentials leak
https://bugzilla.redhat.com/show_bug.cgi?id=1169194
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update mantis' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
More information about the package-announce
mailing list