what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 4234-1

Debian Security Advisory 4234-1
Posted Jun 25, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4234-1 - Two vulnerabilities were discovered in LAVA, a continuous integration system for deploying operating systems for running tests, which could result in information disclosure of files readable by the lavaserver system user or the execution of arbitrary code via a XMLRPC call.

tags | advisory, arbitrary, vulnerability, info disclosure
systems | linux, debian
advisories | CVE-2018-12564, CVE-2018-12565
SHA-256 | 4b36bb80b9eff7fda1252931c9c7609bbbf15d6d56fbd6dcf6993945219b4394

Debian Security Advisory 4234-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4234-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
June 22, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : lava-server
CVE ID : CVE-2018-12564 CVE-2018-12565

Two vulnerabilities were discovered in LAVA, a continuous integration
system for deploying operating systems for running tests, which could
result in information disclosure of files readable by the lavaserver
system user or the execution of arbitrary code via a XMLRPC call.

For the stable distribution (stretch), these problems have been fixed in
version 2016.12-3.

We recommend that you upgrade your lava-server packages.

For the detailed security status of lava-server please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/lava-server

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=67tj
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    0 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close