Twenty Year Anniversary

Debian Security Advisory 4234-1

Debian Security Advisory 4234-1
Posted Jun 25, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4234-1 - Two vulnerabilities were discovered in LAVA, a continuous integration system for deploying operating systems for running tests, which could result in information disclosure of files readable by the lavaserver system user or the execution of arbitrary code via a XMLRPC call.

tags | advisory, arbitrary, vulnerability, info disclosure
systems | linux, debian
advisories | CVE-2018-12564, CVE-2018-12565
MD5 | d7ae0435c3ba64ecf87bbe6f49699712

Debian Security Advisory 4234-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4234-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
June 22, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : lava-server
CVE ID : CVE-2018-12564 CVE-2018-12565

Two vulnerabilities were discovered in LAVA, a continuous integration
system for deploying operating systems for running tests, which could
result in information disclosure of files readable by the lavaserver
system user or the execution of arbitrary code via a XMLRPC call.

For the stable distribution (stretch), these problems have been fixed in
version 2016.12-3.

We recommend that you upgrade your lava-server packages.

For the detailed security status of lava-server please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/lava-server

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlstVKcACgkQEMKTtsN8
TjadcQ//bGGsD9UwkEhA/fzziPny6WzdTDFT9UWZYaKVXW/CHk2K4NQdTjyQayWN
JtrfzHd4wOTw7fPIAGlNfE4ysXsBy7DpVrWk8cPLp21REGRnQsScEMrTwgSQvOjK
JS6HXQiZafbpJ+6qjrEdMJg0J9Tdm0kwmdro1urnKiqR7uEiwFiVBLOX1EspaVNw
2Ohp3OnNGyqPLLn4i/r15q81Wg3r4VNkbfPqNa/2fL8EhvBNXNu67ir+wXV94SsK
6lsO9BSYout79e+cJnrVdj25Rw9Dq3xRQDY+Ev8KyZPAWzGg3UlcltAERmp25CcJ
D1T73Rb2XiH9+fjAz8PJCXoia/dBSeKJCfB2SE1u4QIZpL/eolvJMJeI0FhZ+xAR
QYBa3bA13OCUgutNUXX1yTKUay9Hhc1a23yYqiNnAcseasoSfz9qujZG+js9y843
X9Pr96wZdyVwBaAScSDIO1EJCoL7OfWZ2yiPdCFQlXbLQBz7H44Tdud/ImkVB+bz
ULv8PaxphTh3l20wYKKbSXwLdfZYo8Zoz1kGgPV6QvFYR862x3oz0UQWNZLbyRz/
7h5EC47efkdkt7LhmGOxIuUYFfe5Gwkr4rQBjdEVVc5aVyviF4VZENNDGm9ZHnAP
Lm14jVUoNFV9k5deAA9CWhT2pxHEpifuWsQV/tyYOUSaCobPW7k=
=67tj
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

December 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    1 Files
  • 3
    Dec 3rd
    18 Files
  • 4
    Dec 4th
    40 Files
  • 5
    Dec 5th
    16 Files
  • 6
    Dec 6th
    50 Files
  • 7
    Dec 7th
    10 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close