--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2015-5430
2015-04-02 17:49:05
--------------------------------------------------------------------------------

Name        : jffi
Product     : Fedora 22
Version     : 1.2.7
Release     : 5.fc22
URL         : https://github.com/jnr/jffi
Summary     : Java Foreign Function Interface
Description :
An optimized Java interface to libffi.

--------------------------------------------------------------------------------
Update Information:

Security fix for CVE-2015-1806, CVE-2015-1807, CVE-2015-1813, CVE-2015-1812, CVE-2015-1810, CVE-2015-1808, CVE-2015-1809, CVE-2015-1814, CVE-2015-1811
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1205615 - CVE-2015-1812 CVE-2015-1813 jenkins: Reflective XSS vulnerability (SECURITY-171, SECURITY-177)
        https://bugzilla.redhat.com/show_bug.cgi?id=1205615
  [ 2 ] Bug #1205620 - CVE-2015-1806 jenkins: Combination filter Groovy script unsecured (SECURITY-125)
        https://bugzilla.redhat.com/show_bug.cgi?id=1205620
  [ 3 ] Bug #1205623 - CVE-2015-1808 jenkins: update center metadata retrieval DoS attack (SECURITY-163)
        https://bugzilla.redhat.com/show_bug.cgi?id=1205623
  [ 4 ] Bug #1205627 - CVE-2015-1810 jenkins: HudsonPrivateSecurityRealm allows creation of reserved names (SECURITY-166)
        https://bugzilla.redhat.com/show_bug.cgi?id=1205627
  [ 5 ] Bug #1205616 - CVE-2015-1814 jenkins: forced API token change (SECURITY-180)
        https://bugzilla.redhat.com/show_bug.cgi?id=1205616
  [ 6 ] Bug #1205622 - CVE-2015-1807 jenkins: directory traversal from artifacts via symlink (SECURITY-162)
        https://bugzilla.redhat.com/show_bug.cgi?id=1205622
  [ 7 ] Bug #1205625 - CVE-2015-1809 jenkins: external entity injection via XPath (SECURITY-165)
        https://bugzilla.redhat.com/show_bug.cgi?id=1205625
  [ 8 ] Bug #1205632 - CVE-2015-1811 jenkins: External entity processing in XML can reveal sensitive local files (SECURITY-167)
        https://bugzilla.redhat.com/show_bug.cgi?id=1205632
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use
su -c 'yum update jffi' at the command line.
For more information, refer to "Managing Software with yum",
available at .

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://lists.fedoraproject.org/admin/lists/package-announce.lists.fedoraproject.org/

Fedora 22: jffi Security Update

April 21, 2015
Security fix for CVE-2015-1806, CVE-2015-1807, CVE-2015-1813, CVE-2015-1812, CVE-2015-1810, CVE-2015-1808, CVE-2015-1809, CVE-2015-1814, CVE-2015-1811

Summary

An optimized Java interface to libffi.

Update Information:

Security fix for CVE-2015-1806, CVE-2015-1807, CVE-2015-1813, CVE-2015-1812, CVE-2015-1810, CVE-2015-1808, CVE-2015-1809, CVE-2015-1814, CVE-2015-1811

Change Log

References

[ 1 ] Bug #1205615 - CVE-2015-1812 CVE-2015-1813 jenkins: Reflective XSS vulnerability (SECURITY-171, SECURITY-177) https://bugzilla.redhat.com/show_bug.cgi?id=1205615 [ 2 ] Bug #1205620 - CVE-2015-1806 jenkins: Combination filter Groovy script unsecured (SECURITY-125) https://bugzilla.redhat.com/show_bug.cgi?id=1205620 [ 3 ] Bug #1205623 - CVE-2015-1808 jenkins: update center metadata retrieval DoS attack (SECURITY-163) https://bugzilla.redhat.com/show_bug.cgi?id=1205623 [ 4 ] Bug #1205627 - CVE-2015-1810 jenkins: HudsonPrivateSecurityRealm allows creation of reserved names (SECURITY-166) https://bugzilla.redhat.com/show_bug.cgi?id=1205627 [ 5 ] Bug #1205616 - CVE-2015-1814 jenkins: forced API token change (SECURITY-180) https://bugzilla.redhat.com/show_bug.cgi?id=1205616 [ 6 ] Bug #1205622 - CVE-2015-1807 jenkins: directory traversal from artifacts via symlink (SECURITY-162) https://bugzilla.redhat.com/show_bug.cgi?id=1205622 [ 7 ] Bug #1205625 - CVE-2015-1809 jenkins: external entity injection via XPath (SECURITY-165) https://bugzilla.redhat.com/show_bug.cgi?id=1205625 [ 8 ] Bug #1205632 - CVE-2015-1811 jenkins: External entity processing in XML can reveal sensitive local files (SECURITY-167) https://bugzilla.redhat.com/show_bug.cgi?id=1205632

Update Instructions

This update can be installed with the "yum" update program. Use su -c 'yum update jffi' at the command line. For more information, refer to "Managing Software with yum", available at .

Severity
Name : jffi
Product : Fedora 22
Version : 1.2.7
Release : 5.fc22
URL : https://github.com/jnr/jffi
Summary : Java Foreign Function Interface

Related News