| Summary: | bugzilla new security issues CVE-2014-157[1-3] | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | olchal, sysadmin-bugs, tmb |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/615620/ | ||
| Whiteboard: | MGA3TOO has_procedure advisory mga3-32-ok mga3-64-ok MGA4-32-OK MGA4-64-OK | ||
| Source RPM: | bugzilla-4.4.5-1.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2014-10-06 21:59:43 CEST
Testing procedure: https://bugs.mageia.org/show_bug.cgi?id=9088#c14 Whiteboard:
(none) =>
MGA3TOO has_procedure Testing on Mageia4-32 Installed : - bugzilla-4.4.6-1.mga4.noarch in /usr/share/bugzilla/bin # ./checksetup.pl --check-modules # ./checksetup.pl # leafpad /etc/bugzilla/localconfig $db_driver = 'mysql'; $db_host = 'localhost'; $db_name = 'bugs'; $db_pass = 'passwd'; # mysqladmin --user=root -p create bugs # mysql -u root -p MariaDB [(none)]> GRANT SELECT, INSERT, UPDATE, DELETE, INDEX, ALTER, CREATE, LOCK TABLES, CREATE TEMPORARY TABLES, DROP, REFERENCES ON bugs.* TO bugs@localhost IDENTIFIED BY 'passwd'; MariaDB [(none)]> FLUSH PRIVILEGES; MariaDB [(none)]> quit # cd /etc/bugzilla/ # grep webservergroup localconfig $webservergroup = 'apache'; # grep Group /etc/httpd/conf/httpd.conf # User/Group: The name (or #number) of the user/group to run httpd as. Group apache # cd /usr/share/bugzilla/bin/ # ./checksetup.pl * This is Bugzilla 4.4.6 on perl 5.18.1 (...) Enter the e-mail address of the administrator: olli@free.fr Enter the real name of the administrator: olli Enter a password for the administrator account: Please retype the password to verify: olli@free.fr is now set up as an administrator. Creating initial dummy product 'TestProduct'... checksetup.pl complete. edit /etc/bugzilla/localconfig http://localhost/bugzilla/ Logged in as olli@free.fr and passwd previously set. On welcome page, went to Administration/Parameters/Required Settings and filled urlbase : http://localhost/bugzilla/ Then created bugs, add attachments, logged out, search, read bugs, download attachments... All went smooth. CC:
(none) =>
olchal Testing on Mageia4-64 * This is Bugzilla 4.4.6 on perl 5.18.1 Followed same procedure as in comment 2 Once installed and configured, created bugs, placed comments, attachments, logged in and out, created users, products, etc ... All good. Whiteboard:
MGA3TOO has_procedure MGA4-32-OK =>
MGA3TOO has_procedure MGA4-32-OK MGA4-64-OK Testing complete mga3 64 Whiteboard:
MGA3TOO has_procedure MGA4-32-OK MGA4-64-OK =>
MGA3TOO has_procedure mga3-64-ok MGA4-32-OK MGA4-64-OK Testing complete mga3 32 Whiteboard:
MGA3TOO has_procedure mga3-64-ok MGA4-32-OK MGA4-64-OK =>
MGA3TOO has_procedure mga3-32-ok mga3-64-ok MGA4-32-OK MGA4-64-OK Validating. Advisory uploaded. Could sysadmin please push to 3 & 4 updates Thanks Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2014-0412.html Status:
NEW =>
RESOLVED
David Walser
2014-10-09 18:34:17 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/615620/ bugs.mageia.org also updated to 4.4.6 CC:
(none) =>
tmb |