Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.3091 jekyll - security update 11 October 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: jekyll Publisher: Debian Operating System: Debian GNU/Linux 8 Linux variants Windows Mac OS Impact/Access: Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2018-17567 Original Bulletin: https://security-tracker.debian.org/tracker/DLA-1541-1 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running jekyll check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : jekyll Version : 2.2.0+dfsg-2+deb8u1 CVE ID : CVE-2018-17567 Debian Bug : 909933 Parker Moore from Github Inc, discovered a vulnerability in include: setting in the config file of jekyll which allow arbitrary file reads. By simply including a symlink in the include array allowed the symlinked file to be read into the build when they shouldn't actually be read in any circumstance. For Debian 8 "Jessie", this problem has been fixed in version 2.2.0+dfsg-2+deb8u1. We recommend that you upgrade your jekyll packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE7xPqJqaY/zX9fJAuhj1N8u2cKO8FAlu+ECwACgkQhj1N8u2c KO+ygQ/+IhRM3Z7Bas73veCW+Ysmhdn4fEgJ9AsVPAeVBYDEutwafWhSc5Bk3zG8 RVgQK46fmvQAQL7nmVbM7EQMsgyhhz1ljSAcRbujbQDvFr+16nEhxFWfBs29LMPF XsTyHWH6OXiPGsLnAfron3AfjAlapl+MY98HVYw5U8+CE4UouvNGwIqTHD04tRzN H148KsObuL3tbldVAmyeh8ID6vtrOdgC/EBHLVD23lz2TuwBeUuX+NwsKklrdhNM smr4u/eAqOELoZvchk2rKROf25RK4AkS+kK63HNgZINGH1fWWb0DXE0jDDnnEHj7 3eiQO8uRJ8KVtUN37EKEIBbIkDwn+mGW/emFtukKt43ahu6ZxwETT4PDR44wGfly 2Vo6NMt7uo+HH2xCq1D8IbtV3lS/LLmKIvTFBQ/QcDKPNiPLQrZX5CiI1QpsIPCk 6zi7YdGXldZfD1da2zxzT185DwOcRCoKCygMqdsqRgror5Gr366FlTUWi1MaBEcW v7rLKS80LltJPr+cKATeF1VU8MEEMZFuxBqb5+chnBRQvJWCnW6TeuhBcriLwgy+ KpGoL/krtNpLMIodfjqOWmw7AqymRCWP4U419Nc7mUc3yue33wSHY8eE097GCqvd ceSSN1AN20L8bjkJHs7ytJ3MB3kSqWrTkr0SW40MFLUxb0aNnZY= =yvKr - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW77M2maOgq3Tt24GAQg4rw//WhuQV11BqcMsPxLJZrGaPNj33g8wjybk utVZ5LpLI/5sxNZiKoxEeX08bwcaMPYfWhDvtjCea4ue5dei09cSxdLl+vvDiIJV ttvii42Bskei3x7WCntmJWKTItATeU8kf89HYZAtJAs+R6zhTwSSxCJAuBuluoh5 5wUGxsamSbL64IAg/kh0teu21S2xZk3E6Pc8AtL+gyugEZvgWVLsx2TcAtZDkVX5 pYEYeCCmc06nke1DNtQONQ15I9jzgeY4daICt+vuJYtU4f4o0eQc56GDKQQWtruX 0EoonVY2+D+GYECM+Prp8A7Ac2HGzmNlZC4EH9e/7VjF6mfgzXbCFdnqEvJhuJWK IeYcHwid/+ohyZ6OapVbBmARv5TPj/rGFsnW3tM3/ltCAyn++XD/dsU6n1rdVx+7 z/x/UXNZEHCeK5XXrH+wgrDLr01d6r36JctZXXubrYir6yBXQmQ2JviPXzy1h6if NKnnmhpAgEt2b9wUBIIipBYMkhFqVvqkQ68iFQc4dCkdTx/1IS7cPdm3kG2QHMoQ ogEfiygxEhBi5e7bXC5+s4XAfs5wTNSAfVM/tlrjlatd6TLbYwBRf9r1+PzKxKnF aLkLy8g2tkVoefT6LP96SW33aMlFY2pRx0smsbQ1uozKPOLvTL7zovv2vxe293j9 FwLrRF7tKwM= =4x+N -----END PGP SIGNATURE-----