| Summary: | struts new security issue CVE-2014-0114 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | critical | ||
| Priority: | Normal | CC: | sysadmin-bugs, tmb |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/597671/ | ||
| Whiteboard: | MGA3TOO has_procedure advisory mga3-32-ok mga3-64-ok mga4-32-ok mga4-64-ok | ||
| Source RPM: | struts-1.3.10-4.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2014-05-07 22:56:59 CEST
David Walser
2014-05-07 22:57:07 CEST
Whiteboard:
(none) =>
MGA4TOO, MGA3TOO Patched packages uploaded for Mageia 3, Mageia 4, and Cauldron. Advisory: ======================== Updated struts packages fix security vulnerability: It was found that the Struts 1 ActionForm object allowed access to the 'class' parameter, which is directly mapped to the getClass() method. A remote attacker could use this flaw to manipulate the ClassLoader used by an application server running Struts 1. This could lead to remote code execution under certain conditions (CVE-2014-0114). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114 https://rhn.redhat.com/errata/RHSA-2014-0474.html ======================== Updated packages in core/updates_testing: ======================== struts-1.3.10-3.1.mga3 struts-javadoc-1.3.10-3.1.mga3 struts-1.3.10-4.1.mga4 struts-javadoc-1.3.10-4.1.mga4 from SRPMS: struts-1.3.10-3.1.mga3.src.rpm struts-1.3.10-4.1.mga4.src.rpm Version:
Cauldron =>
4 Testing complete mga4 64 No idea how to test this one. As with many other java packages, just ensuring packages update cleanly. Whiteboard:
MGA3TOO =>
MGA3TOO has_procedure mga4-64-ok Advisory uploaded. Whiteboard:
MGA3TOO has_procedure mga4-64-ok =>
MGA3TOO has_procedure advisory mga4-64-ok Tested all the rest too. Validating. Could sysadmin please push to 3 & 4 updates Thanks Keywords:
(none) =>
validated_update Update pushed: http://advisories.mageia.org/MGASA-2014-0219.html Status:
NEW =>
RESOLVED |