| Summary: | jackrabbit new security issue CVE-2015-1833 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | geiger.david68210, herman.viaene, pterjan, sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/647619/ | ||
| Whiteboard: | advisory MGA4-32-OK mga4-64-ok | ||
| Source RPM: | jackrabbit-2.4.2-6.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-05-21 17:55:14 CEST
David Walser
2015-05-21 17:55:31 CEST
CC:
(none) =>
geiger.david68210, pterjan So, fixes for jackrabbit for Cauldron and mga4 too with the proposed upstream patch done in SVN. Freeze_push for Cauldron requested. Ok now jackrabbit is uploaded for mga4 and finally it will be soon dropped from Cauldron. OK, jackrabbit no longer hops in Cauldron. Patched package uploaded for Mageia 4. Thanks David! Advisory: ======================== Updated jackrabbit packages fix security vulnerability: In Apache Jackrabbit before 2.4.6, When processing a WebDAV request body containing XML, the XML parser can be instructed to read content from network resources accessible to the host, identified by URI schemes such as "http(s)" or "file". Depending on the WebDAV request, this can not only be used to trigger internal network requests, but might also be used to insert said content into the request, potentially exposing it to the attacker and others (for instance, by inserting said content in a WebDAV property value using a PROPPATCH request). See also IETF RFC 4918, Section 20.6 (CVE-2015-1833). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1833 http://openwall.com/lists/oss-security/2015/05/21/6 http://openwall.com/lists/oss-security/2015/05/21/7 ======================== Updated packages in core/updates_testing: ======================== jackrabbit-webdav-2.4.2-6.1.mga4 jackrabbit-webdav-javadoc-2.4.2-6.1.mga4 from jackrabbit-2.4.2-6.1.mga4.src.rpm Version:
Cauldron =>
4 MGA4-32 on AcerD620 Xfce No installation issues CC:
(none) =>
herman.viaene Tested mga4 64 Whiteboard:
MGA4-32-OK =>
MGA4-32-OK mga4-64-ok Validating. Advisory uploaded. Please push to 4 updates Thanks Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0242.html Status:
NEW =>
RESOLVED
David Walser
2015-06-09 18:53:55 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/647619/ |