| Summary: | axis new security issue CVE-2012-5784 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | major | ||
| Priority: | Normal | CC: | davidwhodgins, dmorganec, sysadmin-bugs |
| Version: | 2 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/535742/ | ||
| Whiteboard: | MGA2-64-OK MGA2-32-OK | ||
| Source RPM: | axis-1.4-18.mga3.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2013-02-01 19:57:40 CET
David Walser
2013-02-01 19:57:46 CET
Whiteboard:
(none) =>
MGA2TOO
David Walser
2013-02-01 20:39:17 CET
CC:
(none) =>
dmorganec
David Walser
2013-02-01 21:44:28 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/535742/ I fixed this in Cauldron. D Morgan, I'll need you to look at this for Mageia 2. Version:
Cauldron =>
2 RedHat has issued an advisory for this on February 19: https://rhn.redhat.com/errata/RHSA-2013-0269.html fixed on svn Thanks D Morgan! Advisory: ======================== Updated axis packages fix security vulnerability: Apache Axis did not verify that the server hostname matched the domain name in the subject's Common Name (CN) or subjectAltName field in X.509 certificates. This could allow a man-in-the-middle attacker to spoof an SSL server if they had a certificate that was valid for any domain name (CVE-2012-5784). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5784 https://rhn.redhat.com/errata/RHSA-2013-0269.html ======================== Updated packages in core/updates_testing: ======================== axis-1.4-6.1.mga2 axis-javadoc-1.4-6.1.mga2 axis-manual-1.4-6.1.mga2 from axis-1.4-6.1.mga2.src.rpm Assignee:
dmorganec =>
qa-bugs http://svnweb.mageia.org/advisories/8936.adv?view=markup&sortby=date uploaded. CC:
(none) =>
davidwhodgins As with other java development updates, we don't have anyone who knows how to test this properly, so all we can do is confirm that it installs cleanly. Could someone from the sysadmin team push 8936.adv Keywords:
(none) =>
validated_update http://advisories.mageia.org/MGASA-2013-0200.html Status:
NEW =>
RESOLVED
Nicolas Vigier
2014-05-08 18:06:24 CEST
CC:
boklm =>
(none) |