Bug 16601 - struts new security issue CVE-2015-0899
Summary: struts new security issue CVE-2015-0899
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: i586 Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/656658/
Whiteboard: MGA4TOO has_procedure advisory MGA5-6...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-08-18 17:02 CEST by David Walser
Modified: 2015-09-08 19:57 CEST (History)
3 users (show)

See Also:
Source RPM: struts-1.3.10-8.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-08-18 17:02:08 CEST
Debian-LTS has issued an advisory on August 17:
http://lwn.net/Alerts/654840/

Mageia 4 and Mageia 5 are also affected.

Reproducible: 

Steps to Reproduce:
David Walser 2015-08-18 17:02:22 CEST

CC: (none) => geiger.david68210
Whiteboard: (none) => MGA5TOO, MGA4TOO

Comment 1 David Walser 2015-09-02 21:07:55 CEST
Debian-LTS used the wrong year for the CVE, which made finding info a bit more difficult.

There's more info here:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-0899
https://support.f5.com/kb/en-us/solutions/public/16000/400/sol16444.html

Fedora has an update on QA right now:
https://bodhi.fedoraproject.org/updates/FEDORA-2015-14237

Which has the fix in these two commits:
http://pkgs.fedoraproject.org/cgit/struts.git/commit/?h=f22&id=0475cbc2f199d2a120ef36096b978eb1b180014b
http://pkgs.fedoraproject.org/cgit/struts.git/commit/?h=f22&id=ea0cd426b5149df9c10eb2ba33968039f6c6cecd

Summary: struts new security issue CVE-2014-0899 => struts new security issue CVE-2015-0899
Severity: normal => major

Comment 2 David GEIGER 2015-09-03 09:34:55 CEST
So CVE-2015-0899 is now fixed for Cauldron, mga5 and mga4.

packages are now submitted and uploaded on repos.
Comment 3 David Walser 2015-09-03 15:44:28 CEST
Thanks David!

Advisory:
========================

Updated struts packages fix security vulnerability:

The Validator in Apache Struts 1.1 and later contains a function to
efficiently define rules for input validation across multiple pages during
screen transitions. This function contains a vulnerability where input
validation may be bypassed. When the Apache Struts 1 Validator is used, the
web application may be vulnerable even when this function is not used
explicitly (CVE-2015-0899).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0899
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-0899
========================

Updated packages in core/updates_testing:
========================
struts-1.3.10-4.2.mga4
struts-javadoc-1.3.10-4.2.mga4
struts-1.3.10-8.1.mga5
struts-javadoc-1.3.10-8.1.mga5

from SRPMS:
struts-1.3.10-4.2.mga4.src.rpm
struts-1.3.10-8.1.mga5.src.rpm

Version: Cauldron => 5
Assignee: dmorganec => qa-bugs
Whiteboard: MGA5TOO, MGA4TOO => MGA4TOO

Comment 4 David Walser 2015-09-04 16:02:03 CEST
Fedora has issued an advisory for this today (September 4):
https://lists.fedoraproject.org/pipermail/package-announce/2015-September/165517.html

Advisory:
========================

Updated struts packages fix security vulnerability:

The Validator in Apache Struts 1.1 and later contains a function to
efficiently define rules for input validation across multiple pages during
screen transitions. This function contains a vulnerability where input
validation may be bypassed. When the Apache Struts 1 Validator is used, the
web application may be vulnerable even when this function is not used
explicitly (CVE-2015-0899).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0899
https://lists.fedoraproject.org/pipermail/package-announce/2015-September/165517.html
Comment 5 David Walser 2015-09-04 22:47:06 CEST
Change the URL to the LWN entry with the correct CVE.  The old one was:
http://lwn.net/Vulnerabilities/654885/

URL: http://lwn.net/Vulnerabilities/654885/ => http://lwn.net/Vulnerabilities/656658/

Comment 6 David Walser 2015-09-04 22:47:31 CEST
(In reply to David Walser from comment #5)
> Change the URL to the LWN entry with the correct CVE.  The old one was:
> http://lwn.net/Vulnerabilities/654885/

I mean that I changed it, I wasn't asking anyone to do anything here :o)
Comment 7 Shlomi Fish 2015-09-08 13:36:15 CEST
What's the testing procedure? Can I just do "urpmi struts" without "Updates Testing" enabled and then do it again with Testing enabled and see that everything is fine?

CC: (none) => shlomif

Comment 8 claire robinson 2015-09-08 13:41:56 CEST
Don't forget you can easily search for previous updates using the quick search links on the madb page. 

Struts was previously updated in bug 13342. As with most java modules we just ensured it could update cleanly without any errors, as you suggest.
Comment 9 Shlomi Fish 2015-09-08 14:16:22 CEST
(In reply to claire robinson from comment #8)
> Don't forget you can easily search for previous updates using the quick
> search links on the madb page. 
> 
> Struts was previously updated in bug 13342. As with most java modules we
> just ensured it could update cleanly without any errors, as you suggest.

Fair enough I'm going to test MGA{5,4}-{32,64}. Now.
Comment 10 Shlomi Fish 2015-09-08 14:19:19 CEST
Marking as MGA5-64-OK .

Whiteboard: MGA4TOO => MGA4TOO MGA5-64-OK

Comment 11 Shlomi Fish 2015-09-08 14:21:09 CEST
Mrking as MGA4-32-OK .

Whiteboard: MGA4TOO MGA5-64-OK => MGA4TOO MGA5-64-OK MGA4-32-OK

Comment 12 Shlomi Fish 2015-09-08 14:25:03 CEST
Marking as MGA5-32-OK .

Whiteboard: MGA4TOO MGA5-64-OK MGA4-32-OK => MGA4TOO MGA5-64-OK MGA4-32-OK MGA5-32-OK

Comment 13 Shlomi Fish 2015-09-08 14:27:13 CEST
Marking as MGA4-64-OK and validating the update.

Keywords: (none) => validated_update
Whiteboard: MGA4TOO MGA5-64-OK MGA4-32-OK MGA5-32-OK => MGA4TOO MGA5-64-OK MGA4-32-OK MGA5-32-OK MGA4-64-OK
CC: (none) => sysadmin-bugs

Comment 14 claire robinson 2015-09-08 15:16:14 CEST
Advisory uploaded.

Whiteboard: MGA4TOO MGA5-64-OK MGA4-32-OK MGA5-32-OK MGA4-64-OK => MGA4TOO has_procedure advisory MGA5-64-OK MGA4-32-OK MGA5-32-OK MGA4-64-OK

Comment 15 Mageia Robot 2015-09-08 19:57:37 CEST
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0351.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.