[Bug 1377280] New: CVE-2016-5017 zookeeper: Buffer overflow vulnerability in C cli shell
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1377280
Bug ID: 1377280
Summary: CVE-2016-5017 zookeeper: Buffer overflow vulnerability
in C cli shell
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: low
Priority: low
Assignee: security-response-team(a)redhat.com
Reporter: anemec(a)redhat.com
CC: abhgupta(a)redhat.com, aileenc(a)redhat.com,
alazarot(a)redhat.com, aszczucz(a)redhat.com,
chazlett(a)redhat.com, ctubbsii(a)fedoraproject.org,
dmcphers(a)redhat.com, ethan(a)ethantuttle.com,
etirelli(a)redhat.com, felias(a)redhat.com,
gvarsami(a)redhat.com, hchiorea(a)redhat.com,
java-sig-commits(a)lists.fedoraproject.org,
jcoleman(a)redhat.com, jialiu(a)redhat.com,
jokerman(a)redhat.com, jolee(a)redhat.com,
kconner(a)redhat.com, kseifried(a)redhat.com,
kverlaen(a)redhat.com, ldimaggi(a)redhat.com,
lmeyer(a)redhat.com, lpetrovi(a)redhat.com,
mbaluch(a)redhat.com, mmccomas(a)redhat.com,
mwinkler(a)redhat.com, nwallace(a)redhat.com,
pavelp(a)redhat.com, rrajasek(a)redhat.com,
rwagner(a)redhat.com, rzhang(a)redhat.com,
soa-p-jira(a)post-office.corp.redhat.com, s(a)shk.io,
tcunning(a)redhat.com, tiwillia(a)redhat.com,
tkirby(a)redhat.com, tstclair(a)redhat.com,
vhalbert(a)redhat.com
The ZooKeeper C client shells "cli_st" and "cli_mt" have a buffer overflow
vulnerability associated with parsing of the input command when using the
"cmd:<cmd>" batch mode syntax. If the command string exceeds 1024 characters a
buffer overflow will occur. There is no known compromise which takes advantage
of this vulnerability, and if security is enabled the attacker would be limited
by client level security constraints. The C cli shell is intended as a
sample/example of how to use the C client interface, not as a production tool -
the documentation has also been clarified on this point.
References:
http://seclists.org/bugtraq/2016/Sep/29
Upstream fix:
https://git-wip-us.apache.org/repos/asf?p=zookeeper.git;a=commitdiff;h=27...
--
You are receiving this mail because:
You are on the CC list for the bug.
6 years, 11 months
[Bug 1330472] New: Jenkins returns HTTP/1.1 503 Service Unavailable
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1330472
Bug ID: 1330472
Summary: Jenkins returns HTTP/1.1 503 Service Unavailable
Product: Fedora
Version: 24
Component: jenkins
Severity: high
Assignee: msrb(a)redhat.com
Reporter: hegjon(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: java-sig-commits(a)lists.fedoraproject.org,
mizdebsk(a)redhat.com, msrb(a)redhat.com
Created attachment 1150831
--> https://bugzilla.redhat.com/attachment.cgi?id=1150831&action=edit
/var/log/jenkins/jenkins.log
Description of problem:
When accessing the user interface by http://localhost:8080 I get this error:
HTTP ERROR: 503
Problem accessing /. Reason:
Service Unavailable
Powered by Jetty://
Version-Release number of selected component (if applicable):
$ rpm -qa|grep jenkins
jenkins-json-lib-2.4-10.fc24.noarch
jenkins-mailer-plugin-1.16-2.fc24.noarch
jenkins-1.642.2-2.fc24.noarch
jenkins-extras-memory-monitor-1.9-3.fc24.noarch
jenkins-ldap-plugin-1.11-3.fc24.noarch
jenkins-xstream-1.4.7-8.jenkins1.fc24.noarch
jenkins-pam-auth-plugin-1.2-3.fc24.noarch
jenkins-junit-plugin-1.11-1.fc24.noarch
jenkins-ssh-slaves-plugin-1.10-3.fc24.noarch
jenkins-matrix-auth-plugin-1.2-3.fc24.noarch
js-yui2-jenkins-2.9.0-10.fc24.noarch
jenkins-executable-war-webroot-1.29-6.fc24.noarch
jenkins-instance-identity-1.4-5.fc24.noarch
jenkins-jexl-1.1-5.20111212.fc24.noarch
jenkins-ssh-credentials-plugin-1.11-4.fc24.noarch
jenkins-external-monitor-job-plugin-1.4-4.fc24.noarch
jenkins-commons-jelly-1.1.20120928-10.fc24.noarch
jenkins-core-1.642.2-2.fc24.noarch
jenkins-remoting-2.55-1.fc24.noarch
jenkins-ssh-cli-auth-1.2-8.fc24.noarch
trilead-ssh2-217-7.jenkins8.fc24.noarch
jenkins-icon-shim-1.0.4-4.fc24.noarch
jenkins-credentials-plugin-1.24-3.fc24.noarch
jenkins-sshd-1.6-7.fc24.noarch
jenkins-winstone-2.8-5.fc24.noarch
jenkins-script-security-plugin-1.15-2.fc24.noarch
jenkins-crypto-util-1.4-6.fc24.noarch
jenkins-version-number-1.1-6.fc24.noarch
jenkins-remoting-webapp-2.55-1.fc24.noarch
jenkins-ant-plugin-1.2-6.fc24.noarch
jenkins-cli-1.642.2-2.fc24.noarch
jenkins-antisamy-markup-formatter-plugin-1.3-2.fc24.noarch
jenkins-matrix-project-plugin-1.6-2.fc24.noarch
jenkins-task-reactor-1.4-4.fc24.noarch
jenkins-webapp-1.642.2-2.fc24.noarch
jenkins-javadoc-plugin-1.3-4.fc24.noarch
How reproducible:
Steps to Reproduce:
1. # rm -rf /var/lib/jenkins
2. # dnf install jenkins -y
3. # systemctl start jenkins.service
4. $ curl localhost:8080
Actual results:
<html>
<head>
<meta http-equiv="Content-Type" content="text/html;charset=ISO-8859-1"/>
<title>Error 503 Service Unavailable</title>
</head>
<body>
<h2>HTTP ERROR: 503</h2>
<p>Problem accessing /. Reason:
<pre> Service Unavailable</pre></p>
<hr /><i><small>Powered by Jetty://</small></i>
</body>
</html>
Expected results:
HTTP 200 OK
Additional info:
# systemctl status jenkins.service
● jenkins.service - Jenkins continuous build server
Loaded: loaded (/usr/lib/systemd/system/jenkins.service; disabled; vendor
preset: disabled)
Active: active (running) since Tue 2016-04-26 11:03:25 WEST; 2min 39s ago
Process: 10247 ExecStop=/usr/libexec/jenkins/jenkins stop (code=exited,
status=0/SUCCESS)
Process: 10299 ExecStart=/usr/libexec/jenkins/jenkins start (code=exited,
status=0/SUCCESS)
Main PID: 10364 (java)
Tasks: 36 (limit: 512)
CGroup: /system.slice/jenkins.service
└─10364 /etc/alternatives/java -Dcom.sun.akuma.Daemon=daemonized
-Djava.awt.headless=true -DJENKINS_HOME=/var/lib/jenkins -cp
/usr/share/jenkins/
Apr 26 11:03:25 jonny-dell systemd[1]: Starting Jenkins continuous build
server...
Apr 26 11:03:25 jonny-dell runuser[10345]: pam_unix(runuser:session): session
opened for user jenkins by (uid=0)
Apr 26 11:03:25 jonny-dell runuser[10345]: pam_unix(runuser:session): session
closed for user jenkins
Apr 26 11:03:25 jonny-dell jenkins[10299]: Starting Jenkins [ OK ]
Apr 26 11:03:25 jonny-dell systemd[1]: Started Jenkins continuous build server.
--
You are receiving this mail because:
You are on the CC list for the bug.
7 years, 1 month
[Bug 1311085] New: CVE-2015-5346 Apache Tomcat Session fixation
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1311085
Bug ID: 1311085
Summary: CVE-2015-5346 Apache Tomcat Session fixation
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: low
Priority: low
Assignee: security-response-team(a)redhat.com
Reporter: twalsh(a)redhat.com
CC: aileenc(a)redhat.com, alazarot(a)redhat.com,
alee(a)redhat.com, asantos(a)redhat.com,
bbaranow(a)redhat.com, bdawidow(a)redhat.com,
bmaxwell(a)redhat.com, brms-jira(a)redhat.com,
ccoleman(a)redhat.com, cdewolf(a)redhat.com,
chazlett(a)redhat.com, csutherl(a)redhat.com,
dandread(a)redhat.com, darran.lofthouse(a)redhat.com,
dknox(a)redhat.com, dmcphers(a)redhat.com,
epp-bugs(a)redhat.com, etirelli(a)redhat.com,
fnasser(a)redhat.com, gvarsami(a)redhat.com,
hfnukal(a)redhat.com, huwang(a)redhat.com,
ivan.afonichev(a)gmail.com, jason.greene(a)redhat.com,
java-sig-commits(a)lists.fedoraproject.org,
jawilson(a)redhat.com, jboss-set(a)redhat.com,
jbpapp-maint(a)redhat.com, jclere(a)redhat.com,
jcoleman(a)redhat.com, jdg-bugs(a)redhat.com,
jdoyle(a)redhat.com, jialiu(a)redhat.com,
joelsmith(a)redhat.com, jokerman(a)redhat.com,
jpallich(a)redhat.com, jshepherd(a)redhat.com,
kconner(a)redhat.com, krzysztof.daniel(a)gmail.com,
kseifried(a)redhat.com, ldimaggi(a)redhat.com,
lgao(a)redhat.com, lmeyer(a)redhat.com,
lpetrovi(a)redhat.com, mbabacek(a)redhat.com,
mbaluch(a)redhat.com, me(a)coolsvap.net,
miburman(a)redhat.com, mmccomas(a)redhat.com,
mweiler(a)redhat.com, mwinkler(a)redhat.com,
myarboro(a)redhat.com, nwallace(a)redhat.com,
pavelp(a)redhat.com, pcheung(a)redhat.com,
pgier(a)redhat.com, psakar(a)redhat.com,
pslavice(a)redhat.com, rnetuka(a)redhat.com,
rrajasek(a)redhat.com, rsvoboda(a)redhat.com,
rwagner(a)redhat.com, rzhang(a)redhat.com,
soa-p-jira(a)post-office.corp.redhat.com,
spinder(a)redhat.com, tcunning(a)redhat.com,
theute(a)redhat.com, tkirby(a)redhat.com,
ttarrant(a)redhat.com, twalsh(a)redhat.com,
vtunka(a)redhat.com, weli(a)redhat.com
When recycling the Request object to use for a new request, the
requestedSessionSSL field was not recycled. This meant that a session ID
provided in the next request to be processed using the recycled Request object
could be used when it should not have been. This gave the client the ability to
control the session ID. In theory, this could have been used as part of a
session fixation attack but it would have been hard to achieve as the attacker
would not have been able to force the victim to use the 'correct' Request
object. It was also necessary for at least one web application to be configured
to use the SSL session ID as the HTTP session ID. This is not a common
configuration.
--
You are receiving this mail because:
You are on the CC list for the bug.
7 years, 2 months
[Bug 1311093] New: CVE-2016-0763 tomcat: security manager bypass via setGlobalContext()
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1311093
Bug ID: 1311093
Summary: CVE-2016-0763 tomcat: security manager bypass via
setGlobalContext()
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: anemec(a)redhat.com
CC: aileenc(a)redhat.com, alazarot(a)redhat.com,
alee(a)redhat.com, asantos(a)redhat.com,
bbaranow(a)redhat.com, bdawidow(a)redhat.com,
bmaxwell(a)redhat.com, brms-jira(a)redhat.com,
ccoleman(a)redhat.com, cdewolf(a)redhat.com,
chazlett(a)redhat.com, csutherl(a)redhat.com,
dandread(a)redhat.com, darran.lofthouse(a)redhat.com,
dknox(a)redhat.com, dmcphers(a)redhat.com,
epp-bugs(a)redhat.com, etirelli(a)redhat.com,
fnasser(a)redhat.com, gvarsami(a)redhat.com,
hfnukal(a)redhat.com, huwang(a)redhat.com,
ivan.afonichev(a)gmail.com, jason.greene(a)redhat.com,
java-sig-commits(a)lists.fedoraproject.org,
jawilson(a)redhat.com, jboss-set(a)redhat.com,
jclere(a)redhat.com, jcoleman(a)redhat.com,
jdg-bugs(a)redhat.com, jdoyle(a)redhat.com,
jialiu(a)redhat.com, joelsmith(a)redhat.com,
jokerman(a)redhat.com, jpallich(a)redhat.com,
jshepherd(a)redhat.com, kconner(a)redhat.com,
krzysztof.daniel(a)gmail.com, kseifried(a)redhat.com,
ldimaggi(a)redhat.com, lgao(a)redhat.com,
lmeyer(a)redhat.com, lpetrovi(a)redhat.com,
mbabacek(a)redhat.com, mbaluch(a)redhat.com,
me(a)coolsvap.net, miburman(a)redhat.com,
mmccomas(a)redhat.com, mweiler(a)redhat.com,
mwinkler(a)redhat.com, myarboro(a)redhat.com,
nwallace(a)redhat.com, pavelp(a)redhat.com,
pcheung(a)redhat.com, pgier(a)redhat.com,
psakar(a)redhat.com, pslavice(a)redhat.com,
rnetuka(a)redhat.com, rrajasek(a)redhat.com,
rsvoboda(a)redhat.com, rwagner(a)redhat.com,
rzhang(a)redhat.com,
soa-p-jira(a)post-office.corp.redhat.com,
spinder(a)redhat.com, tcunning(a)redhat.com,
theute(a)redhat.com, tkirby(a)redhat.com,
ttarrant(a)redhat.com, twalsh(a)redhat.com,
vtunka(a)redhat.com, weli(a)redhat.com
ResourceLinkFactory.setGlobalContext() is a public method and was
accessible by web applications running under a security manager
without any checks. This allowed a malicious web application to inject
a malicious global context that could in turn be used to disrupt other
web applications and/or read and write data owned by other web
applications.
External references:
http://seclists.org/bugtraq/2016/Feb/147
--
You are receiving this mail because:
You are on the CC list for the bug.
7 years, 2 months
[Bug 1299437] New: xmlrpc-c-1.39.07 is available
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1299437
Bug ID: 1299437
Summary: xmlrpc-c-1.39.07 is available
Product: Fedora
Version: rawhide
Component: xmlrpc-c
Keywords: FutureFeature, Triaged
Assignee: mizdebsk(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: java-sig-commits(a)lists.fedoraproject.org,
mizdebsk(a)redhat.com, msimacek(a)redhat.com,
msrb(a)redhat.com
Latest upstream release: 1.39.07
Current version/release in rawhide: 1.32.5-1908.svn2451.fc23
URL: http://xmlrpc-c.sourceforge.net/
Please consult the package updates policy before you issue an update to a
stable branch: https://fedoraproject.org/wiki/Updates_Policy
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
--
You are receiving this mail because:
You are on the CC list for the bug.
7 years, 3 months
[Bug 1372669] New: Maven is borken in eclipse
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1372669
Bug ID: 1372669
Summary: Maven is borken in eclipse
Product: Fedora
Version: 24
Component: maven-eclipse-plugin
Severity: high
Assignee: weli(a)redhat.com
Reporter: raphael.groner(a)daasi.de
QA Contact: extras-qa(a)fedoraproject.org
CC: akurtako(a)redhat.com,
java-sig-commits(a)lists.fedoraproject.org,
weli(a)redhat.com
Description of problem:
The selected wizard could not be started.
Plug-in org.eclipse.m2e.core.ui was unable to load class
org.eclipse.m2e.core.ui.internal.wizards.MavenImportWizard.
An error occurred while automatically activating bundle org.eclipse.m2e.core.ui
(666).
Version-Release number of selected component (if applicable):
maven-eclipse-plugin-2.9-15.fc24.noarch
eclipse-m2e-core-1.6.2-5.fc24.noarch
git-2.7.4-2.fc24.x86_64
How reproducible:
always
Steps to Reproduce:
1. install eclipse and the above packages
2. start eclipse
3. try to import a maven project previously got via git clone
Actual results:
error, see abovr
Expected results:
no error, eclipse imports the local git clone
Additional info:
--
You are receiving this mail because:
You are on the CC list for the bug.
7 years, 3 months