[Bug 1372124] CVE-2016-6347 RESTEasy: Use of the default exception handler in RESTEasy can lead to reflected XSS attack
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1372124
Kurt Seifried <kseifried(a)redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |mrike(a)redhat.com,
| |rchan(a)redhat.com
Whiteboard|impact=moderate,public=2016 |impact=moderate,public=2016
|0901,reported=20160829,sour |0901,reported=20160829,sour
|ce=researcher,cvss2=4.3/AV: |ce=researcher,cvss2=4.3/AV:
|N/AC:M/Au:N/C:N/I:P/A:N,cvs |N/AC:M/Au:N/C:N/I:P/A:N,cvs
|s3=5.4/CVSS:3.0/AV:N/AC:H/P |s3=5.4/CVSS:3.0/AV:N/AC:H/P
|R:N/UI:N/S:C/C:L/I:L/A:N,cw |R:N/UI:N/S:C/C:L/I:L/A:N,cw
|e=CWE-20,eap-7/REST=affecte |e=CWE-20,eap-7/REST=affecte
|d,fedora-all/resteasy=affec |d,fedora-all/resteasy=affec
|ted,eap-6/RESTEasy=notaffec |ted,eap-6/RESTEasy=notaffec
|ted,eap-5/jbossas=wontfix,b |ted,eap-5/jbossas=wontfix,b
|pms-6/Build and |pms-6/Build and
|Assembly=notaffected,brms-6 |Assembly=notaffected,brms-6
|/Build and |/Build and
|Assembly=notaffected,jdg-6/ |Assembly=notaffected,jdg-6/
|Build=notaffected,jdv-6/Pro |Build=notaffected,jdv-6/Pro
|ductization=notaffected,brm |ductization=notaffected,brm
|s-5/Security=wontfix,soap-5 |s-5/Security=wontfix,soap-5
|/Security=wontfix,fsw-6/Swi |/Security=wontfix,fsw-6/Swi
|tchYard=notaffected,fuse-6/ |tchYard=notaffected,fuse-6/
|SwitchYard=affected,jon-3/R |SwitchYard=affected,jon-3/R
|EST=wontfix,jpp-6/Requireme |EST=wontfix,jpp-6/Requireme
|nts=notaffected,rhsso-7/Cor |nts=notaffected,rhsso-7/Cor
|e=notaffected,rhev-m-3/vdsm |e=notaffected,rhev-m-3/vdsm
|-jsonrpc-java=new,rhn_satel |-jsonrpc-java=new,rhn_satel
|lite_6/Security=affected,sa |lite_6/Security=wontfix,sam
|m-1/katello=new,jdg-7/reste |-1/katello=new,jdg-7/restea
|asy=affected |sy=affected
--
You are receiving this mail because:
You are on the CC list for the bug.
5 years, 11 months
[Bug 1535411] CVE-2018-1051 resteasy: Unsafe unmarshalling in YamlProvider allows code execution
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1535411
Kunjan Rathod <krathod(a)redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |krathod(a)redhat.com
Whiteboard|impact=moderate,public=2018 |impact=moderate,public=2018
|0118,reported=20180117,sour |0118,reported=20180117,sour
|ce=researcher,cvss3=8.1/CVS |ce=researcher,cvss3=8.1/CVS
|S:3.0/AV:N/AC:H/PR:N/UI:N/S |S:3.0/AV:N/AC:H/PR:N/UI:N/S
|:U/C:H/I:H/A:H,cwe=CWE-20,b |:U/C:H/I:H/A:H,cwe=CWE-20,b
|pms-6/resteasy=new,brms-6/r |pms-6/resteasy=notaffected,
|esteasy=new,jdg-6/resteasy= |brms-6/resteasy=notaffected
|new,jdv-6/resteasy=new,eap- |,jdg-6/resteasy=new,jdv-6/r
|5/resteasy=wontfix,eap-6/re |esteasy=new,eap-5/resteasy=
|steasy=wontfix,eap-7/restea |wontfix,eap-6/resteasy=wont
|sy=wontfix,soap-5/resteasy= |fix,eap-7/resteasy=wontfix,
|new,fsw-6/resteasy=new,fuse |soap-5/resteasy=new,fsw-6/r
|-6/resteasy=notaffected,jon |esteasy=new,fuse-6/resteasy
|-3/resteasy=notaffected,jpp |=notaffected,jon-3/resteasy
|-6/resteasy=new,rhsso-7/res |=notaffected,jpp-6/resteasy
|teasy=new,rhn_satellite_6/r |=new,rhsso-7/resteasy=new,r
|esteasy=wontfix,sam-1/reste |hn_satellite_6/resteasy=won
|asy=wontfix,rhev-m-4/eap7-r |tfix,sam-1/resteasy=wontfix
|esteasy-yaml-provider=wontf |,rhev-m-4/eap7-resteasy-yam
|ix,rhmap-4/millicore=notaff |l-provider=wontfix,rhmap-4/
|ected,rhel-7/resteasy-base= |millicore=notaffected,rhel-
|new,rhel-8/resteasy=new,fed |7/resteasy-base=new,rhel-8/
|ora-all/resteasy=affected |resteasy=new,fedora-all/res
| |teasy=affected
--
You are receiving this mail because:
You are on the CC list for the bug.
5 years, 11 months
[Bug 1549276] CVE-2018-7489 jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1549276
Kunjan Rathod <krathod(a)redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Whiteboard|impact=moderate,public=2018 |impact=moderate,public=2018
|0226,reported=20180226,sour |0226,reported=20180226,sour
|ce=cve,cvss3=8.1/CVSS:3.0/A |ce=cve,cvss3=8.1/CVSS:3.0/A
|V:N/AC:H/PR:N/UI:N/S:U/C:H/ |V:N/AC:H/PR:N/UI:N/S:U/C:H/
|I:H/A:H,cwe=CWE-20,amq-6/ja |I:H/A:H,cwe=CWE-20,amq-6/ja
|ckson-databind=wontfix,jdg- |ckson-databind=wontfix,jdg-
|7/jackson-databind=notaffec |7/jackson-databind=notaffec
|ted,jdv-6/jackson-databind= |ted,jdv-6/jackson-databind=
|wontfix,eap-7/jackson-datab |wontfix,eap-7/jackson-datab
|ind=affected,bpms-6/jackson |ind=affected,bpms-6/jackson
|-databind=new,brms-6/jackso |-databind=affected,brms-6/j
|n-databind=new,fuse-6/jacks |ackson-databind=affected,fu
|on-databind=wontfix,openshi |se-6/jackson-databind=wontf
|ft-enterprise-2/jackson-dat |ix,openshift-enterprise-2/j
|abind=new,rhn_satellite_6/j |ackson-databind=new,rhn_sat
|ackson-databind=affected/im |ellite_6/jackson-databind=a
|pact=low,rhmap-4/jackson-da |ffected/impact=low,rhmap-4/
|tabind=notaffected,sam-1/ja |jackson-databind=notaffecte
|ckson-databind=wontfix,rhev |d,sam-1/jackson-databind=wo
|-m-4/eap7-jackson-databind= |ntfix,rhev-m-4/eap7-jackson
|affected,rhscl-3/rh-eclipse |-databind=affected,rhscl-3/
|46-jackson-databind=affecte |rh-eclipse46-jackson-databi
|d,fedora-all/jackson-databi |nd=affected,fedora-all/jack
|nd=affected,jon-3/Core |son-databind=affected,jon-3
|Server=new,eap-6/jackson-da |/Core
|tabind=affected,dts-4/devto |Server=new,eap-6/jackson-da
|olset-4-jackson-databind=ne |tabind=affected,dts-4/devto
|w,rhscl-3/rh-maven35-jackso |olset-4-jackson-databind=ne
|n-databind=affected,vertx-3 |w,rhscl-3/rh-maven35-jackso
|/jackson-databind=affected, |n-databind=affected,vertx-3
|swarm-7/jackson-databind=af |/jackson-databind=affected,
|fected,fis-2/jackson-databi |swarm-7/jackson-databind=af
|nd=affected,fuse-7/Camel=af |fected,fis-2/jackson-databi
|fected |nd=affected,fuse-7/Camel=af
| |fected
--
You are receiving this mail because:
You are on the CC list for the bug.
5 years, 11 months
[Bug 1540033] New: CVE-2017-8030 springframework: spring-framework: Improper URL path validation allows for bypassing of security checks on static resources [fedora-all]
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1540033
Bug ID: 1540033
Summary: CVE-2017-8030 springframework: spring-framework:
Improper URL path validation allows for bypassing of
security checks on static resources [fedora-all]
Product: Fedora
Version: 27
Component: springframework
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: puntogil(a)libero.it
Reporter: sfowler(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: dchen(a)redhat.com,
java-sig-commits(a)lists.fedoraproject.org,
lef(a)fedoraproject.org, puntogil(a)libero.it
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of fedora-all.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
--
You are receiving this mail because:
You are on the CC list for the bug.
5 years, 11 months
[Bug 1557542] New: CVE-2018-1324 apache-commons-compress: Infinite loop via extra field parser in ZipFile and ZipArchiveInputStream classes
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1557542
Bug ID: 1557542
Summary: CVE-2018-1324 apache-commons-compress: Infinite loop
via extra field parser in ZipFile and
ZipArchiveInputStream classes
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: psampaio(a)redhat.com
CC: bmcclain(a)redhat.com, dblechte(a)redhat.com,
eedri(a)redhat.com, hhorak(a)redhat.com,
java-maint(a)redhat.com,
java-sig-commits(a)lists.fedoraproject.org,
jorton(a)redhat.com, mgoldboi(a)redhat.com,
michal.skrivanek(a)redhat.com, mizdebsk(a)redhat.com,
msimacek(a)redhat.com, sandro(a)mathys.io,
sbonazzo(a)redhat.com, sherold(a)redhat.com,
SpikeFedora(a)gmail.com, ykaul(a)redhat.com,
ylavi(a)redhat.com
A flaw was found in Apache Commons Compress versions 1.11 to 1.15. A specially
crafted ZIP archive can be used to cause an infinite loop inside of Apache
Commons Compress' extra field parser used by the ZipFile and
ZipArchiveInputStream classes in versions 1.11 to 1.15. This can be used to
mount a denial of service attack against services that use Compress' zip
package.
Upstream patch:
https://git-wip-us.apache.org/repos/asf?p=commons-compress.git;a=blobdiff...
Upstream issue:
https://issues.apache.org/jira/browse/COMPRESS-432
--
You are receiving this mail because:
You are on the CC list for the bug.
5 years, 11 months