Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in xmlrpc
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in xmlrpc
ID: FEDORA-2018-4ac4229aa8
Distribution: Fedora
Plattformen: Fedora 28
Datum: Sa, 2. Juni 2018, 23:16
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5003
Applikationen: Apache XMLRPC

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2018-4ac4229aa8
2018-06-02 20:42:19.387810
-------------------------------------------------------------------------------
-

Name : xmlrpc
Product : Fedora 28
Version : 3.1.3
Release : 20.fc28
URL : http://ws.apache.org/xmlrpc/
Summary : Java XML-RPC implementation
Description :
Apache XML-RPC is a Java implementation of XML-RPC, a popular protocol
that uses XML over HTTP to implement remote procedure calls.
Apache XML-RPC was previously known as Helma XML-RPC. If you have code
using the Helma library, all you should have to do is change the import
statements in your code from helma.xmlrpc.* to org.apache.xmlrpc.*.

-------------------------------------------------------------------------------
-
Update Information:

Security fix for CVE-2016-5003, CVE-2016-5002
-------------------------------------------------------------------------------
-
ChangeLog:

* Fri May 18 2018 Michael Simacek <msimacek@redhat.com> - 1:3.1.3-20
- Disallow deserialization of <ex:serializable> tags by default
- Resolves CVE-2016-5003
- Disallow loading of external DTD
- Resolves CVE-2016-5002
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1508123 - CVE-2016-5003 xmlrpc: Deserialization of untrusted Java
object through <ex:serializable> tag
https://bugzilla.redhat.com/show_bug.cgi?id=1508123
[ 2 ] Bug #1508110 - CVE-2016-5002 xmlrpc: XML external entity vulnerability
SSRF via a crafted DTD
https://bugzilla.redhat.com/show_bug.cgi?id=1508110
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2018-4ac4229aa8' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5AEMJ2ZNFZVGVMACAZMQQCBOFBVUTNZA/
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung