You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa xmlrpc

Sigurnosni nedostaci programskog paketa xmlrpc

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2018-6e6f1003d6
2018-06-02 21:04:47.030032
——————————————————————————–

Name : xmlrpc
Product : Fedora 27
Version : 3.1.3
Release : 20.fc27
URL : http://ws.apache.org/xmlrpc/
Summary : Java XML-RPC implementation
Description :
Apache XML-RPC is a Java implementation of XML-RPC, a popular protocol
that uses XML over HTTP to implement remote procedure calls.
Apache XML-RPC was previously known as Helma XML-RPC. If you have code
using the Helma library, all you should have to do is change the import
statements in your code from helma.xmlrpc.* to org.apache.xmlrpc.*.

——————————————————————————–
Update Information:

Security fix for CVE-2016-5003, CVE-2016-5002
——————————————————————————–
ChangeLog:

* Fri May 18 2018 Michael Simacek <msimacek@redhat.com> – 1:3.1.3-20
– Disallow deserialization of <ex:serializable> tags by default
– Resolves CVE-2016-5003
– Disallow loading of external DTD
– Resolves CVE-2016-5002
* Fri Feb 9 2018 Fedora Release Engineering <releng@fedoraproject.org> – 1:3.1.3-19
– Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1508123 – CVE-2016-5003 xmlrpc: Deserialization of untrusted Java object through <ex:serializable> tag
https://bugzilla.redhat.com/show_bug.cgi?id=1508123
[ 2 ] Bug #1508110 – CVE-2016-5002 xmlrpc: XML external entity vulnerability SSRF via a crafted DTD
https://bugzilla.redhat.com/show_bug.cgi?id=1508110
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-6e6f1003d6’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MB2KL7W5G3BJY65ISPO5YSV4IGBNWSMD/

——————————————————————————–
Fedora Update Notification
FEDORA-2018-4ac4229aa8
2018-06-02 20:42:19.387810
——————————————————————————–

Name : xmlrpc
Product : Fedora 28
Version : 3.1.3
Release : 20.fc28
URL : http://ws.apache.org/xmlrpc/
Summary : Java XML-RPC implementation
Description :
Apache XML-RPC is a Java implementation of XML-RPC, a popular protocol
that uses XML over HTTP to implement remote procedure calls.
Apache XML-RPC was previously known as Helma XML-RPC. If you have code
using the Helma library, all you should have to do is change the import
statements in your code from helma.xmlrpc.* to org.apache.xmlrpc.*.

——————————————————————————–
Update Information:

Security fix for CVE-2016-5003, CVE-2016-5002
——————————————————————————–
ChangeLog:

* Fri May 18 2018 Michael Simacek <msimacek@redhat.com> – 1:3.1.3-20
– Disallow deserialization of <ex:serializable> tags by default
– Resolves CVE-2016-5003
– Disallow loading of external DTD
– Resolves CVE-2016-5002
——————————————————————————–
References:

[ 1 ] Bug #1508123 – CVE-2016-5003 xmlrpc: Deserialization of untrusted Java object through <ex:serializable> tag
https://bugzilla.redhat.com/show_bug.cgi?id=1508123
[ 2 ] Bug #1508110 – CVE-2016-5002 xmlrpc: XML external entity vulnerability SSRF via a crafted DTD
https://bugzilla.redhat.com/show_bug.cgi?id=1508110
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-4ac4229aa8’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5AEMJ2ZNFZVGVMACAZMQQCBOFBVUTNZA/

AutorDanijel Kozinovic
Cert idNCERT-REF-2018-06-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa prosody

Otkriven je sigurnosni nedostatak u programskom paketu prosody za operacijski sustav Debian. Otkriveni nedostatak potencijalnim napadačima omogućuje zaobilaženje sigurnosnih ograničenja...

Close