<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>
<!DOCTYPE bugzilla SYSTEM "https://bugzilla.rosa.ru/page.cgi?id=bugzilla.dtd">

<bugzilla version="5.0.4"
          urlbase="https://bugzilla.rosa.ru/"
          
          maintainer="d.postnikov@rosa.ru"
>

    <bug>
          <bug_id>13898</bug_id>
          
          <creation_ts>2023-10-18 20:28:38 +0300</creation_ts>
          <short_desc>[CVE 21] maven 3.5.4  CVEs found</short_desc>
          <delta_ts>2024-01-17 17:38:47 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>2</classification_id>
          <classification>ROSA-based products</classification>
          <product>ROSA Fresh</product>
          <component>System (kernel, glibc, systemd, bash, PAM...)</component>
          <version>All</version>
          <rep_platform>All</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>RESOLVED</bug_status>
          <resolution>WONTFIX</resolution>
          
          
          <bug_file_loc>CVE-2021-26291, CVE-2021-26719,</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>Highest</priority>
          <bug_severity>blocker</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Yury">y.tumanov</reporter>
          <assigned_to name="ROSA Linux Bugs">bugs</assigned_to>
          <cc>e.kosachev</cc>
    
    <cc>s.matveev</cc>
    
    <cc>v.potapov</cc>
    
    <cc>y.tumanov</cc>
          
          <cf_platform>2021.1</cf_platform>
          <cf_security_code></cf_security_code>
          <cf_package></cf_package>
          

      

      

      <flag name="secteam_verified"
          id="14198"
          type_id="2"
          status="?"
          setter="y.tumanov"
    />

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>69786</commentid>
    <comment_count>0</comment_count>
    <who name="Yury">y.tumanov</who>
    <bug_when>2023-10-18 20:28:38 +0300</bug_when>
    <thetext>Please patch CVEs for package maven version 3.5.4
  
INFO (CVEs are): maven 3.5.4
 cves found
CVE-2021-26291
Desc: Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html
Link: https://nvd.nist.gov/vuln/detail/CVE-2021-26291
Severity: CRITICAL
CVE-2021-26719
Desc: A directory traversal issue was discovered in Gradle gradle-enterprise-test-distribution-agent before 1.3.2, test-distribution-gradle-plugin before 1.3.2, and gradle-enterprise-maven-extension before 1.8.2. A malicious actor (with certain credentials) can perform a registration step such that crafted TAR archives lead to extraction of files into arbitrary filesystem locations.
Link: https://nvd.nist.gov/vuln/detail/CVE-2021-26719
Severity: MEDIUM</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>70279</commentid>
    <comment_count>1</comment_count>
    <who name="Vladimir Potapov">v.potapov</who>
    <bug_when>2023-10-20 17:56:14 +0300</bug_when>
    <thetext>*** Bug 13766 has been marked as a duplicate of this bug. ***</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>71888</commentid>
    <comment_count>2</comment_count>
    <who name="Vladimir Potapov">v.potapov</who>
    <bug_when>2024-01-11 05:53:02 +0300</bug_when>
    <thetext>*** Bug 13273 has been marked as a duplicate of this bug. ***</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>72076</commentid>
    <comment_count>3</comment_count>
    <who name="Vladimir Potapov">v.potapov</who>
    <bug_when>2024-01-15 15:18:12 +0300</bug_when>
    <thetext>CVE-2021-26719 не от этого проекта</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>72165</commentid>
    <comment_count>4</comment_count>
    <who name="Vladimir Potapov">v.potapov</who>
    <bug_when>2024-01-17 17:38:47 +0300</bug_when>
    <thetext>minor issue https://security-tracker.debian.org/tracker/CVE-2021-26291</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>