Bug 13898 - [CVE 21] maven 3.5.4 CVEs found
Summary: [CVE 21] maven 3.5.4 CVEs found
Status: RESOLVED WONTFIX
Alias: None
Product: ROSA Fresh
Classification: ROSA-based products
Component: System (kernel, glibc, systemd, bash, PAM...) (show other bugs)
Version: All
Hardware: All Linux
: Highest blocker
Target Milestone: ---
Assignee: ROSA Linux Bugs
URL: CVE-2021-26291, CVE-2021-26719,
Whiteboard:
: 13273 13766 (view as bug list)
Depends on:
Blocks:
 
Reported: 2023-10-18 20:28 MSK by Yury
Modified: 2024-01-17 17:38 MSK (History)
4 users (show)

See Also:
Platform: 2021.1
ROSA Vulnerability identifier:
RPM Package:
Upstream:
y.tumanov: secteam_verified?


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Yury 2023-10-18 20:28:38 MSK
Please patch CVEs for package maven version 3.5.4
  
INFO (CVEs are): maven 3.5.4
 cves found
CVE-2021-26291
Desc: Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html
Link: https://nvd.nist.gov/vuln/detail/CVE-2021-26291
Severity: CRITICAL
CVE-2021-26719
Desc: A directory traversal issue was discovered in Gradle gradle-enterprise-test-distribution-agent before 1.3.2, test-distribution-gradle-plugin before 1.3.2, and gradle-enterprise-maven-extension before 1.8.2. A malicious actor (with certain credentials) can perform a registration step such that crafted TAR archives lead to extraction of files into arbitrary filesystem locations.
Link: https://nvd.nist.gov/vuln/detail/CVE-2021-26719
Severity: MEDIUM
Comment 1 Vladimir Potapov 2023-10-20 17:56:14 MSK
*** Bug 13766 has been marked as a duplicate of this bug. ***
Comment 2 Vladimir Potapov 2024-01-11 05:53:02 MSK
*** Bug 13273 has been marked as a duplicate of this bug. ***
Comment 3 Vladimir Potapov 2024-01-15 15:18:12 MSK
CVE-2021-26719 не от этого проекта
Comment 4 Vladimir Potapov 2024-01-17 17:38:47 MSK
minor issue https://security-tracker.debian.org/tracker/CVE-2021-26291