<html>
<head>
<base href="https://bugzilla.rosalinux.ru/">
</head>
<body><table border="1" cellspacing="0" cellpadding="8">
<tr>
<th>Platform</th>
<td>2021.1
</td>
</tr>
<tr>
<th>Bug ID</th>
<td><a class="bz_bug_link
bz_status_CONFIRMED "
title="CONFIRMED - [CVE 21] infinispan 8.2.9 CVEs found"
href="https://bugzilla.rosalinux.ru/show_bug.cgi?id=13542">13542</a>
</td>
</tr>
<tr>
<th>Summary</th>
<td>[CVE 21] infinispan 8.2.9 CVEs found
</td>
</tr>
<tr>
<th>Classification</th>
<td>ROSA-based products
</td>
</tr>
<tr>
<th>Product</th>
<td>ROSA Fresh
</td>
</tr>
<tr>
<th>Version</th>
<td>All
</td>
</tr>
<tr>
<th>Hardware</th>
<td>All
</td>
</tr>
<tr>
<th>URL</th>
<td>CVE-2016-0750, CVE-2017-2638, CVE-2019-10174, CVE-2020-25711,
</td>
</tr>
<tr>
<th>OS</th>
<td>Linux
</td>
</tr>
<tr>
<th>Status</th>
<td>CONFIRMED
</td>
</tr>
<tr>
<th>Severity</th>
<td>normal
</td>
</tr>
<tr>
<th>Priority</th>
<td>Normal
</td>
</tr>
<tr>
<th>Component</th>
<td>System (kernel, glibc, systemd, bash, PAM...)
</td>
</tr>
<tr>
<th>Assignee</th>
<td>bugs@lists.rosalinux.ru
</td>
</tr>
<tr>
<th>Reporter</th>
<td>y.tumanov@rosalinux.ru
</td>
</tr>
<tr>
<th>QA Contact</th>
<td>bugs@lists.rosalinux.ru
</td>
</tr>
<tr>
<th>CC</th>
<td>e.kosachev@rosalinux.ru, s.matveev@rosalinux.ru, y.tumanov@rosalinux.ru
</td>
</tr>
<tr>
<th>Target Milestone</th>
<td>---
</td>
</tr>
<tr>
<th>Flags</th>
<td>secteam_verified?
</td>
</tr></table>
<p>
<div>
<pre>Please patch CVEs for package infinispan version 8.2.9
INFO (CVEs are): infinispan 8.2.9
cves found
CVE-2016-0750
Desc: The hotrod java client in infinispan before 9.1.0.Final automatically
deserializes bytearray message contents in certain events. A malicious user
could exploit this flaw by injecting a specially-crafted serialized object to
attain remote code execution or conduct other attacks.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-0750">https://nvd.nist.gov/vuln/detail/CVE-2016-0750</a>
Severity: HIGH
CVE-2017-2638
Desc: It was found that the REST API in Infinispan before version 9.0.0 did not
properly enforce auth constraints. An attacker could use this vulnerability to
read or modify data in the default cache or a known cache name.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-2638">https://nvd.nist.gov/vuln/detail/CVE-2017-2638</a>
Severity: MEDIUM
CVE-2019-10174
Desc: A vulnerability was found in Infinispan such that the invokeAccessibly
method from the public class ReflectionUtil allows any application class to
invoke private methods in any class with Infinispan's privileges. The attacker
can use reflection to introduce new, malicious behavior into the application.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10174">https://nvd.nist.gov/vuln/detail/CVE-2019-10174</a>
Severity: HIGH
CVE-2020-25711
Desc: A flaw was found in infinispan 10 REST API, where authorization
permissions are not checked while performing some server management operations.
When authz is enabled, any user with authentication can perform operations like
shutting down the server without the ADMIN role.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25711">https://nvd.nist.gov/vuln/detail/CVE-2020-25711</a>
Severity: MEDIUM</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are the QA Contact for the bug.</li>
<li>You are the assignee for the bug.</li>
</ul>
</body>
</html>