Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 21 May 2015 11:22:04 +0200
From: Marcel Reutegger <mreutegg@...che.org>
To: announce@...che.org, announce@...krabbit.apache.org, 
	Jackrabbit Developers <dev@...krabbit.apache.org>, Jackrabbit Users <users@...krabbit.apache.org>, 
	0ang3el 0ang3el <0ang3el@...il.com>, security@...che.org, oss-security@...ts.openwall.com, 
	bugtraq@...urityfocus.com
Subject: [ANNOUNCE] Apache Jackrabbit 2.10.1 released

The Apache Jackrabbit community is pleased to announce the release of
Apache Jackrabbit 2.10.1. This release fixes an important security issue in
the jackrabbit-webdav module reported by Mikhail Egorov.

The release is available for download at:

 http://jackrabbit.apache.org/downloads.html

See the full release notes below for details about this release.

Release Notes -- Apache Jackrabbit -- Version 2.10.1

Introduction
------------

This is Apache Jackrabbit(TM) 2.10.1, a fully compliant implementation of the
Content Repository for Java(TM) Technology API, version 2.0 (JCR 2.0) as
specified in the Java Specification Request 283 (JSR 283).

Apache Jackrabbit 2.10.1 is a patch release that contains fixes and
improvements over Jackrabbit 2.10. Jackrabbit 2.10.x releases are considered
stable and targeted for production use.

Security advisory (JCR-3883 / CVE-2015-1833)
--------------------------------------------

This release fixes an important security issue in the jackrabbit-webdav module
reported by Mikhail Egorov.

When processing a WebDAV request body containing XML, the XML parser can be
instructed to read content from network resources accessible to the host,
identified by URI schemes such as "http(s)" or  "file". Depending on the
WebDAV request, this can not only be used to trigger internal network
requests, but might also be used to insert said content into the request,
potentially exposing it to the attacker and others (for instance, by inserting
said content in a WebDAV property value using a PROPPATCH request). See also
IETF RFC 4918, Section 20.6.

Users of the jackrabbit-webdav module are advised to immediately update the
module to this release or disable WebDAV access to the repository. Users
on earlier versions of Jackrabbit who are unable to upgrade to 2.10.1 should
apply the fix to the corresponding 2.x branch or disable WebDAV access until
official releases of those earlier versions are available. Patches for 2.x
branches are attached to the JIRA issue.

Changes since Jackrabbit 2.10.0
-------------------------------

Bug fixes

  [JCR-3853] JCR2SPI: Load ac provider resource
  [JCR-3871] POI Vulnerabilities
  [JCR-3872] Config DTD does not declare ProtectedItemImporter elements
  [JCR-3873] CachingDataStore not safe against crashes, corrupted
uploads file will prevent system startup
  [JCR-3876] POM dependency to jackrabbit-data test-jar is not test-scoped
  [JCR-3878] Fix test case failure in jackrabbit-data
  [JCR-3883] Jackrabbit WebDAV bundle susceptible to XXE/XEE attack

Improvements

  [JCR-3864] CachingDatastore -cache file sizes to save remote call to
remote datastore( S3DS)
  [JCR-3868] Adapt TestCaseBase.java to test for FileDatastore
  [JCR-3869] CachingDataStore for SAN or NFS mounted storage
  [JCR-3879] Remove contention in AsyncUploadCache to improve performance
  [JCR-3881] Change CachingFDS configuration properties

New Features

  [JCR-3836] Allow to get an Authorizable of a given type

Sub-tasks

  [JCR-3837] Add AuthorizableTypeException in user security API package

In addition to the above-mentioned changes, this release contains
all the changes included up to the Apache Jackrabbit 2.10.0 release.

For more detailed information about all the changes in this and other
Jackrabbit releases, please see the Jackrabbit issue tracker at

    https://issues.apache.org/jira/browse/JCR

Release Contents
----------------

This release consists of a single source archive packaged as a zip file.
The archive can be unpacked with the jar tool from your JDK installation.
See the README.txt file for instructions on how to build this release.

The source archive is accompanied by SHA1 and MD5 checksums and a PGP
signature that you can use to verify the authenticity of your download.
The public key used for the PGP signature can be found at
https://svn.apache.org/repos/asf/jackrabbit/dist/KEYS.

About Apache Jackrabbit
-----------------------

Apache Jackrabbit is a fully conforming implementation of the Content
Repository for Java Technology API (JCR). A content repository is a
hierarchical content store with support for structured and unstructured
content, full text search, versioning, transactions, observation, and
more.

For more information, visit http://jackrabbit.apache.org/

About The Apache Software Foundation
------------------------------------

Established in 1999, The Apache Software Foundation provides organizational,
legal, and financial support for more than 140 freely-available,
collaboratively-developed Open Source projects. The pragmatic Apache License
enables individual and commercial users to easily deploy Apache software;
the Foundation's intellectual property framework limits the legal exposure
of its 3,800+ contributors.

For more information, visit http://www.apache.org/

Trademarks
----------

Apache Jackrabbit, Jackrabbit, Apache, the Apache feather logo, and the Apache
Jackrabbit project logo are trademarks of The Apache Software Foundation.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.