|
Message-ID: <CAH+vQmNsjKW04ovT5Vmu-fYCn3877OUQ2DgUtRQCqTe0e4as+g@mail.gmail.com> Date: Wed, 27 Jan 2021 15:54:48 +0000 From: Gary Tully <gtully@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2021-26118: Flaw in ActiveMQ Artemis OpenWire support Description: While investigating ARTEMIS-2964 it was found that the creation of advisory messages in the OpenWire protocol head of Apache ActiveMQ Artemis 2.15.0 bypassed policy based access control for the entire session. Production of advisory messages was not subject to access control in error. This issue is being tracked as https://issues.apache.org/jira/browse/ARTEMIS-2964 Mitigation: Upgrade to Apache ActiveMQ Artemis 2.16.0 Credit: Apache ActiveMQ would like to thank Francesco Marchioni (Red Hat) for reporting this issue.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.