Bug 1205373 - CVE-2015-0279 wildfly: RichFaces: Remote Command Execution via insufficient EL parameter sanitization [fedora-all]
Summary: CVE-2015-0279 wildfly: RichFaces: Remote Command Execution via insufficient E...
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora
Classification: Fedora
Component: wildfly
Version: 21
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Marek Goldmann
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: fst_owner=dcafaro, fst_ping=2
Depends On:
Blocks: CVE-2015-0279
TreeView+ depends on / blocked
 
Reported: 2015-03-24 19:17 UTC by Tomas Hoger
Modified: 2015-08-17 15:11 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Release Note
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-08-14 07:07:46 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Tomas Hoger 2015-03-24 19:17:18 UTC
This is an automatically created tracking bug!  It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora.

For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.

For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs

When submitting as an update, use the fedpkg template provided in the next
comment(s).  This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.

Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.

NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time.  If you need to fix the versions independent of each other,
you may clone this bug as appropriate.

[bug automatically created by: add-tracking-bugs]

Comment 1 Tomas Hoger 2015-03-24 19:17:26 UTC
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug.  This will ensure that all associated bugs get updated
when new packages are pushed to stable.

=====

# bugfix, security, enhancement, newpackage (required)
type=security

# testing, stable
request=testing

# Bug numbers: 1234,9876
bugs=1192140,1205373

# Description of your update
notes=Security fix for CVE-2015-0279

# Enable request automation based on the stable/unstable karma thresholds
autokarma=True
stable_karma=3
unstable_karma=-3

# Automatically close bugs when this marked as stable
close_bugs=True

# Suggest that users restart after update
suggest_reboot=False

======

Additionally, you may opt to use the bodhi update submission link instead:

https://admin.fedoraproject.org/updates/new/?type_=security&bugs=1192140,1205373

Comment 2 David A. Cafaro 2015-05-28 01:14:29 UTC
There is a possible upstream patch to be backported here https://github.com/richfaces/richfaces/commit/4c5ddae4d6ddcea591fa949762c1c79ac11cac99 any idea on an updated package?

Comment 3 David A. Cafaro 2015-06-11 01:53:33 UTC
Any work being done towards a patched update?

Comment 4 David A. Cafaro 2015-06-16 13:22:14 UTC
Still need a patch for this, work may also be required due to relation to this package and the updated needed here:

https://bugzilla.redhat.com/show_bug.cgi?id=1132022

Comment 5 David A. Cafaro 2015-07-11 16:23:13 UTC
Any status update on this?

Comment 6 David A. Cafaro 2015-07-23 01:35:17 UTC
This still needs a patch, and is an important security issue.

Comment 7 David A. Cafaro 2015-08-05 13:55:29 UTC
Still need a patch for this.

Comment 8 Marek Goldmann 2015-08-14 07:07:46 UTC
Thanks for reporting this issue, but in Fedora we do not ship RichFaces at all, so I'm even unable to reassign this bug to a correct component (because "wildfly" is a wrong one). Considering above I'm closing this issue now.

Comment 9 David A. Cafaro 2015-08-17 15:11:57 UTC
(In reply to Marek Goldmann from comment #8)
> Thanks for reporting this issue, but in Fedora we do not ship RichFaces at
> all, so I'm even unable to reassign this bug to a correct component (because
> "wildfly" is a wrong one). Considering above I'm closing this issue now.

Thank you for looking into it.  I was unfamiliar with the RichFaces component, so didn't know it did not apply.

Thanks again!


Note You need to log in before you can comment on or make changes to this bug.