An update for apache-commons-net is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2023-1882
Final
1.0
1.0
2023-12-01
Initial
2023-12-01
2023-12-01
openEuler SA Tool V1.0
2023-12-01
apache-commons-net security update
An update for apache-commons-net is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2.
Apache Commons Net library contains a collection of network utilities and protocol implementations. Supported protocols include: Echo, Finger, FTP, NNTP, NTP, POP3(S), SMTP(S), Telnet, Whois
Security Fix(es):
Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.(CVE-2021-37533)
An update for apache-commons-net is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
apache-commons-net
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1882
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-37533
https://nvd.nist.gov/vuln/detail/CVE-2021-37533
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
openEuler-22.03-LTS-SP2
apache-commons-net-help-3.6-7.oe1.noarch.rpm
apache-commons-net-3.6-7.oe1.noarch.rpm
apache-commons-net-help-3.6-7.oe1.noarch.rpm
apache-commons-net-3.6-7.oe1.noarch.rpm
apache-commons-net-help-3.6-7.oe2203.noarch.rpm
apache-commons-net-3.6-7.oe2203.noarch.rpm
apache-commons-net-3.6-7.oe2203sp1.noarch.rpm
apache-commons-net-help-3.6-7.oe2203sp1.noarch.rpm
apache-commons-net-3.6-7.oe2203sp2.noarch.rpm
apache-commons-net-help-3.6-7.oe2203sp2.noarch.rpm
apache-commons-net-3.6-7.oe1.src.rpm
apache-commons-net-3.6-7.oe1.src.rpm
apache-commons-net-3.6-7.oe2203.src.rpm
apache-commons-net-3.6-7.oe2203sp1.src.rpm
apache-commons-net-3.6-7.oe2203sp2.src.rpm
Prior to Apache Commons Net 3.9.0, Net s FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.
2023-12-01
CVE-2021-37533
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
openEuler-22.03-LTS-SP2
Medium
6.5
AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
apache-commons-net security update
2023-12-01
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1882