An update for apache-commons-net is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2023-1882 Final 1.0 1.0 2023-12-01 Initial 2023-12-01 2023-12-01 openEuler SA Tool V1.0 2023-12-01 apache-commons-net security update An update for apache-commons-net is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2. Apache Commons Net library contains a collection of network utilities and protocol implementations. Supported protocols include: Echo, Finger, FTP, NNTP, NTP, POP3(S), SMTP(S), Telnet, Whois Security Fix(es): Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.(CVE-2021-37533) An update for apache-commons-net is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium apache-commons-net https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1882 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-37533 https://nvd.nist.gov/vuln/detail/CVE-2021-37533 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP2 apache-commons-net-help-3.6-7.oe1.noarch.rpm apache-commons-net-3.6-7.oe1.noarch.rpm apache-commons-net-help-3.6-7.oe1.noarch.rpm apache-commons-net-3.6-7.oe1.noarch.rpm apache-commons-net-help-3.6-7.oe2203.noarch.rpm apache-commons-net-3.6-7.oe2203.noarch.rpm apache-commons-net-3.6-7.oe2203sp1.noarch.rpm apache-commons-net-help-3.6-7.oe2203sp1.noarch.rpm apache-commons-net-3.6-7.oe2203sp2.noarch.rpm apache-commons-net-help-3.6-7.oe2203sp2.noarch.rpm apache-commons-net-3.6-7.oe1.src.rpm apache-commons-net-3.6-7.oe1.src.rpm apache-commons-net-3.6-7.oe2203.src.rpm apache-commons-net-3.6-7.oe2203sp1.src.rpm apache-commons-net-3.6-7.oe2203sp2.src.rpm Prior to Apache Commons Net 3.9.0, Net s FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711. 2023-12-01 CVE-2021-37533 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP2 Medium 6.5 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N apache-commons-net security update 2023-12-01 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1882