Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 339400 - dev-java/xmlrpc: Information Leak
Summary: dev-java/xmlrpc: Information Leak
Status: RESOLVED DUPLICATE of bug 385811
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://ws.apache.org/xmlrpc/changes-r...
Whiteboard: B4 [ebuild+]
Keywords:
Depends on:
Blocks:
 
Reported: 2010-10-01 22:56 UTC by Tim Sammut (RETIRED)
Modified: 2014-08-30 10:57 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Tim Sammut (RETIRED) gentoo-dev 2010-10-01 22:56:49 UTC
From $url:

Fixed a potential security hole: The client has been able to include server side resources into the request by using external entities. Thanks to Johan Hôgre.
Comment 1 Chris Reffett (RETIRED) gentoo-dev Security 2013-09-03 04:31:54 UTC
@maintainers: ping, need a bump or a mask.
Comment 2 Kristian Fiskerstrand (RETIRED) gentoo-dev 2014-08-28 20:30:44 UTC
This is a possible duplicate of bug 385811 for SAX Parser Information Exposure fixed in 3.1.3
Comment 3 Johann Schmitz (ercpe) (RETIRED) gentoo-dev 2014-08-30 08:02:24 UTC
+  30 Aug 2014; Johann Schmitz <ercpe@gentoo.org> +xmlrpc-3.1.3.ebuild:
+  Version bump wrt bug #339400

Note that at least dev-java/jcs isn't compatible with the 3.1.3 version.
Comment 4 Kristian Fiskerstrand (RETIRED) gentoo-dev 2014-08-30 10:57:54 UTC

*** This bug has been marked as a duplicate of bug 385811 ***