Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 555474 (CVE-2015-5531) - <app-misc/elasticsearch-{1.6.1,1.7.0}: directory traversal attack (CVE-2015-5531)
Summary: <app-misc/elasticsearch-{1.6.1,1.7.0}: directory traversal attack (CVE-2015-5...
Status: RESOLVED FIXED
Alias: CVE-2015-5531
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: ~4 [noglsa/cve]
Keywords:
: 555476 555492 (view as bug list)
Depends on:
Blocks:
 
Reported: 2015-07-20 14:01 UTC by Agostino Sarubbo
Modified: 2015-07-30 07:42 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
elasticsearch.service4 (elasticsearch.service4,289 bytes, text/plain)
2015-07-27 08:53 UTC, Tony Vroon (RETIRED)
no flags Details
elasticsearch-1.6.1.ebuild (elasticsearch-1.6.1.ebuild,1.69 KB, text/plain)
2015-07-27 08:54 UTC, Tony Vroon (RETIRED)
no flags Details
elasticsearch-1.7.0.ebuild (elasticsearch-1.7.0.ebuild,1.69 KB, text/plain)
2015-07-27 08:54 UTC, Tony Vroon (RETIRED)
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2015-07-20 14:01:20 UTC
From ${URL} :

It was reported that Elasticsearch versions from 1.0.0 to 1.6.0 are vulnerable to a directory 
traversal attack.

Mitigation:

Constrain access to the snapshot API to trusted sources.

Fixed in 1.6.1


@maintainer(s): since the package or the affected version has never been marked as stable, we don't need to stabilize it. After the bump, please remove the affected versions from the tree.
Comment 1 Tomáš Mózes 2015-07-20 14:03:19 UTC
*** Bug 555476 has been marked as a duplicate of this bug. ***
Comment 2 Tomáš Mózes 2015-07-20 14:03:55 UTC
Can we please keep 1.6.1 and also introduce 1.7.0?
Comment 3 Ferenc Erki 2015-07-20 16:44:33 UTC
I opened #555492 which contains both 1.6.1 and 1.7.0 ebuilds + the fix on #553534.
Comment 4 Yury German Gentoo Infrastructure gentoo-dev 2015-07-21 01:11:29 UTC
*** Bug 555492 has been marked as a duplicate of this bug. ***
Comment 5 Yury German Gentoo Infrastructure gentoo-dev 2015-07-21 01:14:06 UTC
Proposed ebuilds are located in duplicate bug #555492.
Comment 6 Tomáš Mózes 2015-07-21 07:20:46 UTC
In my test environment with the ELK stack - version 1.7.0 works fine.
Comment 7 Tony Vroon (RETIRED) gentoo-dev 2015-07-27 08:53:52 UTC
Created attachment 407688 [details]
elasticsearch.service4

Reuploading lost attachment.
Comment 8 Tony Vroon (RETIRED) gentoo-dev 2015-07-27 08:54:16 UTC
Created attachment 407690 [details]
elasticsearch-1.6.1.ebuild

Reuploading lost attachment.
Comment 9 Tony Vroon (RETIRED) gentoo-dev 2015-07-27 08:54:43 UTC
Created attachment 407692 [details]
elasticsearch-1.7.0.ebuild

Reuploading lost attachment.
Comment 10 Tony Vroon (RETIRED) gentoo-dev 2015-07-27 09:05:24 UTC
+*elasticsearch-1.7.0 (27 Jul 2015)
+*elasticsearch-1.6.1 (27 Jul 2015)
+
+  27 Jul 2015; Tony Vroon <chainsaw@gentoo.org> -elasticsearch-1.6.0.ebuild,
+  +elasticsearch-1.6.1.ebuild, +elasticsearch-1.7.0.ebuild,
+  -files/1.3.2-http_cors_disable.patch, -files/elasticsearch.init,
+  -files/elasticsearch.init2, -files/elasticsearch.init3,
+  -files/elasticsearch.service, -files/elasticsearch.service2,
+  -files/elasticsearch.service3, +files/elasticsearch.service4:
+  Updated ebuilds by Ferenc Erki address a systemd unit issue as reported by
+  neko259 in bug #553534 and address the security vulnerability reported by
+  Agostino "ago" Sarubbo in bug #555474. Clean-up of older patches and one
+  vulnerable ebuild.
Comment 11 Yury German Gentoo Infrastructure gentoo-dev 2015-07-28 03:44:52 UTC
Maintainer(s), please drop the vulnerable version(s).
Comment 12 Ferenc Erki 2015-07-29 12:36:36 UTC
I believe all vulnerable versions were already dropped.
Comment 13 Tony Vroon (RETIRED) gentoo-dev 2015-07-29 13:01:21 UTC
(In reply to Ferenc Erki from comment #12)
> I believe all vulnerable versions were already dropped.

Confirmed.