This is an automated email from the ASF dual-hosted git repository.

rgoers pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/flume-site.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new 3ec99f9c Release 1.10.1
3ec99f9c is described below

commit 3ec99f9ca4d6de91921a9ee0a3efe78ac27b139f
Author: Ralph Goers <[email protected]>
AuthorDate: Sat Aug 20 14:27:59 2022 -0700

    Release 1.10.1
---
 content/.doctrees/environment.pickle      | Bin 197347 -> 197434 bytes
 content/.doctrees/releases/1.10.1.doctree | Bin 17007 -> 17177 bytes
 content/.doctrees/security.doctree        | Bin 19591 -> 31749 bytes
 content/_sources/releases/1.10.1.txt      |   2 +-
 content/_sources/security.txt             |  33 ++++++++++++++++++++++++++++++
 content/releases/1.10.1.html              |   2 +-
 content/searchindex.js                    |   2 +-
 content/security.html                     |  33 ++++++++++++++++++++++++++++++
 source/sphinx/releases/1.10.1.rst         |   2 +-
 source/sphinx/security.rst                |  33 ++++++++++++++++++++++++++++++
 10 files changed, 103 insertions(+), 4 deletions(-)

diff --git a/content/.doctrees/environment.pickle 
b/content/.doctrees/environment.pickle
index 699bc75c..7a9d5a8f 100644
Binary files a/content/.doctrees/environment.pickle and 
b/content/.doctrees/environment.pickle differ
diff --git a/content/.doctrees/releases/1.10.1.doctree 
b/content/.doctrees/releases/1.10.1.doctree
index a830a211..f8bbd202 100644
Binary files a/content/.doctrees/releases/1.10.1.doctree and 
b/content/.doctrees/releases/1.10.1.doctree differ
diff --git a/content/.doctrees/security.doctree 
b/content/.doctrees/security.doctree
index 76aef37c..30c13470 100644
Binary files a/content/.doctrees/security.doctree and 
b/content/.doctrees/security.doctree differ
diff --git a/content/_sources/releases/1.10.1.txt 
b/content/_sources/releases/1.10.1.txt
index 4d323179..248cf761 100644
--- a/content/_sources/releases/1.10.1.txt
+++ b/content/_sources/releases/1.10.1.txt
@@ -18,7 +18,7 @@ Apache Flume 1.10.1 is the next release of Flume as an Apache 
top-level project
 Release Notes - Flume - Version v1.10.1
 
 ** Bug
-    * [`FLUME-3428 <https://issues.apache.org/jira/browse/FLUME-3428>`__] - 
Need better parameter validation
+    * [`FLUME-3428 <https://issues.apache.org/jira/browse/FLUME-3428>`__] - 
Fix for CVE-2022-34916, improper use of JNDI in JMSMessageConsumer
     * [`FLUME-3434 <https://issues.apache.org/jira/browse/FLUME-3434>`__] - 
TwitterSource exceptions on serialization
 
 ** Improvement
diff --git a/content/_sources/security.txt b/content/_sources/security.txt
index eef07a2e..ee4ca840 100644
--- a/content/_sources/security.txt
+++ b/content/_sources/security.txt
@@ -10,6 +10,39 @@ If you need help on building or configuring Flume or other 
help on following the
 
 If you have encountered an unlisted security vulnerability or other unexpected 
behaviour that has security impact, or if the descriptions here are incomplete, 
please report them privately to the `Flume SecurityTeam 
<mailto:[email protected]>`__. Thank you!
 
+.. rubric:: Fixed in Flume 1.10.1
+
+`CVE-2022-34916 
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34916>`__: Apache 
Flume vulnerable to a JNDI RCE in JMSMessageConsumer.
+
++------------------------------------------------------------------------------------+--------------------------------------------------------------------------+
+| `CVE-2022-25167 
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34916>`__ | 
Deserialization of Untrusted Data                                        |
++====================================================================================+==========================================================================+
+| Severity                                                                     
      | Moderate                                                                
 |
++------------------------------------------------------------------------------------+--------------------------------------------------------------------------+
+| Base CVSS SCore                                                              
      | 6.6 (AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)                               
 |
++------------------------------------------------------------------------------------+--------------------------------------------------------------------------+
+| Versions Affected                                                            
      | Flume 1.4.0 through 1.10.0                                              
 |
++------------------------------------------------------------------------------------+--------------------------------------------------------------------------+
+
+.. rubric:: Description
+
+Flume's JMSMessageConsumer class can be configured with a destination name. A 
JNDI lookup is performed on this name without performing an validation. This 
could result in untrusted data being deserialized.
+
+.. rubric:: Mitigation
+
+Upgrade to Flume 1.10.1.
+
+In releases 1.4.0 through 1.10.0 the JMSSource should not be used as it uses 
JMSMessageConsumer.
+
+.. rubric:: Release Details
+
+In release 1.10.1, if a protocol is specified in the destination name 
parameter only the java protocol will be allowed. If no protocol is specified 
it will also be allowed.
+
+.. rubric:: Credit
+
+This issue was found by Frentzen Amaral.
+
+
 .. rubric:: Fixed in Flume 1.10.0
 
 `CVE-2022-25167 
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25167>`__: Apache 
Flume vulnerable to a JNDI RCE in JMSSource.
diff --git a/content/releases/1.10.1.html b/content/releases/1.10.1.html
index 7607ddc7..17daafdb 100644
--- a/content/releases/1.10.1.html
+++ b/content/releases/1.10.1.html
@@ -76,7 +76,7 @@
 <dl class="docutils">
 <dt>** Bug</dt>
 <dd><ul class="first last simple">
-<li>[<a class="reference external" 
href="https://issues.apache.org/jira/browse/FLUME-3428";>FLUME-3428</a>] - Need 
better parameter validation</li>
+<li>[<a class="reference external" 
href="https://issues.apache.org/jira/browse/FLUME-3428";>FLUME-3428</a>] - Fix 
for CVE-2022-34916, improper use of JNDI in JMSMessageConsumer</li>
 <li>[<a class="reference external" 
href="https://issues.apache.org/jira/browse/FLUME-3434";>FLUME-3434</a>] - 
TwitterSource exceptions on serialization</li>
 </ul>
 </dd>
diff --git a/content/searchindex.js b/content/searchindex.js
index 1ff778b3..1d6d8731 100644
--- a/content/searchindex.js
+++ b/content/searchindex.js
@@ -1 +1 @@
-Search.setIndex({objtypes:{},objects:{},titles:["Version 1.0.0 - 
Incubating","Version 1.10.0","Version 1.1.0 - Incubating","Version 
1.10.1","Version 1.3.1","Version 1.4.0","Version 1.5.0","Version 
1.2.0","Version 1.3.0","Flume 1.10.1 Developer Guide","Version 1.8.0","Version 
1.9.0","Version 1.5.0.1","Version 1.6.0","Version 1.7.0","Version 
1.5.2","Source Repository","Apache Flume Security 
Vulnerabilities","Download","Mailing lists","Flume 1.10.1 User 
Guide","Testing","Documentation","Wel [...]
\ No newline at end of file
+Search.setIndex({objtypes:{},objects:{},titles:["Version 1.0.0 - 
Incubating","Version 1.10.0","Version 1.1.0 - Incubating","Version 
1.10.1","Version 1.3.1","Version 1.4.0","Version 1.5.0","Version 
1.2.0","Version 1.3.0","Flume 1.10.1 Developer Guide","Version 1.8.0","Version 
1.9.0","Version 1.5.0.1","Version 1.6.0","Version 1.7.0","Version 
1.5.2","Source Repository","Apache Flume Security 
Vulnerabilities","Download","Mailing lists","Flume 1.10.1 User 
Guide","Testing","Documentation","Wel [...]
\ No newline at end of file
diff --git a/content/security.html b/content/security.html
index 9e373b3a..fc1e5339 100644
--- a/content/security.html
+++ b/content/security.html
@@ -65,6 +65,39 @@
 <p>Binary patches are never provided. If you need to apply a source code 
patch, use the building instructions for the Apache Flume version that you are 
using.</p>
 <p>If you need help on building or configuring Flume or other help on 
following the instructions to mitigate the known vulnerabilities listed here, 
please subscribe to, and send your questions to the public Flume Users mailing 
list.</p>
 <p>If you have encountered an unlisted security vulnerability or other 
unexpected behaviour that has security impact, or if the descriptions here are 
incomplete, please report them privately to the <a class="reference external" 
href="mailto:private&#37;&#52;&#48;flume&#46;apche&#46;org";>Flume 
SecurityTeam</a>. Thank you!</p>
+<p class="rubric">Fixed in Flume 1.10.1</p>
+<p><a class="reference external" 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34916";>CVE-2022-34916</a>:
 Apache Flume vulnerable to a JNDI RCE in JMSMessageConsumer.</p>
+<table border="1" class="docutils">
+<colgroup>
+<col width="53%" />
+<col width="47%" />
+</colgroup>
+<thead valign="bottom">
+<tr class="row-odd"><th class="head"><a class="reference external" 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34916";>CVE-2022-25167</a></th>
+<th class="head">Deserialization of Untrusted Data</th>
+</tr>
+</thead>
+<tbody valign="top">
+<tr class="row-even"><td>Severity</td>
+<td>Moderate</td>
+</tr>
+<tr class="row-odd"><td>Base CVSS SCore</td>
+<td>6.6 (AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)</td>
+</tr>
+<tr class="row-even"><td>Versions Affected</td>
+<td>Flume 1.4.0 through 1.10.0</td>
+</tr>
+</tbody>
+</table>
+<p class="rubric">Description</p>
+<p>Flume&#8217;s JMSMessageConsumer class can be configured with a destination 
name. A JNDI lookup is performed on this name without performing an validation. 
This could result in untrusted data being deserialized.</p>
+<p class="rubric">Mitigation</p>
+<p>Upgrade to Flume 1.10.1.</p>
+<p>In releases 1.4.0 through 1.10.0 the JMSSource should not be used as it 
uses JMSMessageConsumer.</p>
+<p class="rubric">Release Details</p>
+<p>In release 1.10.1, if a protocol is specified in the destination name 
parameter only the java protocol will be allowed. If no protocol is specified 
it will also be allowed.</p>
+<p class="rubric">Credit</p>
+<p>This issue was found by Frentzen Amaral.</p>
 <p class="rubric">Fixed in Flume 1.10.0</p>
 <p><a class="reference external" 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25167";>CVE-2022-25167</a>:
 Apache Flume vulnerable to a JNDI RCE in JMSSource.</p>
 <table border="1" class="docutils">
diff --git a/source/sphinx/releases/1.10.1.rst 
b/source/sphinx/releases/1.10.1.rst
index 4d323179..248cf761 100644
--- a/source/sphinx/releases/1.10.1.rst
+++ b/source/sphinx/releases/1.10.1.rst
@@ -18,7 +18,7 @@ Apache Flume 1.10.1 is the next release of Flume as an Apache 
top-level project
 Release Notes - Flume - Version v1.10.1
 
 ** Bug
-    * [`FLUME-3428 <https://issues.apache.org/jira/browse/FLUME-3428>`__] - 
Need better parameter validation
+    * [`FLUME-3428 <https://issues.apache.org/jira/browse/FLUME-3428>`__] - 
Fix for CVE-2022-34916, improper use of JNDI in JMSMessageConsumer
     * [`FLUME-3434 <https://issues.apache.org/jira/browse/FLUME-3434>`__] - 
TwitterSource exceptions on serialization
 
 ** Improvement
diff --git a/source/sphinx/security.rst b/source/sphinx/security.rst
index eef07a2e..ee4ca840 100644
--- a/source/sphinx/security.rst
+++ b/source/sphinx/security.rst
@@ -10,6 +10,39 @@ If you need help on building or configuring Flume or other 
help on following the
 
 If you have encountered an unlisted security vulnerability or other unexpected 
behaviour that has security impact, or if the descriptions here are incomplete, 
please report them privately to the `Flume SecurityTeam 
<mailto:[email protected]>`__. Thank you!
 
+.. rubric:: Fixed in Flume 1.10.1
+
+`CVE-2022-34916 
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34916>`__: Apache 
Flume vulnerable to a JNDI RCE in JMSMessageConsumer.
+
++------------------------------------------------------------------------------------+--------------------------------------------------------------------------+
+| `CVE-2022-25167 
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34916>`__ | 
Deserialization of Untrusted Data                                        |
++====================================================================================+==========================================================================+
+| Severity                                                                     
      | Moderate                                                                
 |
++------------------------------------------------------------------------------------+--------------------------------------------------------------------------+
+| Base CVSS SCore                                                              
      | 6.6 (AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)                               
 |
++------------------------------------------------------------------------------------+--------------------------------------------------------------------------+
+| Versions Affected                                                            
      | Flume 1.4.0 through 1.10.0                                              
 |
++------------------------------------------------------------------------------------+--------------------------------------------------------------------------+
+
+.. rubric:: Description
+
+Flume's JMSMessageConsumer class can be configured with a destination name. A 
JNDI lookup is performed on this name without performing an validation. This 
could result in untrusted data being deserialized.
+
+.. rubric:: Mitigation
+
+Upgrade to Flume 1.10.1.
+
+In releases 1.4.0 through 1.10.0 the JMSSource should not be used as it uses 
JMSMessageConsumer.
+
+.. rubric:: Release Details
+
+In release 1.10.1, if a protocol is specified in the destination name 
parameter only the java protocol will be allowed. If no protocol is specified 
it will also be allowed.
+
+.. rubric:: Credit
+
+This issue was found by Frentzen Amaral.
+
+
 .. rubric:: Fixed in Flume 1.10.0
 
 `CVE-2022-25167 
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25167>`__: Apache 
Flume vulnerable to a JNDI RCE in JMSSource.

Reply via email to