summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRed Davies <red@infect.me>2020-11-24 20:58:37 -0500
committerRed Davies <red@infect.me>2020-11-24 20:58:37 -0500
commitee1b13dd13ef956b01a290f4da2b13e37830cd25 (patch)
treeae0bbfa6272ae0f342cd801905fd80f769fa4c56
parent3b4fcbb5d1ddc1df28b57d2384bef70dd2d530c9 (diff)
cassandra_2_2: 2.2.14 -> 2.2.19
Reason: Fixes CVE-2020-13946 Apache Cassandra RMI Rebind Vulnerability Description: It is possible for a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack and capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and perform unauthorised operations. Users should also be aware of CVE-2019-2684, a JRE vulnerability that enables this issue to be exploited remotely. 2.2.x users should upgrade to 2.2.18
-rw-r--r--pkgs/servers/nosql/cassandra/2.2.nix4
1 files changed, 2 insertions, 2 deletions
diff --git a/pkgs/servers/nosql/cassandra/2.2.nix b/pkgs/servers/nosql/cassandra/2.2.nix
index f9966b1ccd5b..919fb44ee2e7 100644
--- a/pkgs/servers/nosql/cassandra/2.2.nix
+++ b/pkgs/servers/nosql/cassandra/2.2.nix
@@ -1,6 +1,6 @@
{ callPackage, ... } @ args:
callPackage ./generic.nix (args // {
- version = "2.2.14";
- sha256 = "1b2x3q1ach44qg07sh8wr7d8a10n36w5522drd3p35djbiwa3d9q";
+ version = "2.2.19";
+ sha256 = "1f8axpxxpmzlb22k3lqsnw3096qjp6xd36brvq5xbdk698jw15jl";
})