activemq: CVE-2023-46604

Related Vulnerabilities: CVE-2023-46604  

Debian Bug report logs - #1054909
activemq: CVE-2023-46604

Reported by: Moritz Mühlenhoff <jmm@inutil.org>

Date: Sat, 28 Oct 2023 14:27:04 UTC

Severity: grave

Tags: security, upstream

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, unknown-package@qa.debian.org:
Bug#1054909; Package src:grave. (Sat, 28 Oct 2023 14:27:06 GMT) (full text, mbox, link).


Acknowledgement sent to Moritz Mühlenhoff <jmm@inutil.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, unknown-package@qa.debian.org.

Your message specified a Severity: in the pseudo-header, but the severity value activemq was not recognised. The default severity normal is being used instead. The recognised values are: critical, grave, serious, important, normal, minor, wishlist, fixed.

(Sat, 28 Oct 2023 14:27:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Moritz Mühlenhoff <jmm@inutil.org>
To: submit@bugs.debian.org
Subject: grave: CVE-2023-46604
Date: Sat, 28 Oct 2023 16:25:57 +0200
Source: grave
X-Debbugs-CC: team@security.debian.org
Severity: activemq
Tags: security

Hi,

The following vulnerability was published for grave.

CVE-2023-46604[0]:
| Apache ActiveMQ is vulnerable to Remote Code Execution.The
| vulnerability may allow a remote attacker with network access to a
| broker to run arbitrary shell commands by manipulating serialized
| class types in the OpenWire protocol to cause the broker to
| instantiate any class on the classpath.   Users are recommended to
| upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes
| this issue.

https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt
http://www.openwall.com/lists/oss-security/2023/10/27/5


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-46604
    https://www.cve.org/CVERecord?id=CVE-2023-46604

Please adjust the affected versions in the BTS as needed.



Bug reassigned from package 'src:grave' to 'activemq'. Request was from Moritz Muehlenhoff <jmm@inutil.org> to control@bugs.debian.org. (Sat, 28 Oct 2023 14:45:10 GMT) (full text, mbox, link).


Severity set to 'grave' from 'normal' Request was from Moritz Muehlenhoff <jmm@inutil.org> to control@bugs.debian.org. (Sat, 28 Oct 2023 14:45:12 GMT) (full text, mbox, link).


Changed Bug title to 'activemq: CVE-2023-46604' from 'grave: CVE-2023-46604'. Request was from Moritz Muehlenhoff <jmm@inutil.org> to control@bugs.debian.org. (Sat, 28 Oct 2023 14:48:02 GMT) (full text, mbox, link).


Added tag(s) upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 28 Oct 2023 15:15:03 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sat Oct 28 17:54:33 2023; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.