summary refs log tree commit diff
path: root/pkgs/servers/nosql
diff options
context:
space:
mode:
authorRed Davies <red@infect.me>2020-11-24 20:42:29 -0500
committerRed Davies <red@infect.me>2020-11-24 20:42:29 -0500
commitb0f1fea52fefd053ecf942296936606303eb3898 (patch)
tree5314cc38c1783422273b304fcd8d13b7f60c548d /pkgs/servers/nosql
parent3b4fcbb5d1ddc1df28b57d2384bef70dd2d530c9 (diff)
downloadnixpkgs-b0f1fea52fefd053ecf942296936606303eb3898.tar
nixpkgs-b0f1fea52fefd053ecf942296936606303eb3898.tar.gz
nixpkgs-b0f1fea52fefd053ecf942296936606303eb3898.tar.bz2
nixpkgs-b0f1fea52fefd053ecf942296936606303eb3898.tar.lz
nixpkgs-b0f1fea52fefd053ecf942296936606303eb3898.tar.xz
nixpkgs-b0f1fea52fefd053ecf942296936606303eb3898.tar.zst
nixpkgs-b0f1fea52fefd053ecf942296936606303eb3898.zip
cassandra_2_1: 2.1.20 -> 2.1.22
Reason: Fixes CVE-2020-13946 Apache Cassandra RMI Rebind Vulnerability

Description:
It is possible for a local attacker without access to the Apache Cassandra
process or configuration files to manipulate the RMI registry to perform a
man-in-the-middle attack and capture user names and passwords used to access
the JMX interface. The attacker can then use these credentials to access
the JMX interface and perform unauthorised operations.

Users should also be aware of CVE-2019-2684, a JRE vulnerability that enables
this issue to be exploited remotely.

2.1.x users should upgrade to 2.1.22
Diffstat (limited to 'pkgs/servers/nosql')
-rw-r--r--pkgs/servers/nosql/cassandra/2.1.nix4
1 files changed, 2 insertions, 2 deletions
diff --git a/pkgs/servers/nosql/cassandra/2.1.nix b/pkgs/servers/nosql/cassandra/2.1.nix
index d73e242a942..76c1130c469 100644
--- a/pkgs/servers/nosql/cassandra/2.1.nix
+++ b/pkgs/servers/nosql/cassandra/2.1.nix
@@ -1,6 +1,6 @@
 { callPackage, ... } @ args:
 
 callPackage ./generic.nix (args // {
-  version = "2.1.20";
-  sha256 = "0ik7a4jg3s3xnyrj1sa0rvbh066fv1y2202l7cv6nbca72pgyl6a";
+  version = "2.1.22";
+  sha256 = "1wk57dz0kmc6d5y8d8dkx269lzh3ark3751z734gxncwdlclcyz3";
 })