summary refs log tree commit diff
path: root/pkgs/servers/nosql
diff options
context:
space:
mode:
authorRed Davies <red@infect.me>2020-11-24 20:58:37 -0500
committerRed Davies <red@infect.me>2020-11-24 20:58:37 -0500
commitee1b13dd13ef956b01a290f4da2b13e37830cd25 (patch)
treeae0bbfa6272ae0f342cd801905fd80f769fa4c56 /pkgs/servers/nosql
parent3b4fcbb5d1ddc1df28b57d2384bef70dd2d530c9 (diff)
downloadnixpkgs-ee1b13dd13ef956b01a290f4da2b13e37830cd25.tar
nixpkgs-ee1b13dd13ef956b01a290f4da2b13e37830cd25.tar.gz
nixpkgs-ee1b13dd13ef956b01a290f4da2b13e37830cd25.tar.bz2
nixpkgs-ee1b13dd13ef956b01a290f4da2b13e37830cd25.tar.lz
nixpkgs-ee1b13dd13ef956b01a290f4da2b13e37830cd25.tar.xz
nixpkgs-ee1b13dd13ef956b01a290f4da2b13e37830cd25.tar.zst
nixpkgs-ee1b13dd13ef956b01a290f4da2b13e37830cd25.zip
cassandra_2_2: 2.2.14 -> 2.2.19
Reason: Fixes CVE-2020-13946 Apache Cassandra RMI Rebind Vulnerability

Description:
It is possible for a local attacker without access to the Apache Cassandra
process or configuration files to manipulate the RMI registry to perform a
man-in-the-middle attack and capture user names and passwords used to access
the JMX interface. The attacker can then use these credentials to access
the JMX interface and perform unauthorised operations.

Users should also be aware of CVE-2019-2684, a JRE vulnerability that enables
this issue to be exploited remotely.

2.2.x users should upgrade to 2.2.18
Diffstat (limited to 'pkgs/servers/nosql')
-rw-r--r--pkgs/servers/nosql/cassandra/2.2.nix4
1 files changed, 2 insertions, 2 deletions
diff --git a/pkgs/servers/nosql/cassandra/2.2.nix b/pkgs/servers/nosql/cassandra/2.2.nix
index f9966b1ccd5..919fb44ee2e 100644
--- a/pkgs/servers/nosql/cassandra/2.2.nix
+++ b/pkgs/servers/nosql/cassandra/2.2.nix
@@ -1,6 +1,6 @@
 { callPackage, ... } @ args:
 
 callPackage ./generic.nix (args // {
-  version = "2.2.14";
-  sha256 = "1b2x3q1ach44qg07sh8wr7d8a10n36w5522drd3p35djbiwa3d9q";
+  version = "2.2.19";
+  sha256 = "1f8axpxxpmzlb22k3lqsnw3096qjp6xd36brvq5xbdk698jw15jl";
 })