<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>23690</bug_id>
          
          <creation_ts>2010-06-29 07:42:37 +0400</creation_ts>
          <short_desc>CVE-2010-1622: Spring Framework execution of arbitrary code</short_desc>
          <delta_ts>2010-09-28 14:14:07 +0400</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>spring2</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>security</keywords>
          <priority>P3</priority>
          <bug_severity>major</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Slava Semushin">php-coder</reporter>
          <assigned_to name="viy">viy</assigned_to>
          
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>110194</commentid>
    <comment_count>0</comment_count>
    <who name="Slava Semushin">php-coder</who>
    <bug_when>2010-06-29 07:42:37 +0400</bug_when>
    <thetext>The Spring Framework provides a mechanism to use client provided data to update the properties of an object. This mechanism allows an attacker to modify the properties of the class loader used to load the object (via &apos;class.classloader&apos;). This can lead to arbitrary command execution since, for example, an attacker can modify the URLs used by the class loader to point to locations controlled by the attacker.

http://www.springsource.com/security/cve-2010-1622</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>112798</commentid>
    <comment_count>1</comment_count>
    <who name="Repository Robot">repository-robot</who>
    <bug_when>2010-09-28 14:14:07 +0400</bug_when>
    <thetext>spring2-0:2.5.6-alt2_6.SEC02jpp6 -&gt; sisyphus:

* Tue Sep 28 2010 Igor Vlasenko &lt;viy@altlinux&gt; 0:2.5.6-alt2_6.SEC02jpp6
- new bugfix release SEC02 (closes: #23690)

* Tue Sep 28 2010 Igor Vlasenko &lt;viy@altlinux&gt; 0:2.5.6-alt2_6.SEC01jpp6
- new bugfix release SEC01</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>