View | Details | Raw Unified | Return to bug 201893 | Differences between
and this patch

Collapse All | Expand All

(-)vuln.xml (+33 lines)
Lines 58-63 Link Here
58
58
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="c470bcc7-33fe-11e5-a4a5-002590263bf5">
62
    <topic>logstash -- SSL/TLS vulnerability with Lumberjack input</topic>
63
    <affects>
64
      <package>
65
	<name>logstash</name>
66
	<range><lt>1.4.4</lt></range>
67
	<range><ge>1.5.0</ge><lt>1.5.3</lt></range>
68
      </package>
69
    </affects>
70
    <description>
71
      <body xmlns="http://www.w3.org/1999/xhtml">
72
	<p>Elastic reports:</p>
73
	<blockquote cite="https://www.elastic.co/community/security">
74
	  <p>Vulnerability Summary: All Logstash versions prior to 1.5.2 that
75
	    use Lumberjack input (in combination with Logstash Forwarder agent)
76
	    are vulnerable to a SSL/TLS security issue called the FREAK attack.
77
	    This allows an attacker to intercept communication and access secure
78
	    data. Users should upgrade to 1.5.3 or 1.4.4.</p>
79
	  <p>Remediation Summary: Users that do not want to upgrade can address
80
	    the vulnerability by disabling the Lumberjack input.</p>
81
	</blockquote>
82
      </body>
83
    </description>
84
    <references>
85
      <cvename>CVE-2015-5378</cvename>
86
      <url>https://www.elastic.co/community/security</url>
87
    </references>
88
    <dates>
89
      <discovery>2015-07-22</discovery>
90
      <entry>2015-07-27</entry>
91
    </dates>
92
  </vuln>
93
61
  <vuln vid="9d732078-32c7-11e5-b263-00262d5ed8ee">
94
  <vuln vid="9d732078-32c7-11e5-b263-00262d5ed8ee">
62
    <topic>chromium -- multiple vulnerabilities</topic>
95
    <topic>chromium -- multiple vulnerabilities</topic>
63
    <affects>
96
    <affects>

Return to bug 201893