aboutsummaryrefslogtreecommitdiff
path: root/pkgs/servers/nosql
diff options
context:
space:
mode:
authorRed Davies <red@infect.me>2020-11-24 21:21:56 -0500
committerRed Davies <red@infect.me>2020-11-24 21:21:56 -0500
commit1431c3cc601df3f2f10389e2a8fc4869ebb3bdd5 (patch)
tree2a864287894fcab600fa72da62b24e13db54e0b2 /pkgs/servers/nosql
parent3b4fcbb5d1ddc1df28b57d2384bef70dd2d530c9 (diff)
cassandra_3_0: 3.0.17 -> 3.0.23
Reason: Fixes CVE-2020-13946 Apache Cassandra RMI Rebind Vulnerability Description: It is possible for a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack and capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and perform unauthorised operations. Users should also be aware of CVE-2019-2684, a JRE vulnerability that enables this issue to be exploited remotely. 3.0.x users should upgrade to 3.0.22
Diffstat (limited to 'pkgs/servers/nosql')
-rw-r--r--pkgs/servers/nosql/cassandra/3.0.nix4
1 files changed, 2 insertions, 2 deletions
diff --git a/pkgs/servers/nosql/cassandra/3.0.nix b/pkgs/servers/nosql/cassandra/3.0.nix
index a1aad75ce3f6..bb81d0ca7917 100644
--- a/pkgs/servers/nosql/cassandra/3.0.nix
+++ b/pkgs/servers/nosql/cassandra/3.0.nix
@@ -1,6 +1,6 @@
{ callPackage, ... } @ args:
callPackage ./generic.nix (args // {
- version = "3.0.17";
- sha256 = "0568r5xdy78pl29zby5g4m9qngf29cb9222sc1q1wisapb7zkl2p";
+ version = "3.0.23";
+ sha256 = "0cbia20bggq85q2p6gsybw045qdfqxd5xv8ihppq1hwl21sb2klz";
})