Return-Path: X-Original-To: apmail-continuum-commits-archive@www.apache.org Delivered-To: apmail-continuum-commits-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 728E5118E6 for ; Fri, 13 Jun 2014 14:47:11 +0000 (UTC) Received: (qmail 24317 invoked by uid 500); 13 Jun 2014 14:47:11 -0000 Delivered-To: apmail-continuum-commits-archive@continuum.apache.org Received: (qmail 24287 invoked by uid 500); 13 Jun 2014 14:47:11 -0000 Mailing-List: contact commits-help@continuum.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@continuum.apache.org Delivered-To: mailing list commits@continuum.apache.org Received: (qmail 24280 invoked by uid 99); 13 Jun 2014 14:47:11 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 13 Jun 2014 14:47:11 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=5.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.4] (HELO eris.apache.org) (140.211.11.4) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 13 Jun 2014 14:47:12 +0000 Received: from eris.apache.org (localhost [127.0.0.1]) by eris.apache.org (Postfix) with ESMTP id EE717238890D; Fri, 13 Jun 2014 14:46:47 +0000 (UTC) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Subject: svn commit: r1602447 - in /continuum/site: pom.xml src/site/apt/security.apt Date: Fri, 13 Jun 2014 14:46:47 -0000 To: commits@continuum.apache.org From: brett@apache.org X-Mailer: svnmailer-1.0.9 Message-Id: <20140613144647.EE717238890D@eris.apache.org> X-Virus-Checked: Checked by ClamAV on apache.org Author: brett Date: Fri Jun 13 14:46:47 2014 New Revision: 1602447 URL: http://svn.apache.org/r1602447 Log: 1.4.2 release Modified: continuum/site/pom.xml continuum/site/src/site/apt/security.apt Modified: continuum/site/pom.xml URL: http://svn.apache.org/viewvc/continuum/site/pom.xml?rev=1602447&r1=1602446&r2=1602447&view=diff ============================================================================== --- continuum/site/pom.xml (original) +++ continuum/site/pom.xml Fri Jun 13 14:46:47 2014 @@ -123,8 +123,8 @@ site-publish - 1.4.1 - 7 January 2013 + 1.4.2 + 13 June 2014 Modified: continuum/site/src/site/apt/security.apt URL: http://svn.apache.org/viewvc/continuum/site/src/site/apt/security.apt?rev=1602447&r1=1602446&r2=1602447&view=diff ============================================================================== --- continuum/site/src/site/apt/security.apt (original) +++ continuum/site/src/site/apt/security.apt Fri Jun 13 14:46:47 2014 @@ -31,6 +31,22 @@ Security Vulnerabilities For more information about reporting vulnerabilities, see the {{{http://www.apache.org/security/} Apache Security Team}} page. +* CVE-2013-2251: Apache Struts Remote Command Execution + + Apache Continuum is affected by a vulnerability in the version of the Struts + library being used, which allows a malicious user to run code on the + server remotely. More details about the vulnerability can be found at + {{http://struts.apache.org/2.3.x/docs/s2-016.html}}. + + Versions Affected: + + * Continuum 1.3.1 to Continuum 1.4.1 + + [] + + All users are recommended to upgrade to {{{./download.cgi} Continuum + 1.4.2}}, which are not affected by this issue. + * CVE-2010-1870: Struts2 remote commands execution Apache Continuum is affected by a vulnerability in the version of the