Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 19 Apr 2021 04:11:41 GMT
From:      Kevin Bowling <kbowling@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 887cfadcdf5e - main - devel/maven: update to 3.8.1
Message-ID:  <202104190411.13J4BfrC096512@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by kbowling:

URL: https://cgit.FreeBSD.org/ports/commit/?id=887cfadcdf5e7ce9a33ef83ee6ee7b63ff855830

commit 887cfadcdf5e7ce9a33ef83ee6ee7b63ff855830
Author:     Kevin Bowling <kbowling@FreeBSD.org>
AuthorDate: 2021-04-19 04:05:30 +0000
Commit:     Kevin Bowling <kbowling@FreeBSD.org>
CommitDate: 2021-04-19 04:11:34 +0000

    devel/maven: update to 3.8.1
    
    This is not just a bugfix as it contains three features that cause a change of
    default behavior (external HTTP insecure URLs are now blocked by default): your
    builds may fail when using this new Maven release, if you use now blocked
    repositories. Please check and eventually fix before upgrading.
    
    Changes http://maven.apache.org/docs/3.8.1/release-notes.html
    
    PR:             255161
    Approved by:    Jonathan Chen <jonc@chen.org.nz> (maintainer)
    Security:       CVE-2021-26291
                    CVE-2020-13956
---
 devel/maven/Makefile    |  2 +-
 devel/maven/distinfo    |  6 ++---
 devel/maven/pkg-plist   | 18 ++++++-------
 security/vuxml/vuln.xml | 67 +++++++++++++++++++++++++++++++++++++++++++++++++
 4 files changed, 80 insertions(+), 13 deletions(-)

diff --git a/devel/maven/Makefile b/devel/maven/Makefile
index 42cac2993d5e..d2d77f4a1028 100644
--- a/devel/maven/Makefile
+++ b/devel/maven/Makefile
@@ -1,7 +1,7 @@
 # Created by: JonathanChen <jonc@chen.org.nz>
 
 PORTNAME=	maven
-DISTVERSION=	3.6.3
+DISTVERSION=	3.8.1
 CATEGORIES=	devel java
 MASTER_SITES=	APACHE/maven/maven-3/${DISTVERSION}/binaries
 DISTNAME=	apache-maven-${DISTVERSION}-bin
diff --git a/devel/maven/distinfo b/devel/maven/distinfo
index 4912d96568fe..57ad8a2cf1ef 100644
--- a/devel/maven/distinfo
+++ b/devel/maven/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1575665365
-SHA256 (apache-maven-3.6.3-bin.tar.gz) = 26ad91d751b3a9a53087aefa743f4e16a17741d3915b219cf74112bf87a438c5
-SIZE (apache-maven-3.6.3-bin.tar.gz) = 9506321
+TIMESTAMP = 1618695108
+SHA256 (apache-maven-3.8.1-bin.tar.gz) = b98a1905eb554d07427b2e5509ff09bd53e2f1dd7a0afa38384968b113abef02
+SIZE (apache-maven-3.8.1-bin.tar.gz) = 9536838
diff --git a/devel/maven/pkg-plist b/devel/maven/pkg-plist
index 4f40a59ef93a..3988d3cd5e82 100644
--- a/devel/maven/pkg-plist
+++ b/devel/maven/pkg-plist
@@ -45,13 +45,13 @@
 %%DATADIR%%/lib/maven-model-builder-%%PORTVERSION%%.jar
 %%DATADIR%%/lib/maven-plugin-api-%%PORTVERSION%%.jar
 %%DATADIR%%/lib/maven-repository-metadata-%%PORTVERSION%%.jar
-%%DATADIR%%/lib/maven-resolver-api-1.4.1.jar
-%%DATADIR%%/lib/maven-resolver-connector-basic-1.4.1.jar
-%%DATADIR%%/lib/maven-resolver-impl-1.4.1.jar
+%%DATADIR%%/lib/maven-resolver-api-1.6.2.jar
+%%DATADIR%%/lib/maven-resolver-connector-basic-1.6.2.jar
+%%DATADIR%%/lib/maven-resolver-impl-1.6.2.jar
 %%DATADIR%%/lib/maven-resolver-provider-%%PORTVERSION%%.jar
-%%DATADIR%%/lib/maven-resolver-spi-1.4.1.jar
-%%DATADIR%%/lib/maven-resolver-transport-wagon-1.4.1.jar
-%%DATADIR%%/lib/maven-resolver-util-1.4.1.jar
+%%DATADIR%%/lib/maven-resolver-spi-1.6.2.jar
+%%DATADIR%%/lib/maven-resolver-transport-wagon-1.6.2.jar
+%%DATADIR%%/lib/maven-resolver-util-1.6.2.jar
 %%DATADIR%%/lib/maven-settings-%%PORTVERSION%%.jar
 %%DATADIR%%/lib/maven-settings-builder-%%PORTVERSION%%.jar
 %%DATADIR%%/lib/maven-shared-utils-3.2.1.jar
@@ -72,7 +72,7 @@
 %%DATADIR%%/lib/plexus-utils.license
 %%DATADIR%%/lib/slf4j-api-1.7.29.jar
 %%DATADIR%%/lib/slf4j-api.license
-%%DATADIR%%/lib/wagon-file-3.3.4.jar
-%%DATADIR%%/lib/wagon-http-3.3.4-shaded.jar
-%%DATADIR%%/lib/wagon-provider-api-3.3.4.jar
+%%DATADIR%%/lib/wagon-file-3.4.3.jar
+%%DATADIR%%/lib/wagon-http-3.4.3-shaded.jar
+%%DATADIR%%/lib/wagon-provider-api-3.4.3.jar
 %%DATADIR%%/maven-%%PORTVERSION%%
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 3359ddc18d34..97c9911ca975 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -76,6 +76,73 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="20006b5f-a0bc-11eb-8ae6-fc4dd43e2b6a">
+    <topic>Apache Maven -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>maven</name>
+	<range><lt>3.8.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Apache Maven project reports:</p>
+	<blockquote cite="http://maven.apache.org/docs/3.8.1/release-notes.html#cve-2021-26291">;
+	  <p>We received a report from Jonathan Leitschuh about a vulnerability
+	    of custom repositories in dependency POMs. We've split this up
+	    into three separate issues:</p>
+	  <ul>
+	    <li>Possible Man-In-The-Middle-Attack due to custom repositories
+	    using HTTP.
+
+	    More and more repositories use HTTPS nowadays, but this
+	    hasn't always been the case. This means that Maven Central contains
+	    POMs with custom repositories that refer to a URL over HTTP. This
+	    makes downloads via such repository a target for a MITM attack. At
+	    the same time, developers are probably not aware that for some
+	    downloads an insecure URL is being used. Because uploaded POMs to
+	    Maven Central are immutable, a change for Maven was required. To
+	    solve this, we extended the mirror configuration with blocked
+	    parameter, and we added a new external:http:* mirror selector (like
+	    existing external:*), meaning "any external URL using HTTP".
+
+	    The decision was made to block such external HTTP repositories by default:
+	    this is done by providing a mirror in the conf/settings.xml blocking
+	    insecure HTTP external URLs.</li>
+	    <li>Possible Domain Hijacking due to custom repositories using abandoned
+	    domains
+
+	    Sonatype has analyzed which domains were abandoned and has claimed these
+	    domains.</li>
+	    <li>Possible hijacking of downloads by redirecting to custom repositories
+
+	    This one was the hardest to analyze and explain. The short story is:
+	    you're safe, dependencies are only downloaded from repositories within
+	    their context. So there are two main questions: what is the context and
+	    what is the order? The order is described on the Repository Order page.
+	    The first group of repositories are defined in the settings.xml (both user
+	    and global). The second group of repositories are based on inheritence,
+	    with ultimately the super POM containing the URL to Maven Central. The
+	    third group is the most complex one but is important to understand the
+	    term context: repositories from the effective POMs from the dependency
+	    path to the artifact. So if a dependency was defined by another dependency
+	    or by a Maven project, it will also include their repositories. In the end
+	    this is not a bug, but a design feature.</li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>http://maven.apache.org/docs/3.8.1/release-notes.html#cve-2021-26291</url>;
+	<cvename>CVE-2021-26291</cvename>
+	<cvename>CVE-2020-13956</cvename>
+    </references>
+    <dates>
+      <discovery>2021-04-04</discovery>
+      <entry>2021-04-19</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="093a6baf-9f99-11eb-b150-000c292ee6b8">
     <topic>Consul -- Multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202104190411.13J4BfrC096512>