As a follow up to this CVE, I wanted to share the process for reporting and 
responding to security issues:

https://www.apache.org/security/
https://www.apache.org/security/committers.html

Here’s the short version:

- Report the vulnerability privately (secur...@apache.org | 
priv...@geode.apache.org)
- Fix the vulnerability
- Release a new version(s) with the fix
- Disclose the vulnerability

Secondly, I think it would be valuable to get the community’s perspective on 
the kinds of security threats that a Geode deployment may encounter.  Here are 
a few questions to spark the conversation:

- When is a bug a security bug?
- When does a bug require a CVE and disclosure?
- How do we know how severe a security issue is?
- How soon do we need to respond to a security issue?

Anthony

> On Apr 4, 2017, at 7:31 AM, Anthony Baker <aba...@apache.org> wrote:
> 
> CVE-2017-5649: Apache Geode information disclosure vulnerability
> 
> Severity:  Medium
> Base score:  5.5 (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L)
> 
> Vendor:
> The Apache Software Foundation
> 
> Versions Affected:
> Geode 1.1.0
> 
> Description:
> When a cluster has enabled security by setting the security-manager
> property, a user should have DATA:READ permission to view data stored
> in the cluster.  However, if an authenticated user has CLUSTER:READ
> but not DATA:READ permission they can access the data
> browser page in Pulse.  From there the user could execute an OQL query
> that exposes data stored in the cluster.
> 
> Mitigation:
> 1.1.0 users should upgrade to 1.1.1
> 
> Credit:
> This issue was discovered by Jinmei Liao.
> 
> References:
> https://www.apache.org/security/

Reply via email to