An update for maven is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2021-1276 Final 1.0 1.0 2021-07-24 Initial 2021-07-24 2021-07-24 openEuler SA Tool V1.0 2021-07-24 maven security update An update for maven is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2. Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. Security Fix(es): Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html(CVE-2021-26291) An update for maven is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2. openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Critical maven https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1276 https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-26291 https://nvd.nist.gov/vuln/detail/CVE-2021-26291 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP2 maven-lib-3.5.4-9.oe1.noarch.rpm maven-3.5.4-9.oe1.noarch.rpm maven-javadoc-3.5.4-9.oe1.noarch.rpm maven-lib-3.5.4-10.oe1.noarch.rpm maven-3.5.4-10.oe1.noarch.rpm maven-javadoc-3.5.4-10.oe1.noarch.rpm maven-3.5.4-9.oe1.src.rpm maven-3.5.4-9.oe1.src.rpm Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html 2021-07-24 CVE-2021-26291 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP2 Critical 9.1 AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N maven security update 2021-07-24 https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1276