-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2019-cb14e234fc 2019-05-29 00:48:54.205181 --------------------------------------------------------------------------------
Name : c3p0 Product : Fedora 30 Version : 0.9.5.4 Release : 1.fc30 URL : https://github.com/swaldman/c3p0 Summary : JDBC DataSources/Resource Pools Description : c3p0 is an easy-to-use library for augmenting traditional JDBC drivers with JNDI-bindable DataSources, including DataSources that implement Connection and Statement Pooling, as described by the jdbc3 spec and jdbc2 standard extension.
-------------------------------------------------------------------------------- Update Information:
Update to version 0.9.5.4. Resolves CVE-2018-20433 and CVE-2019-5427. -------------------------------------------------------------------------------- ChangeLog:
* Tue May 14 2019 Alexander Scheel ascheel@redhat.com - 0.9.5.4-1 - Updated version number to match Fedora Packaging Standards - Rebase to upstream release 0.9.5.4 - Resolves rhbz#1709861 / CVE-2019-5427 -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1709861 - CVE-2019-5427 c3p0: loading XML configuration leads to denial of service [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1709861 [ 2 ] Bug #1664730 - CVE-2018-20433 c3p0: XML external entity processing in extractXmlConfigFromInputStream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1664730 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2019-cb14e234fc' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------