Bugzilla – Full Text Bug Listing |
Summary: | VUL-0: CVE-2021-32751: gradle: `application` plugin and the `gradlew` script are both vulnerable to arbitrary code execution | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Alexander Bergmann <abergmann> |
Component: | Incidents | Assignee: | package coldpool <coldpool> |
Status: | NEW --- | QA Contact: | Security Team bot <security-team> |
Severity: | Normal | ||
Priority: | P3 - Medium | CC: | amajer, amehmood, cathy.hu, fstrba, johannes.hahn, malbu, mvetter, pgajdos, pmonrealgonzalez, smash_bz, stoyan.manolov, thomas.leroy |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
URL: | https://smash.suse.de/issue/304780/ | ||
Whiteboard: | CVSSv3.1:SUSE:CVE-2021-32751:4.8:(AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L) | ||
Found By: | Security Response Team | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Description
Alexander Bergmann
2021-07-21 13:46:23 UTC
Reassigning to coldpool, could you please take a look into SUSE:SLE-15-SP2:Update? Thanks! 15sp2/gradle has the same version as Factory/gradle so in case 15sp2/gradle is affecte then Factory/gradle has the issue as well. Adding maintainers of Java:packages, the package itself does not have a maintainer defined. |