[ 
https://issues.apache.org/jira/browse/DRILL-6192?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16379237#comment-16379237
 ] 

ASF GitHub Bot commented on DRILL-6192:
---------------------------------------

GitHub user vladimirtkach opened a pull request:

    https://github.com/apache/drill/pull/1136

    DRILL-6192: Drill is vulnerable to CVE-2017-12197

    Changed libpam4j version from 1.8-rev1 to 1.9-mapr

You can merge this pull request into a Git repository by running:

    $ git pull https://github.com/vladimirtkach/drill DRILL-6192

Alternatively you can review and apply these changes as the patch at:

    https://github.com/apache/drill/pull/1136.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

    This closes #1136
    
----
commit 4d89ac6306923200340576991cb7593261d136d1
Author: vladimir tkach <vovatkach75@...>
Date:   2018-02-27T18:25:28Z

    DRILL-6192: Drill is vulnerable to CVE-2017-12197
    
    Changed libpam4j version from 1.8-rev1 to 1.9-mapr

----


> Drill is vulnerable to CVE-2017-12197
> -------------------------------------
>
>                 Key: DRILL-6192
>                 URL: https://issues.apache.org/jira/browse/DRILL-6192
>             Project: Apache Drill
>          Issue Type: Bug
>            Reporter: Volodymyr Tkach
>            Assignee: Volodymyr Tkach
>            Priority: Major
>
> The current version of libpam4j bundled with MCS does not perform any 
> authorization check. Any user with valid password could access the cluster 
> even if the user account is disabled/password expired/'not allowed to access 
> the service(pam_access ..)' etc..



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to