• [gentoo-announce] [ GLSA 202312-02 ] Minecraft Server: Remote Code Exec

    From glsamaker@gentoo.org@21:1/5 to All on Wed Dec 20 08:20:01 2023
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202312-02
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: High
    Title: Minecraft Server: Remote Code Execution
    Date: December 20, 2023
    Bugs: #828936
    ID: 202312-02

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    A vulnerability has been found in Minecraft Server which leads to remote
    code execution.

    Background
    ==========

    Minecraft Server is the official server for the sandbox video game.

    Affected packages
    =================

    Package Vulnerable Unaffected ----------------------------- ------------ ------------ games-server/minecraft-server < 1.18.1 >= 1.18.1

    Description
    ===========

    A vulnerability has been discovered in Minecraft Server. Please review
    the CVE identifier referenced below for details.

    Impact
    ======

    Vulnerable Minecraft Server versions include a bundled version of log4j
    which is vulnerable to remote code execution.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Minecraft Server users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=games-server/minecraft-server-1.18.1"

    References
    ==========

    [ 1 ] CVE-2021-4104
    https://nvd.nist.gov/vuln/detail/CVE-2021-4104

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202312-02

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2023 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmWClTIACgkQFMQkOaVy +9mJ5hAAhQj194FxrI6qCYwwFX8rdTAxLomZayS5fzuoxPbXpVYO9hv2Y0z+8ZvK 7E5dB0rGaZsHKPd6hdo26a/Tqw1EqpLDuj+okMDHW5bEN98LQVGapLHmZ9YH2EtD 5/NRC68Dqz2/sVFJxkqBcf47V409D9deBn9o19yXhFz0cZPbVckxasdb+oSXTeix kLC/X/bsVHapi/8A/v9gBzFSJea5UErExcgsR3ej9PcvxqHfQyyaq2hTpfFLyN4R pfHoRiK5Ek3ZR1XT5i8Aqw9gjAwL9yLScOekvFnA/iIrsWU2os1Q/HpL4OLSrhdx FXWxhyeuJbHU862qRlTUZ8+vKNGaU+JocNCNbKJPRBhfj+1TSYUnWpvz1l7FEaKx QSfVVoDqh2XbGWmmZRXbmPG+vEZERRHAJnDYvuWeXoS+im/jaFThtSuhBoBJxVXk 50a0s5UBVevJVfL1XqTQNE+VE19jG8E46Q6xidJl182rnNxDrkBFDPPM5I9q5e6o LTu3wbfL7SFGVma2eVwypCK1nV0C13FrWRV/WUbGGxt2rj5vlxg2EGH4MzGxyNuC N+bZua+kEgJDe6XRYJ/8O6RbrBx2O+hkEQd44siTrnPLQJizCzGb9Ix65nXqzyjq gEjiTl8u4JvVeluMjOMwaoXErZCtHDXnI7nrDEJqLxBrGawqvB4=
    =V/1r
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)