USN-4858-1

Source
https://ubuntu.com/security/notices/USN-4858-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4858-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-4858-1
Related
Published
2021-03-15T22:44:10.495420Z
Modified
2021-03-15T22:44:10.495420Z
Summary
gradle vulnerabilities
Details

It was discovered that Gradle used an insecure HTTP URL to download dependencies when the built-in JavaScript or CoffeeScript Gradle plugins were used. A remote unauthenticated attacker could possibly use this issue to perform a machine-in-the-middle attack. (CVE-2019-11065)

It was discovered that the PGP signing plugin in Gradle relied on the insecure SHA-1 algorithm. An attacker could possibly use this issue to conduct spoofing attacks. (CVE-2019-16370)

References

Affected packages

Ubuntu:Pro:18.04:LTS / gradle

Package

Name
gradle
Purl
pkg:deb/ubuntu/gradle?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.1-5ubuntu2~18.04+esm1

Affected versions

3.*

3.2.1-3build2
3.2.1-4
3.2.1-5
3.4.1-4
3.4.1-6
3.4.1-7ubuntu1

4.*

4.4.1-5ubuntu2~18.04

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "4.4.1-5ubuntu2~18.04+esm1",
            "binary_name": "gradle"
        },
        {
            "binary_version": "4.4.1-5ubuntu2~18.04+esm1",
            "binary_name": "gradle-doc"
        },
        {
            "binary_version": "4.4.1-5ubuntu2~18.04+esm1",
            "binary_name": "libgradle-core-java"
        },
        {
            "binary_version": "4.4.1-5ubuntu2~18.04+esm1",
            "binary_name": "libgradle-plugins-java"
        }
    ]
}