| Patch |
File delta |
Description |
| drop_derby_use.diff | (download) |
activemq-core/src/main/java/org/apache/activemq/store/jdbc/DataSourceSupport.java |
11 6 + 5 - 0 !
1 file changed, 6 insertions(+), 5 deletions(-) |
drop usage of derby inside
activemq-core/src/main/java/org/apache/activemq/store/jdbc/DataSourceSupport.java
|
| disable_some_modules.diff | (download) |
pom.xml |
8 8 + 0 - 0 !
1 file changed, 8 insertions(+) |
only enable some modules for now
|
| exclude_geronimo_jca.diff | (download) |
activemq-pool/pom.xml |
15 15 + 0 - 0 !
activemq-spring/src/main/java/org/apache/activemq/pool/PooledConnectionFactoryBean.java |
4 2 + 2 - 0 !
2 files changed, 17 insertions(+), 2 deletions(-) |
disabled usage of geronimo jca provider
because its not yet in Debian.
|
| exclude_spring_osgi.diff | (download) |
activemq-spring/src/main/java/org/apache/activemq/hooks/SpringContextHook.java |
5 2 + 3 - 0 !
1 file changed, 2 insertions(+), 3 deletions(-) |
disable spring osgi support
because it's not yet in Debian.
|
| javadoc_links.diff | (download) |
activemq-core/pom.xml |
2 1 + 1 - 0 !
pom.xml |
16 8 + 8 - 0 !
2 files changed, 9 insertions(+), 9 deletions(-) |
use javadoc installed system-wide for html links.
|
| init_debian_default_values.diff | (download) |
assembly/src/release/bin/activemq |
65 21 + 44 - 0 !
1 file changed, 21 insertions(+), 44 deletions(-) |
init script for activemq : use default values compliant with
Debian installation.
ACTIVEMQ_HOME=/usr/share/activemq
ACTIVEMQ_BASE="/var/lib/activemq"
ACTIVEMQ_CONFIG_DIR="/etc/activemq"
ACTIVEMQ_PIDFILE="/var/run/activemq.pid"
JAVA_HOME="/usr/lib/jvm/java-6-openjdk/"
Create data directory and chown to $ACTIVEMQ_USER
|
| activemq admin.patch | (download) |
assembly/src/release/bin/activemq-admin |
2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-) |
fix running activemq-admin without any argument
which led to "132: [: =: unexpected operator".
|
| exclude_mqtt.diff | (download) |
activemq-core/pom.xml |
11 9 + 2 - 0 !
1 file changed, 9 insertions(+), 2 deletions(-) |
disable mqtt transport (new feature of 5.6 release)
because it depends on non-existing library in Debian.
|
| exclude_leveldb.diff | (download) |
activemq-core/pom.xml |
2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-) |
disable leveldb store (new feature of 5.6 release)
because it depends on non-existing library in Debian.
|
| CVE 2014 3600.patch | (download) |
activemq-core/src/main/java/org/apache/activemq/filter/XPathExpression.java |
57 55 + 2 - 0 !
activemq-core/src/main/java/org/apache/activemq/filter/XalanXPathEvaluator.java |
67 25 + 42 - 0 !
activemq-optional/src/main/java/org/apache/activemq/filter/JAXPXPathEvaluator.java |
12 8 + 4 - 0 !
3 files changed, 88 insertions(+), 48 deletions(-) |
fix cve-2014-3600: xml external entity expansion when evaluating xpath expressions.
This patch can be removed after upgrading to ActiveMQ 5.10.1 or later.
|
| CVE 2014 3612.patch | (download) |
activemq-core/src/main/java/org/apache/activemq/security/LDAPAuthorizationMap.java |
8 6 + 2 - 0 !
activemq-core/src/test/java/org/apache/activemq/security/LDAPSecurityTest.java |
2 1 + 1 - 0 !
activemq-core/src/test/resources/login.config |
19 19 + 0 - 0 !
activemq-jaas/src/main/java/org/apache/activemq/jaas/LDAPLoginModule.java |
11 8 + 3 - 0 !
activemq-jaas/src/test/java/org/apache/activemq/jaas/LDAPLoginModuleTest.java |
27 27 + 0 - 0 !
activemq-jaas/src/test/resources/login.config |
19 19 + 0 - 0 !
activemq-unit-tests/src/test/java/org/apache/activemq/security/LDAPAuthenticationTest.java |
83 83 + 0 - 0 !
activemq-unit-tests/src/test/resources/org/apache/activemq/security/activemq-ldap-auth.xml |
46 46 + 0 - 0 !
8 files changed, 209 insertions(+), 6 deletions(-) |
fix cve-2014-3612: activemq jaas: ldaploginmodule allows empty password authentication.
This patch can be removed after upgrading to ActiveMQ 5.10.1 or later.
|
| CVE 2014 3576.patch | (download) |
activemq-core/src/main/java/org/apache/activemq/broker/TransportConnection.java |
4 0 + 4 - 0 !
1 file changed, 4 deletions(-) |
fix for cve-2014-3576: dos via unauthenticated remote shutdown command
|
| CVE 2015 5254.patch | (download) |
activemq-core/src/main/java/com/thoughtworks/xstream/XStream.java |
1928 1928 + 0 - 0 !
activemq-core/src/main/java/com/thoughtworks/xstream/mapper/FieldAliasingMapper.java |
99 99 + 0 - 0 !
activemq-core/src/main/java/com/thoughtworks/xstream/mapper/SecurityMapper.java |
79 79 + 0 - 0 !
activemq-core/src/main/java/com/thoughtworks/xstream/security/AnyTypePermission.java |
32 32 + 0 - 0 !
activemq-core/src/main/java/com/thoughtworks/xstream/security/ArrayTypePermission.java |
32 32 + 0 - 0 !
activemq-core/src/main/java/com/thoughtworks/xstream/security/ExplicitTypePermission.java |
54 54 + 0 - 0 !
activemq-core/src/main/java/com/thoughtworks/xstream/security/ForbiddenClassException.java |
27 27 + 0 - 0 !
activemq-core/src/main/java/com/thoughtworks/xstream/security/InterfaceTypePermission.java |
33 33 + 0 - 0 !
activemq-core/src/main/java/com/thoughtworks/xstream/security/NoPermission.java |
39 39 + 0 - 0 !
activemq-core/src/main/java/com/thoughtworks/xstream/security/NoTypePermission.java |
36 36 + 0 - 0 !
activemq-core/src/main/java/com/thoughtworks/xstream/security/NullPermission.java |
26 26 + 0 - 0 !
activemq-core/src/main/java/com/thoughtworks/xstream/security/PrimitiveTypePermission.java |
34 34 + 0 - 0 !
activemq-core/src/main/java/com/thoughtworks/xstream/security/ProxyTypePermission.java |
37 37 + 0 - 0 !
activemq-core/src/main/java/com/thoughtworks/xstream/security/RegExpTypePermission.java |
48 48 + 0 - 0 !
activemq-core/src/main/java/com/thoughtworks/xstream/security/TypeHierarchyPermission.java |
32 32 + 0 - 0 !
activemq-core/src/main/java/com/thoughtworks/xstream/security/TypePermission.java |
25 25 + 0 - 0 !
activemq-core/src/main/java/com/thoughtworks/xstream/security/WildcardTypePermission.java |
84 84 + 0 - 0 !
activemq-core/src/main/java/org/apache/activemq/transport/stomp/JmsFrameTranslator.java |
5 3 + 2 - 0 !
activemq-core/src/main/java/org/apache/activemq/transport/stomp/XStreamSupport.java |
47 47 + 0 - 0 !
activemq-core/src/main/java/org/apache/activemq/util/ClassLoadingAwareObjectInputStream.java |
48 44 + 4 - 0 !
activemq-optional/src/main/java/org/apache/activemq/transport/xstream/XStreamWireFormat.java |
29 28 + 1 - 0 !
activemq-web/src/main/java/org/apache/activemq/web/MessageQuery.java |
4 2 + 2 - 0 !
22 files changed, 2769 insertions(+), 9 deletions(-) |
cve-2015-5254
Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be
serialized in the broker, which allows remote attackers to execute arbitrary
code via a crafted serialized Java Message Service (JMS) ObjectMessage object.
|