|
|
Subscribe / Log in / New account

Mageia alert MGASA-2017-0333 (groovy18)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2017-0333: Updated groovy18 packages fix security vulnerability
Date:  Thu, 7 Sep 2017 11:07:58 +0200
Message-ID:  <20170907090758.361979F872@duvel.mageia.org>

MGASA-2017-0333 - Updated groovy18 packages fix security vulnerability Publication date: 07 Sep 2017 URL: http://advisories.mageia.org/MGASA-2017-0333.html Type: security Affected Mageia releases: 6 CVE: CVE-2015-3253 Description: When an application has Groovy on the classpath and that it uses standard Java serialization mechanism to communicate between servers, or to store local data, it is possible for an attacker to bake a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability (CVE-2015-3253). References: - https://bugs.mageia.org/show_bug.cgi?id=21649 - http://groovy-lang.org/security.html - https://lists.fedoraproject.org/archives/list/package-ann... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3253 SRPMS: - 6/core/groovy18-1.8.9-26.2.mga6


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds