Mageia alert MGASA-2017-0333 (groovy18)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2017-0333: Updated groovy18 packages fix security vulnerability | |
Date: | Thu, 7 Sep 2017 11:07:58 +0200 | |
Message-ID: | <20170907090758.361979F872@duvel.mageia.org> |
MGASA-2017-0333 - Updated groovy18 packages fix security vulnerability Publication date: 07 Sep 2017 URL: http://advisories.mageia.org/MGASA-2017-0333.html Type: security Affected Mageia releases: 6 CVE: CVE-2015-3253 Description: When an application has Groovy on the classpath and that it uses standard Java serialization mechanism to communicate between servers, or to store local data, it is possible for an attacker to bake a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability (CVE-2015-3253). References: - https://bugs.mageia.org/show_bug.cgi?id=21649 - http://groovy-lang.org/security.html - https://lists.fedoraproject.org/archives/list/package-ann... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3253 SRPMS: - 6/core/groovy18-1.8.9-26.2.mga6