|
Message-ID: <CACqpLw+Qygv_-C86OPUeA=7hs00MLPZVx3b-i+cOJKKAFk1MDg@mail.gmail.com> Date: Tue, 15 Oct 2019 23:28:44 -0700 From: Vishwas Babu <vishwasbabuaj@...il.com> To: oss-security@...ts.openwall.com Subject: Fwd: [CVE-2016-4977] Apache Fineract remote code execution vulnerabilities fixed in v1.3.0 Hello, As suggested on https://apache.org/security/committers.html, forwarding the below: ---------- Forwarded message --------- From: Vishwas Babu (Apache) <vishwasbabu@...che.org> Date: Tue, 15 Oct 2019 at 23:25 Subject: [CVE-2016-4977] Apache Fineract remote code execution vulnerabilities fixed in v1.3.0 To: <dev@...eract.apache.org>, <announce@...che.org> Cc: <extranewbugs@...il.com>, <security@...eract.apache.org> Hello, The Apache Fineract project would like to hereby disclose that our 1.3.0 release includes a fix for CVE-2016-4977 : A known vulnerability in spring security upstream dependencies allowed malicious users to trigger remote code execution. See https://nvd.nist.gov/vuln/detail/CVE-2016-4977 for details of the upstream CVE. We would like to thank Roberto (extranewbugs@...il.com) for reporting this issue and the Apache Security team for their assistance. Additional details at https://cwiki.apache.org/confluence/display/FINERACT/Apache+Fineract+Security+Report. Regards, Vishwas
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.