Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <a1e90a56-7cb7-9898-06e1-7a89d79a0435@apache.org>
Date: Fri, 15 Dec 2023 05:49:54 +0000
From: Albumen Kevin <albumenj@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2023-46279: Apache Dubbo: Bypass deny serialize list check in
 Apache Dubbo 

Severity: important

Affected versions:

- Apache Dubbo 3.1.5

Description:

Deserialization of Untrusted Data vulnerability in Apache Dubbo.This issue only affects Apache Dubbo 3.1.5.

Users are recommended to upgrade to the latest version, which fixes the issue.

References:

https://dubbo.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-46279

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.