|
Message-ID: <9293b3bc-5a1d-39eb-8987-450e6bd4e619@apache.org> Date: Tue, 24 Sep 2024 01:36:57 +0000 From: Heping Wang <peacewong@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-39928: Apache Linkis Spark EngineConn: Commons Lang's RandomStringUtils Random string security vulnerability Severity: moderate Affected versions: - Apache Linkis Spark EngineConn 1.3.0 before 1.6.0 Description: In Apache Linkis <= 1.5.0, a Random string security vulnerability in Spark EngineConn, random string generated by the Token when starting Py4j uses the Commons Lang's RandomStringUtils. Users are recommended to upgrade to version 1.6.0, which fixes this issue. Credit: Hen (reporter) Pj fanning (reporter) References: https://linkis.apache.org https://www.cve.org/CVERecord?id=CVE-2024-39928
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.