Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <9293b3bc-5a1d-39eb-8987-450e6bd4e619@apache.org>
Date: Tue, 24 Sep 2024 01:36:57 +0000
From: Heping Wang <peacewong@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-39928: Apache Linkis Spark EngineConn: Commons Lang's
 RandomStringUtils Random string security vulnerability 

Severity: moderate

Affected versions:

- Apache Linkis Spark EngineConn 1.3.0 before 1.6.0

Description:

In Apache Linkis <= 1.5.0, a Random string security vulnerability in Spark EngineConn, random string generated by the Token when starting Py4j uses the Commons Lang's RandomStringUtils.
Users are recommended to upgrade to version 1.6.0, which fixes this issue.

Credit:

Hen (reporter)
Pj fanning  (reporter)

References:

https://linkis.apache.org
https://www.cve.org/CVERecord?id=CVE-2024-39928

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.