Ausführen beliebiger Kommandos in openjpa
ID: | FEDORA-2013-12967 |
Distribution: | Fedora |
Plattformen: | Fedora 17 |
Datum: | Mo, 22. Juli 2013, 07:43 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1768 |
Applikationen: | openjpa |
Originalnachricht |
|
Name : openjpa Product : Fedora 17 Version : 2.2.0 Release : 3.fc17 URL : http://openjpa.apache.org/ Summary : Java Persistence 2.0 API Description : OpenJPA is Apache's implementation of Sun's Java Persistence 2.0 API (JSR-317 JPA 2.0) specification for the transparent persistence of Java objects. It is an object-relational mapping (ORM) solution for the Java language, which simplifies storing objects in databases. -------------------------------------------------------------------------------- Update Information: fix for CVE-2013-1768 rhbz#984034,984040. -------------------------------------------------------------------------------- References: [ 1 ] Bug #984034 - CVE-2013-1768 openjpa: Remote arbitrary code execution by creating a serialized object and leveraging improperly secured server programs https://bugzilla.redhat.com/show_bug.cgi?id=984034 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update openjpa' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce |