You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@tinkerpop.apache.org by "Robert Dale (JIRA)" <ji...@apache.org> on 2018/09/19 12:48:00 UTC

[jira] [Updated] (TINKERPOP-2032) Update jython-standalone

     [ https://issues.apache.org/jira/browse/TINKERPOP-2032?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Robert Dale updated TINKERPOP-2032:
-----------------------------------
    Fix Version/s: 3.2.10
                   3.3.4
                   3.4.0

> Update jython-standalone
> ------------------------
>
>                 Key: TINKERPOP-2032
>                 URL: https://issues.apache.org/jira/browse/TINKERPOP-2032
>             Project: TinkerPop
>          Issue Type: Bug
>          Components: python
>    Affects Versions: 3.3.3, 3.2.9
>            Reporter: Robert Dale
>            Assignee: Robert Dale
>            Priority: Major
>             Fix For: 3.4.0, 3.3.4, 3.2.10
>
>
> [https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451]
> Overview
>  org.python:jython-standalone Affected versions of this package are vulnerable to Arbitrary Code Execution by sending a serialized function to the deserializer, which in turn will execute the code.
> References
> [ CVE|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4000]
>  [Jython Bug Report|http://bugs.jython.org/issue2454]
> [ Fix Commit|https://hg.python.org/jython/rev/d06e29d100c0]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)