You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@seatunnel.apache.org by GitBox <gi...@apache.org> on 2022/04/25 03:29:55 UTC
[GitHub] [incubator-seatunnel] wuchunfu opened a new issue, #1736: [Bug][fastjson] Upgrade fastjson, fix deserialization remote code execution vulnerability
wuchunfu opened a new issue, #1736:
URL: https://github.com/apache/incubator-seatunnel/issues/1736
### Search before asking
- [X] I had searched in the [feature](https://github.com/apache/incubator-seatunnel/issues?q=is%3Aissue+label%3A%22Feature%22) and found no similar feature requirement.
### Description
Upgrade fastjson, fix deserialization remote code execution vulnerability
### Usage Scenario
_No response_
### Related issues
_No response_
### Are you willing to submit a PR?
- [X] Yes I am willing to submit a PR!
### Code of Conduct
- [X] I agree to follow this project's [Code of Conduct](https://www.apache.org/foundation/policies/conduct)
--
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
To unsubscribe, e-mail: commits-unsubscribe@seatunnel.apache.org.apache.org
For queries about this service, please contact Infrastructure at:
users@infra.apache.org
[GitHub] [incubator-seatunnel] ruanwenjun closed issue #1736: [Bug][fastjson] Upgrade fastjson, fix deserialization remote code execution vulnerability
Posted by GitBox <gi...@apache.org>.
ruanwenjun closed issue #1736: [Bug][fastjson] Upgrade fastjson, fix deserialization remote code execution vulnerability
URL: https://github.com/apache/incubator-seatunnel/issues/1736
--
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
To unsubscribe, e-mail: commits-unsubscribe@seatunnel.apache.org
For queries about this service, please contact Infrastructure at:
users@infra.apache.org