Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.7.0 through 1.11.0, the attackers can bypass using malicious parameters. Users are advised to upgrade to Apache InLong's 1.12.0 or cherry-pick [1], [2] to solve it. [1] https://github.com/apache/inlong/pull/9694 [2] https://github.com/apache/inlong/pull/9707
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://lists.apache.org/thread/d2hndtvh6bll4pkl91o2oqxyynhr54k3 | vendor advisory mailing list |
https://github.com/advisories/GHSA-fgh3-pwmp-3qw3 | vendor advisory |
http://www.openwall.com/lists/oss-security/2024/05/09/2 | mailing list |