First published: Wed May 08 2024(Updated: )
Deserialization of Untrusted Data vulnerability in Apache InLong. This issue affects Apache InLong: from 1.7.0 through 1.11.0. The attackers can bypass using malicious parameters. Users are advised to upgrade to Apache InLong's 1.12.0 or cherry-pick [1], [2] to solve it. [1] https://github.com/apache/inlong/pull/9694 [2] https://github.com/apache/inlong/pull/9707
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.inlong:manager-pojo | >=1.7.0<1.12.0 | 1.12.0 |
Apache InLong | >=1.7.0<1.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26579 is classified as a high severity vulnerability due to its potential for exploitation through deserialization of untrusted data.
To fix CVE-2024-26579, upgrade to Apache InLong version 1.12.0 or cherry-pick specific commits that address the vulnerability.
Apache InLong versions from 1.7.0 to 1.11.0 are affected by CVE-2024-26579.
CVE-2024-26579 is a deserialization of untrusted data vulnerability.
Any user or organization utilizing Apache InLong versions 1.7.0 to 1.11.0 is impacted by CVE-2024-26579.