CVE-2011-2894

Priority
Description
Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5
and 2.0.0 through 2.0.6, and possibly other versions deserialize objects
from untrusted sources, which allows remote attackers to bypass intended
security restrictions and execute untrusted code by (1) serializing a
java.lang.Proxy instance and using InvocationHandler, or (2) accessing
internal AOP interfaces, as demonstrated using deserialization of a
DefaultListableBeanFactory instance to execute arbitrary commands via the
java.lang.Runtime class.
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 18.10 (Cosmic Cuttlefish):needed
Ubuntu 19.04 (Disco Dingo):needed
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Ubuntu 19.04 (Disco Dingo):DNE
More Information

Updated: 2019-01-14 21:14:27 UTC (commit 51f9b73af244ba86b9321e46e526586c25a8e060)