PLEASE REMOVE ME FROM MAILING LIST

2022-08-30 Thread SUSAN WEISSMAN

RE: Request JIRA Ticket Assgin Permission

2022-08-30 Thread Weijie Xu M
Hi Dan, It works for me, and thank you for the info! BRs/Xu Weijie -Original Message- From: Dan Smith Sent: Wednesday, August 31, 2022 2:29 AM To: dev@geode.apache.org Subject: Re: Request JIRA Ticket Assgin Permission Hi Xu Weijie, I gave you permission in JIRA, you should be able

Re: Request JIRA Ticket Assgin Permission

2022-08-30 Thread Dan Smith
Hi Xu Weijie, I gave you permission in JIRA, you should be able to assign that issue to yourself now. If you haven't already seen it, here is our wiki page with some helpful information about how to contribute - https://cwiki.apache.org/confluence/display/GEODE/How+to+Contribute. Thank you! -

CVE-2022-37023: Apache Geode deserialization of untrusted data flaw when using REST API on Java 8 or Java 11

2022-08-30 Thread Kirk Lund
Severity: high - possible RCE Description: Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data flaw when using REST API on Java 8 or Java 11. Any user wishing to protect against deserialization attacks involving REST APIs should upgrade to Apache Geode 1

CVE-2022-37022: Apache Geode deserialization of untrusted data flaw when using JMX over RMI on Java 11

2022-08-30 Thread Kirk Lund
Severity: high - possible RCE Description: Apache Geode versions up to 1.12.2 and 1.13.2 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 11. Any user wishing to protect against deserialization attacks involving JMX or RMI should upgrade to Apache Geod

CVE-2022-37021: Apache Geode deserialization of untrusted data flaw when using JMX over RMI on Java 8.

2022-08-30 Thread Kirk Lund
Severity: high - possible RCE Description: Apache Geode versions up to 1.12.5, 1.13.4 and 1.14.0 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 8. Any user still on Java 8 who wishes to protect against deserialization attacks involving JMX or RMI sh