{"id":"MGASA-2017-0311","summary":"Updated groovy and groovy18 packages fix security vulnerability","details":"It was found that a flaw in Apache groovy library allows remote code\nexecution wherever deserialization occurs in the application. It is\npossible for an attacker to craft a special serialized object that will\nexecute code directly when deserialized. All applications which rely on\nserialization and do not isolate the code which deserializes objects are\nsubject to this vulnerability (CVE-2016-6814).\n","modified":"2026-04-16T01:48:10.785336862Z","published":"2017-08-26T20:35:31Z","upstream":["CVE-2016-6814"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0311.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=20121"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/GLUK73YU2ETK7USTPIIC4YQT3BYKGEOB/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/A5FSJEOEIYPZDGJRMEPJPMUMDN4MQQJI/"}],"affected":[{"package":{"name":"groovy","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/groovy?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.9-5.2.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0311.json"}},{"package":{"name":"groovy18","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/groovy18?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.9-26.1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0311.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}