This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsaid="201610-01">
<title>Groovy: Arbitrary code execution</title>
<synopsis>Groovy is vulnerable to a remote execution of arbitrary code when
java serialization is used.
</synopsis>
<producttype="ebuild">groovy</product>
<announced>2016-10-06</announced>
<revisedcount="1">2016-10-06</revised>
<bug>555470</bug>
<access>remote</access>
<affected>
<packagename="dev-java/groovy"auto="yes"arch="*">
<unaffectedrange="ge">2.4.5</unaffected>
<vulnerablerange="lt">2.4.5</vulnerable>
</package>
</affected>
<background>
<p>A multi-faceted language for the Java platform</p>
</background>
<description>
<p>Groovy’s MethodClosure class, in runtime/MethodClosure.java, is
vulnerable to a crafted serialized object.
</p>
</description>
<impacttype="normal">
<p>Remote attackers could potentially execute arbitrary code, or cause
Denial of Service condition
</p>
</impact>
<workaround>
<p>A workaround exists by using a custom security policy file utilizing the
standard Java security manager, or do not rely on serialization to
communicate remotely.
</p>
</workaround>
<resolution>
<p>All Groovy users should upgrade to the latest version:</p>