Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cx6f651376-312a @ Maven-mysql:mysql-connector-java-5.1.18 #244

Closed
alex-ko-dev opened this issue Jul 24, 2023 · 0 comments
Closed

Cx6f651376-312a @ Maven-mysql:mysql-connector-java-5.1.18 #244

alex-ko-dev opened this issue Jul 24, 2023 · 0 comments

Comments

@alex-ko-dev
Copy link

alex-ko-dev commented Jul 24, 2023

Vulnerable Package issue exists @ Maven-mysql:mysql-connector-java-5.1.18 in branch sha-shes/and/da_shes

MySQL Connector/J before version 5.1.44 and 6.x is vulnerable to memory leak. When using cached server-side prepared statements, a memory leak occurred as references to opened statements were being kept while the statements were being decached; it happened when either the close() method has been called twice on a statement, or when there were conflicting cache entries for a statement and the older entry had not been closed and removed from the opened statement list.

Namespace: alexey-ast-test-1-org
Repository: alexey-ast-test-1-repo
Repository Url: https://github.com/alexey-ast-test-1-org/alexey-ast-test-1-repo
CxAST-Project: alexey-ast-test-1-org/alexey-ast-test-1-repo
CxAST platform scan: 62ca22b8-0ce6-43fb-9a3e-1123a66c2a22
Branch: sha-shes/and/da_shes
Application: alexey-ast-test-1-repo
Severity: HIGH
State: TO_VERIFY
Status: RECURRENT
CWE: CWE-401


Additional Info
Attack vector: NETWORK
Attack complexity: LOW
Confidentiality impact: NONE
Availability impact: HIGH
Remediation Upgrade Recommendation: 8.0.28


References
Issue
Pull request
Commit
Release Note

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant