Apache Derby security function Bypass Vulnerability and Denial of Service Vulnerability
Released on: 2014-09-04
Updated on: 2014-09-05
Affected Systems:
Apache Group Derby <10.11.1.1
Description:
--------------------------------------------------------------------------------
Apache Derby is an open source relational database Java implementation.
Apache Derby versions earlier than 10.11.1.1 do not have proper permissions when processing certain SQL statements, which triggers a null pointer exception and causes a crash. When processing SELECT and update SQL statements, the authorization is not correctly checked, this can cause information leakage.
<* Source: vendor
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Apache Group
------------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://db.apache.org/derby/releases/release-10.11.1.1.cgi
Detailed descriptions of Hadoop cluster, hive, and Derby installation and deployment
Experience Java-only database-Derby
[Recommended] expert bargaining skills for optimizing Derby Databases
Configure Hive to use the embedded Derby or customer service mode Derby Method
ERROR 42Y07 when using the Derby database for the first connection
Derby details: click here
Derby: click here
This article permanently updates the link address: