{"schema_version":"1.7.2","id":"OESA-2026-1691","modified":"2026-03-20T14:25:37Z","published":"2026-03-20T14:25:37Z","upstream":["CVE-2026-27830"],"summary":"c3p0 security update","details":"c3p0 is a JDBC driver for extending traditional libraries (DriverManager-based libraries) with JNDI bindable data sources (including data sources), as described in the jdbc3 specification and jdbc2 standard extensions. They implement connections and statement pools.\r\n\r\nSecurity Fix(es):\n\nc3p0 is a JDBC connection pooling library. Prior to version 0.12.0, several `ConnectionPoolDataSource` implementations had a property called `userOverridesAsString`, which conceptually represents a `Map&lt;String,Map&lt;String,String&gt;&gt;` but was maintained as a hex-encoded Java serialized object. An attacker able to reset this property on an existing `ConnectionPoolDataSource`, or via maliciously crafted Java-serialized objects and `javax.naming.Reference` instances, could trigger deserialization. Combined with vulnerabilities in its main dependency, mchange-commons-java, which includes code mirroring early JNDI implementations with ungated support for remote `factoryClassLocation` values, attackers could set c3p0&apos;s `userOverridesAsString` to hex-encoded serialized objects that include objects &quot;indirectly serialized&quot; via JNDI references. Deserialization of those objects and dereferencing of the embedded `javax.naming.Reference` objects could provoke the download and execution of malicious code from a remote `factoryClassLocation`, leading to arbitrary code execution on the application&apos;s `CLASSPATH`.(CVE-2026-27830)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP1","name":"c3p0","purl":"pkg:rpm/openEuler/c3p0&distro=openEuler-24.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.5.4-4.oe2403sp1"}]}],"ecosystem_specific":{"noarch":["c3p0-0.9.5.4-4.oe2403sp1.noarch.rpm","c3p0-help-0.9.5.4-4.oe2403sp1.noarch.rpm"],"src":["c3p0-0.9.5.4-4.oe2403sp1.src.rpm"]}},{"package":{"ecosystem":"openEuler:24.03-LTS-SP2","name":"c3p0","purl":"pkg:rpm/openEuler/c3p0&distro=openEuler-24.03-LTS-SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.5.4-4.oe2403sp2"}]}],"ecosystem_specific":{"noarch":["c3p0-0.9.5.4-4.oe2403sp2.noarch.rpm","c3p0-help-0.9.5.4-4.oe2403sp2.noarch.rpm"],"src":["c3p0-0.9.5.4-4.oe2403sp2.src.rpm"]}},{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"c3p0","purl":"pkg:rpm/openEuler/c3p0&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.5.4-4.oe2403sp3"}]}],"ecosystem_specific":{"noarch":["c3p0-0.9.5.4-4.oe2403sp3.noarch.rpm","c3p0-help-0.9.5.4-4.oe2403sp3.noarch.rpm"],"src":["c3p0-0.9.5.4-4.oe2403sp3.src.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"c3p0","purl":"pkg:rpm/openEuler/c3p0&distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.5.4-4.oe2003sp4"}]}],"ecosystem_specific":{"noarch":["c3p0-0.9.5.4-4.oe2003sp4.noarch.rpm","c3p0-help-0.9.5.4-4.oe2003sp4.noarch.rpm"],"src":["c3p0-0.9.5.4-4.oe2003sp4.src.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"c3p0","purl":"pkg:rpm/openEuler/c3p0&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.5.4-4.oe2203sp4"}]}],"ecosystem_specific":{"noarch":["c3p0-0.9.5.4-4.oe2203sp4.noarch.rpm","c3p0-help-0.9.5.4-4.oe2203sp4.noarch.rpm"],"src":["c3p0-0.9.5.4-4.oe2203sp4.src.rpm"]}},{"package":{"ecosystem":"openEuler:24.03-LTS","name":"c3p0","purl":"pkg:rpm/openEuler/c3p0&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.5.4-4.oe2403"}]}],"ecosystem_specific":{"noarch":["c3p0-0.9.5.4-4.oe2403sp1.noarch.rpm","c3p0-help-0.9.5.4-4.oe2403sp1.noarch.rpm","c3p0-0.9.5.4-4.oe2403sp2.noarch.rpm","c3p0-help-0.9.5.4-4.oe2403sp2.noarch.rpm","c3p0-0.9.5.4-4.oe2403sp3.noarch.rpm","c3p0-help-0.9.5.4-4.oe2403sp3.noarch.rpm","c3p0-0.9.5.4-4.oe2403.noarch.rpm","c3p0-help-0.9.5.4-4.oe2403.noarch.rpm"],"src":["c3p0-0.9.5.4-4.oe2403sp1.src.rpm","c3p0-0.9.5.4-4.oe2403sp2.src.rpm","c3p0-0.9.5.4-4.oe2403sp3.src.rpm","c3p0-0.9.5.4-4.oe2403.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1691"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27830"}],"database_specific":{"severity":"High"}}
