Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

In which release is CVE 2017-15095 fixed? #1847

Closed
appDeveloper888 opened this issue Nov 30, 2017 · 9 comments
Closed

In which release is CVE 2017-15095 fixed? #1847

appDeveloper888 opened this issue Nov 30, 2017 · 9 comments

Comments

@appDeveloper888
Copy link

Hi all,

in which release is CVE 2017-15095 fixed?

best regards

@cowtowncoder
Copy link
Member

Please do not re-file same issue: I already answered #1837.

@appDeveloper888
Copy link
Author

appDeveloper888 commented Nov 30, 2017 via email

@cowtowncoder
Copy link
Member

Ok I have no idea then. If you have a link to vulnerability could you add it?
I am typically not reported these vulnerabilities for some reason or another and only hear when someone points them. Not sure that's the way these should go; probably not.

@cowtowncoder
Copy link
Member

Googling produced hits, but no good explanation other than suggestion black list is incomplete:

https://access.redhat.com/security/cve/cve-2017-15095

This could possibly refer to #1737 (included in 2.8.10 / 2.9.1) which adds last known potentially concerning cases. If there are other types to include they have not been reported to the project yet.

@cowtowncoder
Copy link
Member

Ok. Yes, looks like #1737 is the main thing matching CVE-2017-15095.
Red Hat's bug tracker refers to 2 other issues which are sort of related:

So the answer here is that fix is in

  • 2.8.10
  • 2.9.1

@DKumars
Copy link

DKumars commented Jan 31, 2018

Hi ,

Is this CVE 2017-15095 vulnerabilty fixed in 2.6.7.1 version ? Please confirm because we are using 2.6.1 version . if we move 2.8.10 then it gives us lot of dependency change in scala_module_2_11. Please confirm can we use 2.6.7.1 for this fix ?

@cowtowncoder
Copy link
Member

@DKumars No. You need to upgrade to a newer version, 2.8.10 or 2.9.1

@marpereira
Copy link

Hello,

I'm facing the same issue as @DKumars. Are you guys still land these CVE fixes for 2.6.7.X?

Thanks,

@cowtowncoder
Copy link
Member

@marpereira No. There was one last micro-patch for 2.6, 2.6.7.3 (and 2.7.9.7, 2.8.11.6), but no new micro-patches planned for anything earlier than 2.9, nor are fixes being merged.

There will be 2.9.10.4 release, but once 2.11.0 is released, 2.9 is likely closed as well.
It is a big waste of time to maintain blocklist of classes since security researchers are now collecting these to get credit for CVE submissions, and with propagation of potentially vulnerable Factory types across tens of thousands of publicly available Java jars, there is boundless source material to find them from. In practice newer findings are for more obscure dependencies, less likely to be exploitable by attackers (since they need to know set up of classpath of target system).

2.10 is not considered vulnerable to this class of CVEs; and 2.11 will add more convenience features to allow safe(r) polymorphic deserialization. So at this point it is worth seriously considering upgrade, to avoid having to upgrade Jackson dependency regularly.
Or, alternatively, if there are companies with enough money to make it worth it, figure out support contracts for work to provide additional backporting for block lists.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants