-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Block one more gadget type (logback, CVE-2019-12384) #2334
Comments
Excuse me, may I ask when will this issue be solved? |
I hope to have to work on this (and perhaps the other CVE to file) later this week. |
Fixed in |
ok, thank you very much. By the way, when will the patch 2.9.9.1 be released? we need this urgently. |
I'll be going on vacation later today, back on July 1st, so at earliest in early July (but possibly mid-July, depending on if it'll be 2.9.10 or 2.9.9.1). |
Release 2.9.9.1 in-progress. |
@cowtowncoder Are you planning on releasing a 2.9.9.1 for the |
Updated jackson version to 2.9.9.1 for following CVE issues: CVE-2019-12814: FasterXML/jackson-databind#2341 CVE-2019-12384: FasterXML/jackson-databind#2334
@jebeaudet I am bit on fence on that -- if you would find it useful, please file an issue and I can create one? |
Excuse me, may I ask when will jackson 2.9.10 be released? |
…nerabilities FasterXML/jackson-databind#2326: Block class for CVE-2019-12086 FasterXML/jackson-databind#2334: Block class for CVE-2019-12384 FasterXML/jackson-databind#2341: Block class for CVE-2019-12814 FasterXML/jackson-databind#2387: Block class for CVE-2019-14379 FasterXML/jackson-databind#2389: Block class for CVE-2019-14439
A new gadget type (see https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062) was reported, and CVE id allocated was
CVE-2019-12384
.CVE description is available at: https://nvd.nist.gov/vuln/detail/CVE-2019-12384 for full details, but the specific variation (in addition to needing "default typing", attacker being able to craft specific json message) is that:
logback-classic
in its classpathvulnerability applies.
Fixed in:
The text was updated successfully, but these errors were encountered: