-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Block one more gadget type (logback, CVE-2019-12384) #2334
Comments
Excuse me, may I ask when will this issue be solved? |
I hope to have to work on this (and perhaps the other CVE to file) later this week. |
Fixed in |
ok, thank you very much. By the way, when will the patch 2.9.9.1 be released? we need this urgently. |
I'll be going on vacation later today, back on July 1st, so at earliest in early July (but possibly mid-July, depending on if it'll be 2.9.10 or 2.9.9.1). |
Release 2.9.9.1 in-progress. |
@cowtowncoder Are you planning on releasing a 2.9.9.1 for the |
Updated jackson version to 2.9.9.1 for following CVE issues: CVE-2019-12814: FasterXML/jackson-databind#2341 CVE-2019-12384: FasterXML/jackson-databind#2334
@jebeaudet I am bit on fence on that -- if you would find it useful, please file an issue and I can create one? |
Excuse me, may I ask when will jackson 2.9.10 be released? |
…nerabilities FasterXML/jackson-databind#2326: Block class for CVE-2019-12086 FasterXML/jackson-databind#2334: Block class for CVE-2019-12384 FasterXML/jackson-databind#2341: Block class for CVE-2019-12814 FasterXML/jackson-databind#2387: Block class for CVE-2019-14379 FasterXML/jackson-databind#2389: Block class for CVE-2019-14439
A new gadget type (see https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062) was reported, and CVE id allocated was
CVE-2019-12384
.CVE description is available at: https://nvd.nist.gov/vuln/detail/CVE-2019-12384 for full details, but the specific variation (in addition to needing "default typing", attacker being able to craft specific json message) is that:
logback-classic
in its classpathvulnerability applies.
Fixed in:
The text was updated successfully, but these errors were encountered: