Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

(2.6) Backport all CVE fixes up to CVE-2021-20190 #3087

Merged
merged 1 commit into from
Mar 23, 2021

Conversation

millems
Copy link

@millems millems commented Mar 23, 2021

Motivation: Jackson-2.6 is still widely used, despite being deprecated (including in the AWS SDK for Java 1.11.x). Until those consumers can migrate to a supported version of Jackson-2.6, this patch will protect those customers from the CVEs currently open against 2.6.7.4.

We're not asking that these changes be released, because we understand that it takes time and effort. Regardless, we wanted to offer these changes upstream.

A similar change was made as part of 2.6.7.4 with similar motivation: #2864

@cowtowncoder
Copy link
Member

Sounds reasonable, thank you again!

@cowtowncoder cowtowncoder merged commit 2118e71 into FasterXML:2.6 Mar 23, 2021
@lowchinwei
Copy link

Thank you guys for porting the CVEs. May I know the release date of 2.6.7.5?

@cowtowncoder
Copy link
Member

There are no current plans for further 2.6.7.x micro-patch releases. AWS SDK Java client is finally upgrading to Jackson 2.12 which should drastically remove the need.

@millems millems deleted the 2.6 branch June 10, 2021 16:49
@lowchinwei
Copy link

I checked the https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.6.7.x and did not see CVE-2018-7489 in the list. I want to confirm that has been ported to any 2.6.7.x release because the respective ticket #1931 has been closed.

@cowtowncoder
Copy link
Member

@lowchinwei Feel free to check in commits to 2.6 branch to confirm. It is possible that @millems did merge patch for that: Wiki would only contain information on released fixes. As to #1931 closure: that just means that a fix had been committed to a branch; not that it had been released in any particular branch (although I do try to add notes to issues to indicate that part too -- however, issue closing is not synchronized with version releases).

@lowchinwei
Copy link

I checked the following code change in the commit for 2.6.7.4 74aba40
It says deprecated by [databind#1931], does that means this is the fix related to #1931?

// s.add("com.mchange.v2.c3p0.JndiRefForwardingDataSource"); // deprecated by [databind#1931] // s.add("com.mchange.v2.c3p0.WrapperConnectionPoolDataSource"); // - "" -

@cowtowncoder
Copy link
Member

Looks like change for 1931:

6799f8f

did refactor things. 2.6 does not have SubTypeValidator added in 2.7 so effect of commenting out is not quite equivalent (in change, check for various C3P0 types was made more flexible and move in SubTypeValidator, out of static list of class names to match against).

Given this it is likely that CVE-2018-7489 is not fixed by any 2.6.x version.

@lowchinwei
Copy link

Thanks. So, the proper fix for 2.6 should be checking of C3P0 classes (#1931) and SPRING classes (#1855) in the checkIllegalTypes method of BeanDeserializerFactory class.

@cowtowncoder
Copy link
Member

Correct.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants