You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@kylin.apache.org by "peng.jianhua (JIRA)" <ji...@apache.org> on 2018/01/01 16:09:00 UTC
[jira] [Updated] (KYLIN-3027) Upgrade Jackson version
[ https://issues.apache.org/jira/browse/KYLIN-3027?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
peng.jianhua updated KYLIN-3027:
--------------------------------
Sprint: Sprint 52
> Upgrade Jackson version
> -----------------------
>
> Key: KYLIN-3027
> URL: https://issues.apache.org/jira/browse/KYLIN-3027
> Project: Kylin
> Issue Type: Bug
> Reporter: peng.jianhua
> Assignee: peng.jianhua
>
> *【Security Vulnerability Alert】 Jackson-databind deserialization vulnerability*
> CVE ID:
> {code}
> CVE-2017-7525
> CVE-2017-15095
> {code}
> Description
> {code}
> CVE-2017-7525 is prone to a remote-code execution vulnerability.
> Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the affected application. Failed exploits will result in denial-of-service conditions.
> CVE-2017-15095 describes more deserialization exploits for jackson-databind as a follow-up to CVE-2017-7525
> {code}
> Scope
> {code}
> Jackson version <= 2.9.2
> {code}
> Solution
> {code}
> Jackson official is about to release a new version to solve the problem
> {code}
> Reference
> {code}
> https://github.com/FasterXML/jackson-databind/releases
> http://www.openwall.com/lists/oss-security/2017/11/02/3
> {code}
--
This message was sent by Atlassian JIRA
(v6.4.14#64029)