You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@zookeeper.apache.org by "Dominique Mongelli (Jira)" <ji...@apache.org> on 2022/02/09 10:24:00 UTC

[jira] [Commented] (ZOOKEEPER-4439) Upgrade zk vulnerabilities

    [ https://issues.apache.org/jira/browse/ZOOKEEPER-4439?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17489431#comment-17489431 ] 

Dominique Mongelli commented on ZOOKEEPER-4439:
-----------------------------------------------

Hi,

Regarding the vulnerability about jackson:
 *  here is the github issue on jackson repo: [https://github.com/FasterXML/jackson-databind/issues/3328.]
 * Snyk rates the vulnerability as 5.9: [https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698.]
 * the vulnerability is applicable only when using JDK serialization/deserialization of JsonNode.

as a first step, could you tell us if zookeeper is actually using this kind of serialization/deserialization ?

Thanks

> Upgrade zk vulnerabilities 
> ---------------------------
>
>                 Key: ZOOKEEPER-4439
>                 URL: https://issues.apache.org/jira/browse/ZOOKEEPER-4439
>             Project: ZooKeeper
>          Issue Type: Bug
>    Affects Versions: 3.6.3
>            Reporter: Shivakumar
>            Priority: Major
>              Labels: security
>
> |packages|Package Version|CVSS|Fix version|
> |jetty-server|9.4.39.v20210325|5.5|fixed in 9.4.44|
> |jetty-servlet|9.4.39.v20210325|5.5|fixed in 9.4.44|
> |org.eclipse.jetty_jetty-servlet|9.4.39.v20210325|5.5|fixed in 9.4.44|
> |com.fasterxml.jackson.core_jackson-databind|2.10.5.1|7.5|fixed in 2.14, 2.13.1, 2.12.6|
> |jetty-io. (CVE-2021-34429)|9.4.39.v20210325|5.3|fixed in 11.0.6, 10.0.6, 9.4.43|
> Our security scan detected the above vulnerabilities
> upgrade to correct versions for fixing vulnerabilities



--
This message was sent by Atlassian Jira
(v8.20.1#820001)