You are viewing a plain text version of this content. The canonical link for it is here.
Posted to jira@kafka.apache.org by "ilatypov (via GitHub)" <gi...@apache.org> on 2023/03/22 14:47:15 UTC

[GitHub] [kafka] ilatypov commented on pull request #3563: Added safe deserialization impl

ilatypov commented on PR #3563:
URL: https://github.com/apache/kafka/pull/3563#issuecomment-1479703703

   Blacklisting is a poor defense against known and unknown abuses of class constructors.  I apologize for criticizing without offering a better fix.  I see newer JDKs come with a programmatic object input filter configuration, as well as with a run-time java.security configuration, both of which were requested by JEP 290.
   
   https://docs.oracle.com/javase/10/core/serialization-filtering1.htm
   
   Is it possible to have a sensible white list in Kafka?  I know very little about it, sorry.
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: jira-unsubscribe@kafka.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org