Skip to content

(2.6) Backport all CVE fixes up to CVE-2021-20190#3087

Merged
cowtowncoder merged 1 commit intoFasterXML:2.6from
millems:2.6
Mar 23, 2021
Merged

(2.6) Backport all CVE fixes up to CVE-2021-20190#3087
cowtowncoder merged 1 commit intoFasterXML:2.6from
millems:2.6

Conversation

@millems
Copy link
Contributor

@millems millems commented Mar 23, 2021

Motivation: Jackson-2.6 is still widely used, despite being deprecated (including in the AWS SDK for Java 1.11.x). Until those consumers can migrate to a supported version of Jackson-2.6, this patch will protect those customers from the CVEs currently open against 2.6.7.4.

We're not asking that these changes be released, because we understand that it takes time and effort. Regardless, we wanted to offer these changes upstream.

A similar change was made as part of 2.6.7.4 with similar motivation: #2864

@cowtowncoder
Copy link
Member

Sounds reasonable, thank you again!

@cowtowncoder cowtowncoder merged commit 2118e71 into FasterXML:2.6 Mar 23, 2021
@lowchinwei
Copy link

Thank you guys for porting the CVEs. May I know the release date of 2.6.7.5?

@cowtowncoder
Copy link
Member

There are no current plans for further 2.6.7.x micro-patch releases. AWS SDK Java client is finally upgrading to Jackson 2.12 which should drastically remove the need.

@millems millems deleted the 2.6 branch June 10, 2021 16:49
@lowchinwei
Copy link

I checked the https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.6.7.x and did not see CVE-2018-7489 in the list. I want to confirm that has been ported to any 2.6.7.x release because the respective ticket #1931 has been closed.

@cowtowncoder
Copy link
Member

@lowchinwei Feel free to check in commits to 2.6 branch to confirm. It is possible that @millems did merge patch for that: Wiki would only contain information on released fixes. As to #1931 closure: that just means that a fix had been committed to a branch; not that it had been released in any particular branch (although I do try to add notes to issues to indicate that part too -- however, issue closing is not synchronized with version releases).

@lowchinwei
Copy link

I checked the following code change in the commit for 2.6.7.4 74aba40
It says deprecated by [databind#1931], does that means this is the fix related to #1931?

// s.add("com.mchange.v2.c3p0.JndiRefForwardingDataSource"); // deprecated by [databind#1931] // s.add("com.mchange.v2.c3p0.WrapperConnectionPoolDataSource"); // - "" -

@cowtowncoder
Copy link
Member

Looks like change for 1931:

6799f8f

did refactor things. 2.6 does not have SubTypeValidator added in 2.7 so effect of commenting out is not quite equivalent (in change, check for various C3P0 types was made more flexible and move in SubTypeValidator, out of static list of class names to match against).

Given this it is likely that CVE-2018-7489 is not fixed by any 2.6.x version.

@lowchinwei
Copy link

Thanks. So, the proper fix for 2.6 should be checking of C3P0 classes (#1931) and SPRING classes (#1855) in the checkIllegalTypes method of BeanDeserializerFactory class.

@cowtowncoder
Copy link
Member

Correct.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants