[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE-2022-37021: Apache Geode deserialization of untrusted data flaw when using JMX ov
From:       Kirk Lund <klund () apache ! org>
Date:       2022-08-30 16:40:52
Message-ID: fc373d19-9e46-80b5-fc19-c9aeed275c91 () apache ! org
[Download RAW message or body]

Severity: high - possible RCE

Description:

Apache Geode versions up to 1.12.5, 1.13.4 and 1.14.0 are vulnerable to a \
deserialization of untrusted data flaw when using JMX over RMI on Java 8. 

Any user still on Java 8 who wishes to protect against deserialization attacks \
involving JMX or RMI should upgrade to Apache Geode 1.15 and Java 11. 

If upgrading to Java 11 is not possible, then upgrade to Apache Geode 1.15 and \
specify "--J=-Dgeode.enableGlobalSerialFilter=true" when starting any Locators or \
Servers. Follow the documentation for details on specifying any user classes that may \
be serialized/deserialized with the "serializable-object-filter" configuration \
option. Using a global serial filter will impact performance.

This issue is being tracked as GEODE-9758

Mitigation:

Disable affected services such as JMX over RMI unless they are required. JMX over RMI \
can be disabled by setting Geode property `jmx-manager` to false; this property \
defaults to false on Servers and true on Locators. 


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic