On Wed, Oct 16, 2019 at 12:12 PM Fabrice Bacchella <
fabrice.bacchella(a)icloud.com> wrote:
When I launch ovirt 4.3.6, I see in the command line of the
ovirt-engine:
-Djackson.deserialization.whitelist.packages=org,com,java,javax
That whitelist almost everything. Isn't that dangerous ?
There is no other easy way how to do that, because we are using huge number
of classes, which can be serialized into JSON. This was breaking backward
compatibility way how CVE for jackson was fixed, but oVirt is not affected
by this CVE, because we use jackson directly only when storing data in
database or for internal engine - VDSM communication. So unless you have an
attacker being able to tamper data in your database or an attacker in
internal network, who is able to masquerade as proper host and return
problematic JSON back to engine, you are not affected.
When I read this:
https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-...
I think the white list should be as small as possible.
_______________________________________________
Users mailing list -- users(a)ovirt.org
To unsubscribe send an email to users-leave(a)ovirt.org
Privacy Statement:
https://www.ovirt.org/site/privacy-policy/
oVirt Code of Conduct:
https://www.ovirt.org/community/about/community-guidelines/
List Archives:
https://lists.ovirt.org/archives/list/users@ovirt.org/message/GZODZPENEN2...
--
Martin Perina
Manager, Software Engineering
Red Hat Czech s.r.o.