This is an automated email from the ASF dual-hosted git repository.

jleroux pushed a commit to branch trunk
in repository https://gitbox.apache.org/repos/asf/ofbiz-framework.git


The following commit(s) were added to refs/heads/trunk by this push:
     new cf77291  Improved: Prevent possible DOS attack done using Java 
deserialisation (OFBIZ-12592)
cf77291 is described below

commit cf7729157aace5c69a05eebc949aa8018ca2879b
Author: Jacques Le Roux <jacques.le.r...@les7arts.com>
AuthorDate: Mon Mar 28 12:32:40 2022 +0200

    Improved: Prevent possible DOS attack done using Java deserialisation 
(OFBIZ-12592)
    
    Qing Xu, a security reporter, alerted us that, despite no current 
vulnerability,
    it could be maybe possible to do DOS attacks using Java deserialisation.
    
    That has been fixed with https://openjdk.java.net/jeps/290 and even 
implemented
    in Java 8, but it needs a little effort on our side, here it is.
    
    There is no real bug, to this is an improvement but a security improvement 
so it
    will be backported
    
    Thanks: Qing Xu for report
---
 gradle.properties | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/gradle.properties b/gradle.properties
index aa75f91..39ea90a 100644
--- a/gradle.properties
+++ b/gradle.properties
@@ -18,6 +18,8 @@
 ###############################################################################
 
 org.gradle.console=plain
-# If you experience heap memory problems during the Gradle build, for example 
+# If you experience heap memory problems during the Gradle build, for example
 # building with integrated plugins, the following setting might help
 #org.gradle.jvmargs=-Xms128m -Xmx1024m -XX:+CMSClassUnloadingEnabled
+# This is for "Prevent possible DOS attack done using Java deserialisation" 
(OFBIZ-12592)
+-Djdk.serialFilter=maxarray=100000;maxdepth=20;maxrefs=500;maxbytes=500000

Reply via email to