timus1 created IGNITE-20756:
-------------------------------

             Summary: Partially unresolved OOM issue in thin client protocol 
handler caused by malicious or garbage data.
                 Key: IGNITE-20756
                 URL: https://issues.apache.org/jira/browse/IGNITE-20756
             Project: Ignite
          Issue Type: Bug
          Components: thin client
    Affects Versions: 2.15
            Reporter: timus1


I understand that Issue Ignite-15921 is fixed in the 2.13 and above version of 
Ignite. I use the ignite-core 2.15 library in software, I do security scan 
software and dependent libraries through Nexus IQ. Nexus IQ report 
(sonatype-2021-4292) suggests that the fix in the ignite-core 2.15 via the 
above issue is partly fixed and does not address all the vulnerable code. They 
provided an advice deviation notice for ignite-core: 2.15.0, which I pasted 
below. I want to confirm if the ignite community agrees with this finding for 
the 2.15 version. If yes, Could you please consider addressing this 
vulnerability?

 

Advisories
Project[https://github.com/apache/ignite/pull/9610]
Projecthttps://issues.apache.org/jira/browse/IGNITE-15921
 
 
_Advisory Deviation Notice from Nexus IQ report:_ The Sonatype security 
research team discovered that the {{{}read(){}}}method in the 
{{GridNioServerBuffer}} class, also has the vulnerable portion of code in it 
and was not taken into account in the fix (IGNITE-15921).



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to