Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
{
"schema_version": "1.4.0",
"id": "GHSA-vr64-r9qj-h27f",
"modified": "2024-03-01T16:56:52Z",
"modified": "2024-03-01T16:56:53Z",
"published": "2024-02-29T03:33:18Z",
"aliases": [
"CVE-2024-22871"
],
"summary": "Clojure Denial of Service vulnerability",
"details": "An issue in Clojure versions 1.2.0 to 1.12.0-alpha5 allows an attacker to cause a denial of service (DoS) via the `clojure.core$partial$fn__5920` function.",
"summary": "Reading specially crafted serializable objects from an untrusted source may cause an infinite loop and denial of service",
"details": "Any program on the JVM may read serialized objects via [java.io.ObjectInputStream.readObject()](https://docs.oracle.com/javase/8/docs/api/java/io/ObjectInputStream.html#readObject--). Reading serialized objects from an untrusted source is **inherently unsafe** (this affects any program running on any version of the JVM) and is a prerequisite for this vulnerability.\n\nClojure classes that represent infinite seqs (Cycle, infinite Repeat, and Iterate) do not define hashCode() and use the parent ASeq.hashCode(), which walks the seq to compute the hash, yielding an infinite loop. Classes like java.util.HashMap call hashCode() on keys during deserialization of a serialized map. \n\nThe exploit requires:\n\n1. Crafting a serialized HashMap object with an infinite seq object as a key.\n2. Sending that to a program that reads serialized objects via ObjectInputStream.readObject().\n\nThis will cause the program to enter an infinite loop on the reading thread and thus a denial of service (DoS).\n\nThe affected Clojure classes (Cycle, Repeat, Iterate) exist in Clojure 1.2.0-1.12.0-alpha8.",
"severity": [

],
Expand All @@ -25,7 +25,7 @@
"introduced": "1.2.0"
},
{
"last_affected": "1.12.0-alpha5"
"last_affected": "1.12.0-alpha8"
}
]
}
Expand All @@ -37,6 +37,10 @@
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22871"
},
{
"type": "WEB",
"url": "https://clojure.atlassian.net/browse/CLJ-2839"
},
{
"type": "PACKAGE",
"url": "https://github.com/clojure/clojure"
Expand Down