Skip to content

Conversation

simei2k
Copy link

@simei2k simei2k commented May 10, 2025

Description:
This PR addresses a critical security vulnerability in the deserialize method by properly implementing a secure deserialization pattern.

The original implementation used a standard ObjectInputStream without proper validation, which is susceptible to deserialization attacks. These attacks could potentially lead to remote code execution by deserializing malicious objects.

This vulnerability was originally found in apache/hadoop@5e2f433 corresponding to CVE-2022-25168 and fixed.

References:

  1. apache/hadoop@5e2f433
  2. https://nvd.nist.gov/vuln/detail/cve-2022-25168

Description:
This PR addresses a critical security vulnerability in the deserialize method by properly implementing a secure deserialization pattern.

The original implementation used a standard ObjectInputStream without proper validation, which is susceptible to deserialization attacks. These attacks could potentially lead to remote code execution by deserializing malicious objects.

This vulnerability was originally found in apache/hadoop@5e2f433 corresponding to CVE-2022-25168 and fixed.

References:
1. apache/hadoop@5e2f433
2. https://nvd.nist.gov/vuln/detail/cve-2022-25168
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant