Reading specially crafted serializable objects from an untrusted source may cause an infinite loop and denial of service
High severity
GitHub Reviewed
Published
Feb 29, 2024
to the GitHub Advisory Database
•
Updated Aug 13, 2024
Package
Affected versions
>= 1.7.0, < 1.11.2
>= 1.12.0-alpha1, < 1.12.0-alpha9
Patched versions
1.11.2
1.12.0-alpha9
Description
Published by the National Vulnerability Database
Feb 29, 2024
Published to the GitHub Advisory Database
Feb 29, 2024
Reviewed
Mar 1, 2024
Last updated
Aug 13, 2024
Any program on the JVM may read serialized objects via java.io.ObjectInputStream.readObject(). Reading serialized objects from an untrusted source is inherently unsafe (this affects any program running on any version of the JVM) and is a prerequisite for this vulnerability.
Clojure classes that represent infinite seqs (Cycle, infinite Repeat, and Iterate) do not define hashCode() and use the parent ASeq.hashCode(), which walks the seq to compute the hash, yielding an infinite loop. Classes like java.util.HashMap call hashCode() on keys during deserialization of a serialized map.
The exploit requires:
This will cause the program to enter an infinite loop on the reading thread and thus a denial of service (DoS).
The affected Clojure classes (Cycle, Repeat, Iterate) exist in Clojure 1.7.0-1.11.1, 1.12.0-alpha1-1.12.0-alpha8.
References