@@ -466,7 +466,7 @@ Project: jackson-databind
466466 (reported by Alexander S)
467467#1854: NPE deserializing collection with `@JsonCreator` and `ACCEPT_CASE_INSENSITIVE_PROPERTIES`
468468 (reported by rue-jw@github)
469- #1855: Blacklist for more serialization gadgets (dbcp/tomcat, spring)
469+ #1855: Blacklist for more serialization gadgets (dbcp/tomcat, spring, CVE-2017-17485 )
470470#1859: Issue handling unknown/unmapped Enum keys
471471 (reported by remya11@github)
472472#1868: Class name handling for JDK unmodifiable Collection types changed
@@ -677,9 +677,9 @@ Project: jackson-databind
677677#1872: `NullPointerException` in `SubTypeValidator.validateSubType` when
678678 validating Spring interface
679679 (reported by Rob W)
680- #1899: Another two gadgets to exploit default typing issue in jackson-databind
680+ #1899: Another two gadgets to exploit default typing issue (CVE-2018-5968)
681681 (reported by OneSourceCat@github)
682- #1931: Two more `c3p0` gadgets to exploit default typing issue
682+ #1931: Two more `c3p0` gadgets to exploit default typing issue (c3p0, CVE-2018-7489)
683683
6846842.8.11 (24-Dec-2017)
685685
@@ -693,7 +693,7 @@ Project: jackson-databind
693693 (reported by henryptung@github)
694694#1807 : Jackson-databind caches plain map deserializer and use it even map has `@JsonDeserializer`
695695 (reported by lexas2509@github)
696- #1855 : Blacklist for more serialization gadgets (dbcp/tomcat, spring)
696+ #1855 : Blacklist for more serialization gadgets (dbcp/tomcat, spring / CVE- 2017 - 17485 )
697697
6986982.8.10 (24 -Aug-2017 )
699699
@@ -709,7 +709,7 @@ Project: jackson-databind
709709 binary formats (CBOR, Smile)
710710#1735 : Missing type checks when using polymorphic type ids
711711 (reported by Lukas Euler)
712- #1737 : Block more JDK types from polymorphic deserialization
712+ #1737 : Block more JDK types from polymorphic deserialization (CVE 2017 - 15095 )
713713
7147142.8.9 (12 -Jun-2017 )
715715
@@ -734,7 +734,7 @@ Project: jackson-databind
734734#1585 : Invoke ServiceLoader.load() inside of a privileged block when loading
735735 modules using `ObjectMapper.findModules()`
736736 (contributed by Ivo S)
737- #1599 : Jackson Deserializer security vulnerability
737+ #1599 : Jackson Deserializer security vulnerability (CVE- 2017 - 7525 )
738738 (reported by ayound@github)
739739#1607 : @JsonIdentityReference not used when setup on class only
740740 (reported by vboulaye@github)
0 commit comments