Skip to content

Commit fe2dda7

Browse files
committed
Merge branch '2.10' into 2.11
2 parents fffd5ea + dcb5efe commit fe2dda7

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

release-notes/VERSION-2.x

+6-6
Original file line numberDiff line numberDiff line change
@@ -466,7 +466,7 @@ Project: jackson-databind
466466
(reported by Alexander S)
467467
#1854: NPE deserializing collection with `@JsonCreator` and `ACCEPT_CASE_INSENSITIVE_PROPERTIES`
468468
(reported by rue-jw@github)
469-
#1855: Blacklist for more serialization gadgets (dbcp/tomcat, spring)
469+
#1855: Blacklist for more serialization gadgets (dbcp/tomcat, spring, CVE-2017-17485)
470470
#1859: Issue handling unknown/unmapped Enum keys
471471
(reported by remya11@github)
472472
#1868: Class name handling for JDK unmodifiable Collection types changed
@@ -677,9 +677,9 @@ Project: jackson-databind
677677
#1872: `NullPointerException` in `SubTypeValidator.validateSubType` when
678678
validating Spring interface
679679
(reported by Rob W)
680-
#1899: Another two gadgets to exploit default typing issue in jackson-databind
680+
#1899: Another two gadgets to exploit default typing issue (CVE-2018-5968)
681681
(reported by OneSourceCat@github)
682-
#1931: Two more `c3p0` gadgets to exploit default typing issue
682+
#1931: Two more `c3p0` gadgets to exploit default typing issue (c3p0, CVE-2018-7489)
683683
684684
2.8.11 (24-Dec-2017)
685685
@@ -693,7 +693,7 @@ Project: jackson-databind
693693
(reported by henryptung@github)
694694
#1807: Jackson-databind caches plain map deserializer and use it even map has `@JsonDeserializer`
695695
(reported by lexas2509@github)
696-
#1855: Blacklist for more serialization gadgets (dbcp/tomcat, spring)
696+
#1855: Blacklist for more serialization gadgets (dbcp/tomcat, spring / CVE-2017-17485)
697697

698698
2.8.10 (24-Aug-2017)
699699

@@ -709,7 +709,7 @@ Project: jackson-databind
709709
binary formats (CBOR, Smile)
710710
#1735: Missing type checks when using polymorphic type ids
711711
(reported by Lukas Euler)
712-
#1737: Block more JDK types from polymorphic deserialization
712+
#1737: Block more JDK types from polymorphic deserialization (CVE 2017-15095)
713713

714714
2.8.9 (12-Jun-2017)
715715

@@ -734,7 +734,7 @@ Project: jackson-databind
734734
#1585: Invoke ServiceLoader.load() inside of a privileged block when loading
735735
modules using `ObjectMapper.findModules()`
736736
(contributed by Ivo S)
737-
#1599: Jackson Deserializer security vulnerability
737+
#1599: Jackson Deserializer security vulnerability (CVE-2017-7525)
738738
(reported by ayound@github)
739739
#1607: @JsonIdentityReference not used when setup on class only
740740
(reported by vboulaye@github)

src/test/java/com/fasterxml/jackson/databind/deser/TestConcurrency.java

+3-3
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
import com.fasterxml.jackson.databind.annotation.JsonDeserialize;
99

1010
/**
11-
* Testing for [JACKSON-237] (NPE due to race condition)
11+
* Testing for NPE due to race condition.
1212
*/
1313
public class TestConcurrency extends BaseMapTest
1414
{
@@ -18,7 +18,7 @@ public class TestConcurrency extends BaseMapTest
1818
/**********************************************
1919
*/
2020

21-
@JsonDeserialize(using=BeanDeserializer.class)
21+
@JsonDeserialize(using=CustomBeanDeserializer.class)
2222
static class Bean
2323
{
2424
public int value = 42;
@@ -34,7 +34,7 @@ static class Bean
3434
* Dummy deserializer used for verifying that partially handled (i.e. not yet
3535
* resolved) deserializers are not allowed to be used.
3636
*/
37-
static class BeanDeserializer
37+
static class CustomBeanDeserializer
3838
extends JsonDeserializer<Bean>
3939
implements ResolvableDeserializer
4040
{

0 commit comments

Comments
 (0)