Critical severityNVD Advisory· Published Feb 6, 2018· Updated Sep 17, 2024
CVE-2017-7525
CVE-2017-7525
Description
A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
com.fasterxml.jackson.core:jackson-databindMaven | < 2.6.7.1 | 2.6.7.1 |
com.fasterxml.jackson.core:jackson-databindMaven | >= 2.7.0, < 2.7.9.1 | 2.7.9.1 |
com.fasterxml.jackson.core:jackson-databindMaven | >= 2.8.0, < 2.8.9 | 2.8.9 |
Affected products
1- Range: before 2.6.7.1
Patches
7fa87c1ddbe80Backport #1599 in 2.6.x
4 files changed · +87 −3
pom.xml+1 −1 modified@@ -10,7 +10,7 @@ <groupId>com.fasterxml.jackson.core</groupId> <artifactId>jackson-databind</artifactId> - <version>2.6.8-SNAPSHOT</version> + <version>2.6.7.1-SNAPSHOT</version> <name>jackson-databind</name> <packaging>bundle</packaging> <description>General data-binding functionality for Jackson: works on core streaming API</description>
release-notes/VERSION+2 −1 modified@@ -4,9 +4,10 @@ Project: jackson-databind === Releases === ------------------------------------------------------------------------ -2.6.8 (if ever released) +2.6.7.1 (11-Jul-2017) #1383: Problem with `@JsonCreator` with 1-arg factory-method, implicit param names +#1599: Backport the extra safety checks for polymorphic deserialization 2.6.7 (05-Jun-2016)
src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializerFactory.java+44 −1 modified@@ -40,7 +40,32 @@ public class BeanDeserializerFactory private final static Class<?>[] INIT_CAUSE_PARAMS = new Class<?>[] { Throwable.class }; private final static Class<?>[] NO_VIEWS = new Class<?>[0]; - + + /** + * Set of well-known "nasty classes", deserialization of which is considered dangerous + * and should (and is) prevented by default. + */ + private final static Set<String> DEFAULT_NO_DESER_CLASS_NAMES; + static { + Set<String> s = new HashSet<String>(); + // Courtesy of [https://github.com/kantega/notsoserial]: + // (and wrt [databind#1599] + s.add("org.apache.commons.collections.functors.InvokerTransformer"); + s.add("org.apache.commons.collections.functors.InstantiateTransformer"); + s.add("org.apache.commons.collections4.functors.InvokerTransformer"); + s.add("org.apache.commons.collections4.functors.InstantiateTransformer"); + s.add("org.codehaus.groovy.runtime.ConvertedClosure"); + s.add("org.codehaus.groovy.runtime.MethodClosure"); + s.add("org.springframework.beans.factory.ObjectFactory"); + s.add("com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl"); + DEFAULT_NO_DESER_CLASS_NAMES = Collections.unmodifiableSet(s); + } + + /** + * Set of class names of types that are never to be deserialized. + */ + private Set<String> _cfgIllegalClassNames = DEFAULT_NO_DESER_CLASS_NAMES; + /* /********************************************************** /* Life-cycle @@ -138,6 +163,8 @@ public JsonDeserializer<Object> createBeanDeserializer(DeserializationContext ct if (!isPotentialBeanType(type.getRawClass())) { return null; } + // For checks like [databind#1599] + checkIllegalTypes(ctxt, type, beanDesc); // Use generic bean introspection to build deserializer return buildBeanDeserializer(ctxt, type, beanDesc); } @@ -836,4 +863,20 @@ protected boolean isIgnorableType(DeserializationConfig config, BeanDescription // We default to 'false', i.e. not ignorable return (status == null) ? false : status.booleanValue(); } + + private void checkIllegalTypes(DeserializationContext ctxt, JavaType type, + BeanDescription beanDesc) + throws JsonMappingException + { + // There are certain nasty classes that could cause problems, mostly + // via default typing -- catch them here. + String full = type.getRawClass().getName(); + + if (_cfgIllegalClassNames.contains(full)) { + String message = String.format("Illegal type (%s) to deserialize: prevented for security reasons", + full); + throw ctxt.mappingException("Invalid type definition for type %s: %s", + beanDesc, message); + } + } }
src/test/java/com/fasterxml/jackson/databind/interop/IllegalTypesCheckTest.java+40 −0 added@@ -0,0 +1,40 @@ +package com.fasterxml.jackson.databind.interop; + +import com.fasterxml.jackson.databind.*; + +/** + * Test case(s) to guard against handling of types that are illegal to handle + * due to security constraints. + */ +public class IllegalTypesCheckTest extends BaseMapTest +{ + static class Bean1599 { + public int id; + public Object obj; + } + + public void testIssue1599() throws Exception + { + final String JSON = aposToQuotes( + "{'id': 124,\n" ++" 'obj':[ 'com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl',\n" ++" {\n" ++" 'transletBytecodes' : [ 'AAIAZQ==' ],\n" ++" 'transletName' : 'a.b',\n" ++" 'outputProperties' : { }\n" ++" }\n" ++" ]\n" ++"}" + ); + ObjectMapper mapper = new ObjectMapper(); + mapper.enableDefaultTyping(); + try { + mapper.readValue(JSON, Bean1599.class); + fail("Should not pass"); + } catch (JsonMappingException e) { + verifyException(e, "Illegal type"); + verifyException(e, "to deserialize"); + verifyException(e, "prevented for security reasons"); + } + } +} \ No newline at end of file
680d75b011edMerge branch '2.8'
1 file changed · +1 −0
src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializerFactory.java+1 −0 modified@@ -55,6 +55,7 @@ public class BeanDeserializerFactory s.add("org.codehaus.groovy.runtime.MethodClosure"); s.add("org.springframework.beans.factory.ObjectFactory"); s.add("com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl"); + s.add("org.apache.xalan.xsltc.trax.TemplatesImpl"); DEFAULT_NO_DESER_CLASS_NAMES = Collections.unmodifiableSet(s); }
90042692085dMerge branch '2.7' into 2.8
1 file changed · +1 −0
src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializerFactory.java+1 −0 modified@@ -58,6 +58,7 @@ public class BeanDeserializerFactory s.add("org.codehaus.groovy.runtime.MethodClosure"); s.add("org.springframework.beans.factory.ObjectFactory"); s.add("com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl"); + s.add("org.apache.xalan.xsltc.trax.TemplatesImpl"); DEFAULT_NO_DESER_CLASS_NAMES = Collections.unmodifiableSet(s); }
3bfbb835e530Minor improvement wrt #1599 (also cover vanilla xalan impl)
1 file changed · +1 −0
src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializerFactory.java+1 −0 modified@@ -57,6 +57,7 @@ public class BeanDeserializerFactory s.add("org.codehaus.groovy.runtime.MethodClosure"); s.add("org.springframework.beans.factory.ObjectFactory"); s.add("com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl"); + s.add("org.apache.xalan.xsltc.trax.TemplatesImpl"); DEFAULT_NO_DESER_CLASS_NAMES = Collections.unmodifiableSet(s); }
fd8dec2c7fabMerge branch '2.8'
3 files changed · +95 −0
release-notes/VERSION+2 −0 modified@@ -80,6 +80,8 @@ Project: jackson-databind #1585: Invoke ServiceLoader.load() inside of a privileged block when loading modules using `ObjectMapper.findModules()` (contributed by Ivo S) +#1599: Jackson Deserializer security vulnerability + (reported by ayound@github) 2.8.8 (05-Apr-2017)
src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializerFactory.java+48 −0 modified@@ -36,6 +36,35 @@ public class BeanDeserializerFactory */ private final static Class<?>[] INIT_CAUSE_PARAMS = new Class<?>[] { Throwable.class }; + /** + * Set of well-known "nasty classes", deserialization of which is considered dangerous + * and should (and is) prevented by default. + * + * @since 2.8.9 + */ + protected final static Set<String> DEFAULT_NO_DESER_CLASS_NAMES; + static { + Set<String> s = new HashSet<>(); + // Courtesy of [https://github.com/kantega/notsoserial]: + // (and wrt [databind#1599] + s.add("org.apache.commons.collections.functors.InvokerTransformer"); + s.add("org.apache.commons.collections.functors.InstantiateTransformer"); + s.add("org.apache.commons.collections4.functors.InvokerTransformer"); + s.add("org.apache.commons.collections4.functors.InstantiateTransformer"); + s.add("org.codehaus.groovy.runtime.ConvertedClosure"); + s.add("org.codehaus.groovy.runtime.MethodClosure"); + s.add("org.springframework.beans.factory.ObjectFactory"); + s.add("com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl"); + DEFAULT_NO_DESER_CLASS_NAMES = Collections.unmodifiableSet(s); + } + + /** + * Set of class names of types that are never to be deserialized. + * + * @since 2.8.9 + */ + protected Set<String> _cfgIllegalClassNames = DEFAULT_NO_DESER_CLASS_NAMES; + /* /********************************************************** /* Life-cycle @@ -130,6 +159,8 @@ public JsonDeserializer<Object> createBeanDeserializer(DeserializationContext ct if (!isPotentialBeanType(type.getRawClass())) { return null; } + // For checks like [databind#1599] + checkIllegalTypes(ctxt, type, beanDesc); // Use generic bean introspection to build deserializer return buildBeanDeserializer(ctxt, type, beanDesc); } @@ -901,4 +932,21 @@ protected boolean isIgnorableType(DeserializationConfig config, BeanPropertyDefi ignoredTypes.put(type, status); return status.booleanValue(); } + + /** + * @since 2.8.9 + */ + protected void checkIllegalTypes(DeserializationContext ctxt, JavaType type, + BeanDescription beanDesc) + throws JsonMappingException + { + // There are certain nasty classes that could cause problems, mostly + // via default typing -- catch them here. + String full = type.getRawClass().getName(); + + if (_cfgIllegalClassNames.contains(full)) { + ctxt.reportBadTypeDefinition(beanDesc, + "Illegal type (%s) to deserialize: prevented for security reasons", full); + } + } }
src/test/java/com/fasterxml/jackson/databind/interop/IllegalTypesCheckTest.java+45 −0 added@@ -0,0 +1,45 @@ +package com.fasterxml.jackson.databind.interop; + +import com.fasterxml.jackson.databind.*; +import com.fasterxml.jackson.databind.exc.InvalidDefinitionException; + +/** + * Test case(s) to guard against handling of types that are illegal to handle + * due to security constraints. + */ +public class IllegalTypesCheckTest extends BaseMapTest +{ + static class Bean1599 { + public int id; + public Object obj; + } + + public void testIssue1599() throws Exception + { + final String NASTY_CLASS = "com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl"; + final String JSON = aposToQuotes( + "{'id': 124,\n" ++" 'obj':[ '"+NASTY_CLASS+"',\n" ++" {\n" ++" 'transletBytecodes' : [ 'AAIAZQ==' ],\n" ++" 'transletName' : 'a.b',\n" ++" 'outputProperties' : { }\n" ++" }\n" ++" ]\n" ++"}" + ); + ObjectMapper mapper = new ObjectMapper(); + mapper.enableDefaultTyping(); + try { + mapper.readValue(JSON, Bean1599.class); + fail("Should not pass"); + } catch (InvalidDefinitionException e) { + verifyException(e, "Illegal type"); + verifyException(e, "to deserialize"); + verifyException(e, "prevented for security reasons"); + BeanDescription desc = e.getBeanDescription(); + assertNotNull(desc); + assertEquals(NASTY_CLASS, desc.getBeanClass().getName()); + } + } +}
60d459cedcf0Fix #1599 for 2.8.9
3 files changed · +91 −1
release-notes/VERSION+2 −0 modified@@ -8,6 +8,8 @@ Project: jackson-databind #1585: Invoke ServiceLoader.load() inside of a privileged block when loading modules using `ObjectMapper.findModules()` (contributed by Ivo S) +#1599: Jackson Deserializer security vulnerability + (reported by ayound@github) 2.8.8 (05-Apr-2017)
src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializerFactory.java+49 −1 modified@@ -38,7 +38,36 @@ public class BeanDeserializerFactory private final static Class<?>[] INIT_CAUSE_PARAMS = new Class<?>[] { Throwable.class }; private final static Class<?>[] NO_VIEWS = new Class<?>[0]; - + + /** + * Set of well-known "nasty classes", deserialization of which is considered dangerous + * and should (and is) prevented by default. + * + * @since 2.8.9 + */ + protected final static Set<String> DEFAULT_NO_DESER_CLASS_NAMES; + static { + Set<String> s = new HashSet<>(); + // Courtesy of [https://github.com/kantega/notsoserial]: + // (and wrt [databind#1599] + s.add("org.apache.commons.collections.functors.InvokerTransformer"); + s.add("org.apache.commons.collections.functors.InstantiateTransformer"); + s.add("org.apache.commons.collections4.functors.InvokerTransformer"); + s.add("org.apache.commons.collections4.functors.InstantiateTransformer"); + s.add("org.codehaus.groovy.runtime.ConvertedClosure"); + s.add("org.codehaus.groovy.runtime.MethodClosure"); + s.add("org.springframework.beans.factory.ObjectFactory"); + s.add("com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl"); + DEFAULT_NO_DESER_CLASS_NAMES = Collections.unmodifiableSet(s); + } + + /** + * Set of class names of types that are never to be deserialized. + * + * @since 2.8.9 + */ + protected Set<String> _cfgIllegalClassNames = DEFAULT_NO_DESER_CLASS_NAMES; + /* /********************************************************** /* Life-cycle @@ -137,6 +166,8 @@ public JsonDeserializer<Object> createBeanDeserializer(DeserializationContext ct if (!isPotentialBeanType(type.getRawClass())) { return null; } + // For checks like [databind#1599] + checkIllegalTypes(ctxt, type, beanDesc); // Use generic bean introspection to build deserializer return buildBeanDeserializer(ctxt, type, beanDesc); } @@ -855,4 +886,21 @@ protected boolean isIgnorableType(DeserializationConfig config, BeanDescription ignoredTypes.put(type, status); return status.booleanValue(); } + + /** + * @since 2.8.9 + */ + protected void checkIllegalTypes(DeserializationContext ctxt, JavaType type, + BeanDescription beanDesc) + throws JsonMappingException + { + // There are certain nasty classes that could cause problems, mostly + // via default typing -- catch them here. + String full = type.getRawClass().getName(); + + if (_cfgIllegalClassNames.contains(full)) { + ctxt.reportBadTypeDefinition(beanDesc, + "Illegal type (%s) to deserialize: prevented for security reasons", full); + } + } }
src/test/java/com/fasterxml/jackson/databind/interop/IllegalTypesCheckTest.java+40 −0 added@@ -0,0 +1,40 @@ +package com.fasterxml.jackson.databind.interop; + +import com.fasterxml.jackson.databind.*; + +/** + * Test case(s) to guard against handling of types that are illegal to handle + * due to security constraints. + */ +public class IllegalTypesCheckTest extends BaseMapTest +{ + static class Bean1599 { + public int id; + public Object obj; + } + + public void testIssue1599() throws Exception + { + final String JSON = aposToQuotes( + "{'id': 124,\n" ++" 'obj':[ 'com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl',\n" ++" {\n" ++" 'transletBytecodes' : [ 'AAIAZQ==' ],\n" ++" 'transletName' : 'a.b',\n" ++" 'outputProperties' : { }\n" ++" }\n" ++" ]\n" ++"}" + ); + ObjectMapper mapper = new ObjectMapper(); + mapper.enableDefaultTyping(); + try { + mapper.readValue(JSON, Bean1599.class); + fail("Should not pass"); + } catch (JsonMappingException e) { + verifyException(e, "Illegal type"); + verifyException(e, "to deserialize"); + verifyException(e, "prevented for security reasons"); + } + } +}
6ce32ffd18faFix #1599 for 2.7(.10)
3 files changed · +65 −0
release-notes/VERSION+2 −0 modified@@ -6,6 +6,8 @@ Project: jackson-databind 2.7.10 (not yet released) +#1599: Jackson Deserializer security vulnerability + (reported by ayound@github) - Minor robustification of method resolution in `AnnotatedClass` 2.7.9 (04-Feb-2017)
src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializerFactory.java+23 −0 modified@@ -139,6 +139,8 @@ public JsonDeserializer<Object> createBeanDeserializer(DeserializationContext ct if (!isPotentialBeanType(type.getRawClass())) { return null; } + // For checks like [databind#1599] + checkIllegalTypes(ctxt, type, beanDesc); // Use generic bean introspection to build deserializer return buildBeanDeserializer(ctxt, type, beanDesc); } @@ -834,4 +836,25 @@ protected boolean isIgnorableType(DeserializationConfig config, BeanDescription // We default to 'false', i.e. not ignorable return (status == null) ? false : status.booleanValue(); } + + /** + * @since 2.8.9 + */ + protected void checkIllegalTypes(DeserializationContext ctxt, JavaType type, + BeanDescription beanDesc) + throws JsonMappingException + { + // There are certain nasty classes that could cause problems, mostly + // via default typing -- catch them here. + Class<?> raw = type.getRawClass(); + String name = raw.getSimpleName(); + + if ("TemplatesImpl".equals(name)) { // [databind#1599] + if (raw.getName().startsWith("com.sun.org.apache.xalan")) { + throw JsonMappingException.from(ctxt, + String.format("Illegal type (%s) to deserialize: prevented for security reasons", + name)); + } + } + } }
src/test/java/com/fasterxml/jackson/databind/interop/IllegalTypesCheckTest.java+40 −0 added@@ -0,0 +1,40 @@ +package com.fasterxml.jackson.databind.interop; + +import com.fasterxml.jackson.databind.*; + +/** + * Test case(s) to guard against handling of types that are illegal to handle + * due to security constraints. + */ +public class IllegalTypesCheckTest extends BaseMapTest +{ + static class Bean1599 { + public int id; + public Object obj; + } + + public void testIssue1599() throws Exception + { + final String JSON = aposToQuotes( + "{'id': 124,\n" ++" 'obj':[ 'com.sun.org.apache.xalan.internal.xsltc.trax.TemplatesImpl',\n" ++" {\n" ++" 'transletBytecodes' : [ 'AAIAZQ==' ],\n" ++" 'transletName' : 'a.b',\n" ++" 'outputProperties' : { }\n" ++" }\n" ++" ]\n" ++"}" + ); + ObjectMapper mapper = new ObjectMapper(); + mapper.enableDefaultTyping(); + try { + mapper.readValue(JSON, Bean1599.class); + fail("Should not pass"); + } catch (JsonMappingException e) { + verifyException(e, "Illegal type"); + verifyException(e, "to deserialize"); + verifyException(e, "prevented for security reasons"); + } + } +}
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
84- access.redhat.com/errata/RHSA-2017:1834ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:1835ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:1836ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:1837ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:1839ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:1840ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:2477ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:2546ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:2547ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:2633ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:2635ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:2636ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:2637ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:2638ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:3141ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:3454ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:3455ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:3456ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2017:3458ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2018:0294ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2018:0342ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2018:1449ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2018:1450ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2019:0910ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2019:2858ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2019:3149ghsavendor-advisoryx_refsource_REDHATWEB
- github.com/advisories/GHSA-qxxx-2pp7-5hmxghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2017-7525ghsaADVISORY
- www.debian.org/security/2017/dsa-4004ghsavendor-advisoryx_refsource_DEBIANWEB
- www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.htmlghsax_refsource_CONFIRMWEB
- www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlghsax_refsource_CONFIRMWEB
- www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlghsax_refsource_CONFIRMWEB
- www.securityfocus.com/bid/99623mitrevdb-entryx_refsource_BID
- www.securitytracker.com/id/1039744mitrevdb-entryx_refsource_SECTRACK
- www.securitytracker.com/id/1039947mitrevdb-entryx_refsource_SECTRACK
- www.securitytracker.com/id/1040360mitrevdb-entryx_refsource_SECTRACK
- bugzilla.redhat.com/show_bug.cgighsax_refsource_CONFIRMWEB
- cwiki.apache.org/confluence/display/WW/S2-055ghsax_refsource_CONFIRMWEB
- github.com/FasterXML/jackson-databind/commit/3bfbb835e530055c1941ddf87fde0b08d08dcd38ghsaWEB
- github.com/FasterXML/jackson-databind/commit/60d459cedcf079c6106ae7da2ac562bc32dcabe1ghsaWEB
- github.com/FasterXML/jackson-databind/commit/680d75b011edd67a2d2a2e9980998a968194c2efghsaWEB
- github.com/FasterXML/jackson-databind/commit/6ce32ffd18facac6abdbbf559c817b47fcb622c1ghsaWEB
- github.com/FasterXML/jackson-databind/commit/90042692085deeb05ae75c569c9909f7dba24415ghsaWEB
- github.com/FasterXML/jackson-databind/commit/fa87c1ddbe803ebb7295f5c2ebfe38e12f6e6162ghsaWEB
- github.com/FasterXML/jackson-databind/commit/fd8dec2c7fab8b4b4bd60502a0f1d63ec23c24daghsaWEB
- github.com/FasterXML/jackson-databind/issues/1599ghsax_refsource_CONFIRMWEB
- github.com/FasterXML/jackson-databind/issues/1723ghsax_refsource_CONFIRMWEB
- lists.apache.org/thread.html/3c87dc8bca99a2b3b4743713b33d1de05b1d6b761fdf316224e9c81f%40%3Cdev.lucene.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/3c87dc8bca99a2b3b4743713b33d1de05b1d6b761fdf316224e9c81f@%3Cdev.lucene.apache.org%3EghsaWEB
- lists.apache.org/thread.html/4641ed8616ccc2c1fbddac2c3dc9900c96387bc226eaf0232d61909b%40%3Ccommits.cassandra.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/4641ed8616ccc2c1fbddac2c3dc9900c96387bc226eaf0232d61909b@%3Ccommits.cassandra.apache.org%3EghsaWEB
- lists.apache.org/thread.html/5008bcbd45ee65ce39e4220b6ac53d28a24d6bc67d5804e9773a7399%40%3Csolr-user.lucene.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/5008bcbd45ee65ce39e4220b6ac53d28a24d6bc67d5804e9773a7399@%3Csolr-user.lucene.apache.org%3EghsaWEB
- lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3EghsaWEB
- lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3EghsaWEB
- lists.apache.org/thread.html/b1f33fe5ade396bb903fdcabe9f243f7692c7dfce5418d3743c2d346%40%3Cdev.lucene.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/b1f33fe5ade396bb903fdcabe9f243f7692c7dfce5418d3743c2d346@%3Cdev.lucene.apache.org%3EghsaWEB
- lists.apache.org/thread.html/c10a2bf0fdc3d25faf17bd191d6ec46b29a353fa9c97bebd7c4e5913%40%3Cdev.lucene.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/c10a2bf0fdc3d25faf17bd191d6ec46b29a353fa9c97bebd7c4e5913@%3Cdev.lucene.apache.org%3EghsaWEB
- lists.apache.org/thread.html/c2ed4c0126b43e324cf740012a0edd371fd36096fd777be7bfe7a2a6%40%3Cdev.lucene.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/c2ed4c0126b43e324cf740012a0edd371fd36096fd777be7bfe7a2a6@%3Cdev.lucene.apache.org%3EghsaWEB
- lists.apache.org/thread.html/c9d5ff20929e8a3c8794facf4c4b326a9c10618812eec356caa20b87%40%3Csolr-user.lucene.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/c9d5ff20929e8a3c8794facf4c4b326a9c10618812eec356caa20b87@%3Csolr-user.lucene.apache.org%3EghsaWEB
- lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629%40%3Csolr-user.lucene.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629@%3Csolr-user.lucene.apache.org%3EghsaWEB
- lists.apache.org/thread.html/f60afd3c7e9ebaaf70fad4a4beb75cf8740ac959017a31e7006c7486%40%3Cdev.lucene.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/f60afd3c7e9ebaaf70fad4a4beb75cf8740ac959017a31e7006c7486@%3Cdev.lucene.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r42ac3e39e6265db12d9fc6ae1cd4b5fea7aed9830dc6f6d58228fed7%40%3Ccommits.cassandra.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r42ac3e39e6265db12d9fc6ae1cd4b5fea7aed9830dc6f6d58228fed7@%3Ccommits.cassandra.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589%40%3Cissues.spark.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589@%3Cissues.spark.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rf7f87810c38dc9abf9f93989f76008f504cbf7c1a355214640b2d04c%40%3Ccommits.cassandra.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rf7f87810c38dc9abf9f93989f76008f504cbf7c1a355214640b2d04c@%3Ccommits.cassandra.apache.org%3EghsaWEB
- lists.debian.org/debian-lts-announce/2020/01/msg00037.htmlghsamailing-listx_refsource_MLISTWEB
- lists.debian.org/debian-lts-announce/2020/08/msg00039.htmlghsamailing-listx_refsource_MLISTWEB
- security.netapp.com/advisory/ntap-20171214-0002ghsaWEB
- security.netapp.com/advisory/ntap-20171214-0002/mitrex_refsource_CONFIRM
- support.hpe.com/hpsc/doc/public/displayghsax_refsource_CONFIRMWEB
- www.oracle.com/security-alerts/cpuoct2020.htmlghsax_refsource_MISCWEB
- www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlghsax_refsource_MISCWEB
- www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.htmlghsax_refsource_CONFIRMWEB
- www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.