Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 2 Nov 2017 11:51:59 +1030
From: Doran Moppert <>
Subject: CVE-2017-15095:  further deserialisation attacks against
 jackson-databind (follow-up to CVE-2017-7525)

In July, deserialisation vulnerabilities were disclosed affecting
jackson-databind [1], assigned CVE-2017-7525.  These were patched
upstream by blacklisting vulnerable classes, resulting in release 2.8.9
and the issue was closed.  Various downstreams including Red Hat issued
a fix at this point.


But blacklists being what they are, a further set of dangerous classes
have been added since (all included in release 2.9.1).  The further
patches reference the original ticket, but given that security releases
have already been issued for CVE-2017-7525 based on 2.8.9, we thought it
prudent to issue a new CVE ID covering the additional classes:

This issue and CVE-2017-7525 were reported by Liao Xinxi of NSFOCUS.

Note that there is a mitigation addressing both of these CVEs described

More detail below from [2]:


> Other distributions may have made the same mistake, since the original
> upstream ticket was closed before additional names were added to the
> blacklist.
> Original ticket + patches (CVE-2017-7525):
> Further tickets and patches to block more dangerous types (I think
> these are
> all):
> This CVE-2017-15095 should be considered to include everything in
> NO_DESER_CLASS_NAMES as of today:
> 7093008aa2afe8068e120df850189ae072dfa1b2/src/main/java/com/fasterxml/
> jackson/databind/deser/

Doran Moppert
Red Hat Product Security

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.