Due to steady stream of Default Typing related reports on more known
"gadget types" (see
https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
for background), I think it makes sense to clarify the procedure I
think works best.

First of all, a good first step is to send a note on
`i...@fasterxml.com`, explaining basics of what you think is the
problem. For most security conscious this can be quite generic and if
you really want to, can request my pgp key for sending more secure
communications. Or it can contain actual full description. Either way
is fine.

Once we establish that we (Jackson maintainers) consider this to be
security vulnerability worth reporting as a CVE, we will then ask
submitter (you) to request a CVE ID, using:

https://cve.mitre.org/cve/request_id.html

We may also proceed with verification and fix in the meantime.

There will be a Jackson(-databind, usually) issue as well, initially
with low-res details, but with more details once fix has been
released.

Above procedure is what submitters have followed so far, for the most
part; the main important clarification is the role of submitter as
requestor for cve id.

-+ Tatu +-

-- 
You received this message because you are subscribed to the Google Groups 
"jackson-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to jackson-dev+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/jackson-dev/CAL4a10huFni8VYOxF7S10ORxAqCZ_MZgB6WcWLJ2%2By2-wgRupA%40mail.gmail.com.

Reply via email to