Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20151113171610.GA21683@sentinelchicken.org>
Date: Fri, 13 Nov 2015 09:16:10 -0800
From: Tim <tim-security@...tinelchicken.org>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: CVE-Request: Assign CVE for common-collections
 remote code execution on deserialisation flaw


> The patch[1] attached to that JIRA report would disable serialization by
> default. Any application that needs it would require a code change to
> re-enable it. This would break existing applications.

Right... so that's still speculation.  Speculation that apps actually
need to serialize objects of those particular classes.  There may very
well be applications that do that, but I just want to be sure we're
not overstating the downsides.

tim

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.