First published: Mon Jul 31 2017(Updated: )
The jackson-databind package provides general data-binding functionality for Jackson, which works on top of Jackson core streaming API.<br>Security Fix(es):<br><li> A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. (CVE-2017-7525)</li> Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-eclipse46-jackson-databind | <2.6.3-2.3.el7 | 2.6.3-2.3.el7 |
redhat/rh-eclipse46-jackson-databind | <2.6.3-2.3.el7 | 2.6.3-2.3.el7 |
redhat/rh-eclipse46-jackson-databind-javadoc | <2.6.3-2.3.el7 | 2.6.3-2.3.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2017:1839 is classified as critical due to a deserialization flaw that could allow for remote code execution.
To fix RHSA-2017:1839, update the jackson-databind package to version 2.6.3-2.3.el7 or later.
Affected products include rh-eclipse46-jackson-databind and its javadoc package versions prior to 2.6.3-2.3.el7.
No, the best mitigation against the vulnerabilities in RHSA-2017:1839 is to apply the recommended update as soon as possible.
Yes, potential exploits for RHSA-2017:1839 may allow attackers to execute arbitrary code via the deserialization flaw.