First published: Mon Nov 13 2017(Updated: )
The jackson-databind package provides general data-binding functionality for Jackson, which works on top of Jackson core streaming API.<br>Security Fix(es):<br><li> A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously. (CVE-2017-15095)</li> Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-eclipse47-jackson-databind | <2.7.6-3.3.el7 | 2.7.6-3.3.el7 |
redhat/rh-eclipse47-jackson-databind | <2.7.6-3.3.el7 | 2.7.6-3.3.el7 |
redhat/rh-eclipse47-jackson-databind-javadoc | <2.7.6-3.3.el7 | 2.7.6-3.3.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2017:3189 is classified as critical due to a deserialization flaw in the jackson-databind package.
To fix RHSA-2017:3189, upgrade jackson-databind to version 2.7.6-3.3.el7 or later.
The vulnerability in RHSA-2017:3189 is caused by a deserialization flaw that could allow an unauthenticated user to execute arbitrary code.
RHSA-2017:3189 affects the jackson-databind packages, specifically versions prior to 2.7.6-3.3.el7.
There are no reliable workarounds for RHSA-2017:3189, so upgrading the affected packages is recommended.