First published: Mon Nov 13 2017(Updated: )
The jackson-databind package provides general data-binding functionality for Jackson, which works on top of Jackson core streaming API.<br>Security Fix(es):<br><li> A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously. (CVE-2017-15095)</li> Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-eclipse46-jackson-databind | <2.6.3-2.4.el7 | 2.6.3-2.4.el7 |
redhat/rh-eclipse46-jackson-databind | <2.6.3-2.4.el7 | 2.6.3-2.4.el7 |
redhat/rh-eclipse46-jackson-databind-javadoc | <2.6.3-2.4.el7 | 2.6.3-2.4.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The RHSA-2017:3190 vulnerability is classified as important due to its potential impact.
To fix RHSA-2017:3190, update the jackson-databind package to version 2.6.3-2.4.el7.
RHSA-2017:3190 addresses a deserialization flaw in the jackson-databind package.
RHSA-2017:3190 affects systems running vulnerable versions of the rh-eclipse46-jackson-databind package.
No, exploitation of the vulnerability in RHSA-2017:3190 does not require user authentication.