First published: Tue Apr 30 2019(Updated: )
This release of Red Hat Fuse 7.3 serves as a replacement for Red Hat Fuse 7.2, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.<br>Security Fix(es):<br><li> jackson-databind: A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. (CVE-2017-7525)</li> <li> struts2: ClassLoader manipulation via request parameters (CVE-2014-0112)</li> <li> jetty: HTTP request smuggling (CVE-2017-7657)</li> For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Fuse |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2019:0910 is classified as important due to the discovered deserialization flaw in jackson-databind.
To fix RHSA-2019:0910, update to the latest version of Red Hat Fuse that includes the patched jackson-databind library.
RHSA-2019:0910 affects Red Hat Fuse 7.2 and earlier versions prior to the security fix.
RHSA-2019:0910 addresses a deserialization flaw in the jackson-databind library.
There are no documented workarounds for RHSA-2019:0910, so updating is the recommended solution.