First published: Mon Jul 22 2019(Updated: )
The jackson-databind package provides general data-binding functionality for Jackson, which works on top of Jackson core streaming API.<br>Security Fix(es):<br><li> jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-maven35-jackson-databind | <2.7.6-2.6.el7 | 2.7.6-2.6.el7 |
redhat/rh-maven35-jackson-databind | <2.7.6-2.6.el7 | 2.7.6-2.6.el7 |
redhat/rh-maven35-jackson-databind-javadoc | <2.7.6-2.6.el7 | 2.7.6-2.6.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2019:1820 is classified as important.
To fix RHSA-2019:1820, upgrade the jackson-databind package to version 2.7.6-2.6.el7.
RHSA-2019:1820 affects the rh-maven35-jackson-databind package and its related components.
The vulnerability in RHSA-2019:1820 involves a failure to block the logback-core class from polymorphic deserialization, which can lead to remote code execution.
Yes, remote code execution is a significant risk associated with the RHSA-2019:1820 vulnerability.