First published: Thu Sep 12 2019(Updated: )
The jackson-databind package provides general data-binding functionality for Jackson, which works on top of Jackson core streaming API.<br>Security Fix(es):<br><li> jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-maven35-jackson-databind | <2.7.6-2.7.el7 | 2.7.6-2.7.el7 |
redhat/rh-maven35-jackson-databind | <2.7.6-2.7.el7 | 2.7.6-2.7.el7 |
redhat/rh-maven35-jackson-databind-javadoc | <2.7.6-2.7.el7 | 2.7.6-2.7.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2019:2743 is classified as an important security vulnerability.
You can fix RHSA-2019:2743 by updating the jackson-databind package to version 2.7.6-2.7.el7.
RHSA-2019:2743 addresses a default typing mishandling in jackson-databind that could lead to remote code execution (CVE-2019-14379).
RHSA-2019:2743 affects all versions of jackson-databind prior to 2.7.6-2.7.el7.
The software package involved in RHSA-2019:2743 is rh-maven35-jackson-databind.