First published: Tue Apr 21 2020(Updated: )
The jackson-databind package provides general data-binding functionality for Jackson, which works on top of Jackson core streaming API.<br>Security Fix(es):<br><li> jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider (CVE-2020-10968)</li> <li> jackson-databind: Serialization gadgets in javax.swing.JEditorPane (CVE-2020-10969)</li> <li> jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory (CVE-2020-11111)</li> <li> jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider (CVE-2020-11112)</li> <li> jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime (CVE-2020-11113)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-maven35-jackson-databind | <2.7.6-2.9.el7 | 2.7.6-2.9.el7 |
redhat/rh-maven35-jackson-databind | <2.7.6-2.9.el7 | 2.7.6-2.9.el7 |
redhat/rh-maven35-jackson-databind-javadoc | <2.7.6-2.9.el7 | 2.7.6-2.9.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2020:1523 addresses vulnerabilities related to serialization gadgets in the jackson-databind package, specifically CVE-2020-10968.
To fix RHSA-2020:1523, upgrade to the jackson-databind package version 2.7.6-2.9.el7 or later.
RHSA-2020:1523 affects systems using the rh-maven35-jackson-databind package versions prior to 2.7.6-2.9.el7.
Failing to address RHSA-2020:1523 can leave systems vulnerable to remote code execution attacks through serialization exploits.
The recommended action for RHSA-2020:1523 is to apply the security updates as soon as possible to mitigate potential risks.