First published: Mon Oct 05 2020(Updated: )
The jackson-databind package provides general data-binding functionality for Jackson, which works on top of Jackson core streaming API.<br>Security Fix(es):<br><li> jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration (CVE-2020-24750)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-maven35-jackson-databind | <2.7.6-2.11.el7 | 2.7.6-2.11.el7 |
redhat/rh-maven35-jackson-databind | <2.7.6-2.11.el7 | 2.7.6-2.11.el7 |
redhat/rh-maven35-jackson-databind-javadoc | <2.7.6-2.11.el7 | 2.7.6-2.11.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:4173 is classified as important.
To fix RHSA-2020:4173, update the package to version 2.7.6-2.11.el7.
RHSA-2020:4173 addresses a vulnerability related to serialization gadgets in the jackson-databind package, specifically CVE-2020-24750.
RHSA-2020:4173 affects the rh-maven35-jackson-databind packages on Red Hat systems.
Yes, CVE-2020-24750 represents a known exploit that leverages serialization issues in the affected package.