[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2270-1] jackson-databind security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : jackson-databind
Version        : 2.4.2-2+deb8u15
CVE ID         : CVE-2020-14060 CVE-2020-14061 CVE-2020-14062
                 CVE-2020-14195


There were several CVE(s) reported against src:jackson-databind,
which are as follows:

CVE-2020-14060

    FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the
    interaction between serialization gadgets and typing, related
    to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool
    (aka apache/drill).

CVE-2020-14061

    FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the
    interaction between serialization gadgets and typing, related
    to oracle.jms.AQjmsQueueConnectionFactory,
    oracle.jms.AQjmsXATopicConnectionFactory,
    oracle.jms.AQjmsTopicConnectionFactory,
    oracle.jms.AQjmsXAQueueConnectionFactory, and
    oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms).

CVE-2020-14062

    FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the
    interaction between serialization gadgets and typing, related
    to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool
    (aka xalan2).

CVE-2020-14195

    FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the
    interaction between serialization gadgets and typing, related
    to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).

For Debian 8 "Jessie", these problems have been fixed in version
2.4.2-2+deb8u15.

We recommend that you upgrade your jackson-databind packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=b5jY
-----END PGP SIGNATURE-----


Reply to: