Bug#888316: marked as done (jackson-databind: CVE-2018-5968)
Your message dated Fri, 23 Feb 2018 13:33:48 + with message-idand subject line Bug#888316: fixed in jackson-databind 2.4.2-2+deb8u3 has caused the Debian Bug report #888316, regarding jackson-databind: CVE-2018-5968 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 888316: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888316 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: jackson-databind Version: 2.9.1-1 Severity: grave Tags: patch security upstream Forwarded: https://github.com/FasterXML/jackson-databind/issues/1899 Control: found -1 2.8.6-1+deb9u2 Control: found -1 2.4.2-2+deb8u2 Hi, the following vulnerability was published for jackson-databind. CVE-2018-5968[0]: | FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 | allows unauthenticated remote code execution because of an incomplete | fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. | This is exploitable via two different gadgets that bypass a blacklist. The upstream issue is at [1], with upstrema fix [2]. If I see it correctly with commit [3] the code was shuffled a bit around, so the patched file is different in meanwhile. If you disagree on the analysis, given I'm unfamiliar iwth jackson-databind let me know. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-5968 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5968 [1] https://github.com/FasterXML/jackson-databind/issues/1899 [2] https://github.com/FasterXML/jackson-databind/commit/038b471e2efde2e8f96b4e0be958d3e5a1ff1d05 [3] https://github.com/FasterXML/jackson-databind/commit/2235894210c75f624a3d0cd60bfb0434a20a18bf Regards, Salvatore --- End Message --- --- Begin Message --- Source: jackson-databind Source-Version: 2.4.2-2+deb8u3 We believe that the bug you reported is fixed in the latest version of jackson-databind, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 888...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Markus Koschany (supplier of updated jackson-databind package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 27 Jan 2018 19:37:47 +0100 Source: jackson-databind Binary: libjackson2-databind-java libjackson2-databind-java-doc Architecture: source all Version: 2.4.2-2+deb8u3 Distribution: jessie-security Urgency: high Maintainer: Debian Java Maintainers Changed-By: Markus Koschany Description: libjackson2-databind-java - fast and powerful JSON library for Java -- data binding libjackson2-databind-java-doc - Documentation for jackson-databind Closes: 888316 888318 Changes: jackson-databind (2.4.2-2+deb8u3) jessie-security; urgency=high . * Team upload. * Fix CVE-2017-17485 and CVE-2018-5968: Bybass of deserialization blackist to disallow unauthenticated remote code execution. These CVE exist due to an incomplete fix for CVE-2017-7525. (Closes: #888316, #888318) Checksums-Sha1: 339e625f321ef1df40916f240962a4aa6b8cbb2c 2688 jackson-databind_2.4.2-2+deb8u3.dsc 250fd096cb10e56cb471a4b34a9e05c26094d1f6 8884 jackson-databind_2.4.2-2+deb8u3.debian.tar.xz 40403e491d64e5c35367a16c879f1dc6f9601b99 986180 libjackson2-databind-java_2.4.2-2+deb8u3_all.deb 96420399cd5a2c88ec5188d90ba27431ff1b77fd 4737360 libjackson2-databind-java-doc_2.4.2-2+deb8u3_all.deb Checksums-Sha256: e148edc0b6c112ef4d63abe1576e28cde6aa80c80423e05c34b1adb69d12bceb 2688 jackson-databind_2.4.2-2+deb8u3.dsc a98f12468a822a332a86ffb1d9e59d24524f16a5ea6d8e4636e05b067e097e2a 8884 jackson-databind_2.4.2-2+deb8u3.debian.tar.xz 64958a05caeca76846b4a064cf3fe9f2fe2b4de5d41df365c1e817ef51cc43af 986180 libjackson2-databind-java_2.4.2-2+deb8u3_all.deb 1a0084cb046d309beb6c04e02f21585328f000ba1ebf19d47014d79d899b4287 4737360 libjackson2-databind-java-doc_2.4.2-2+deb8u3_all.deb Files: 2d383e0bd2b4ca28e2e4939fcc85808f 2688 java
Bug#888316: marked as done (jackson-databind: CVE-2018-5968)
Your message dated Fri, 23 Feb 2018 11:34:17 + with message-idand subject line Bug#888316: fixed in jackson-databind 2.8.6-1+deb9u3 has caused the Debian Bug report #888316, regarding jackson-databind: CVE-2018-5968 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 888316: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888316 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: jackson-databind Version: 2.9.1-1 Severity: grave Tags: patch security upstream Forwarded: https://github.com/FasterXML/jackson-databind/issues/1899 Control: found -1 2.8.6-1+deb9u2 Control: found -1 2.4.2-2+deb8u2 Hi, the following vulnerability was published for jackson-databind. CVE-2018-5968[0]: | FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 | allows unauthenticated remote code execution because of an incomplete | fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. | This is exploitable via two different gadgets that bypass a blacklist. The upstream issue is at [1], with upstrema fix [2]. If I see it correctly with commit [3] the code was shuffled a bit around, so the patched file is different in meanwhile. If you disagree on the analysis, given I'm unfamiliar iwth jackson-databind let me know. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-5968 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5968 [1] https://github.com/FasterXML/jackson-databind/issues/1899 [2] https://github.com/FasterXML/jackson-databind/commit/038b471e2efde2e8f96b4e0be958d3e5a1ff1d05 [3] https://github.com/FasterXML/jackson-databind/commit/2235894210c75f624a3d0cd60bfb0434a20a18bf Regards, Salvatore --- End Message --- --- Begin Message --- Source: jackson-databind Source-Version: 2.8.6-1+deb9u3 We believe that the bug you reported is fixed in the latest version of jackson-databind, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 888...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Markus Koschany (supplier of updated jackson-databind package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 27 Jan 2018 19:12:39 +0100 Source: jackson-databind Binary: libjackson2-databind-java libjackson2-databind-java-doc Architecture: source all Version: 2.8.6-1+deb9u3 Distribution: stretch-security Urgency: high Maintainer: Debian Java Maintainers Changed-By: Markus Koschany Description: libjackson2-databind-java - fast and powerful JSON library for Java -- data binding libjackson2-databind-java-doc - Documentation for jackson-databind Closes: 888316 888318 Changes: jackson-databind (2.8.6-1+deb9u3) stretch-security; urgency=high . * Team upload. * Fix CVE-2017-17485 and CVE-2018-5968: Bybass of deserialization blackist to disallow unauthenticated remote code execution. These CVE exist due to an incomplete fix for CVE-2017-7525. (Closes: #888316, #888318) Checksums-Sha1: 0ad8f9644b1a4446dbbaa709de1ab2827d1b631e 2694 jackson-databind_2.8.6-1+deb9u3.dsc 7fa80128b6793f82a4982f0bab47b14cf68bf47a 8424 jackson-databind_2.8.6-1+deb9u3.debian.tar.xz d4093936a3bf78a5e2c8377efc7323f1cb61cfa9 16475 jackson-databind_2.8.6-1+deb9u3_amd64.buildinfo 76e1f8e7470db4d505c39db3f857caebedfd39c0 1228842 libjackson2-databind-java-doc_2.8.6-1+deb9u3_all.deb 782823cff9a6a7a092dd3ef9d16a50d39ade14c0 1154694 libjackson2-databind-java_2.8.6-1+deb9u3_all.deb Checksums-Sha256: 61aa763d90694a021239bb6ee80400657ab467d76fbe82c6d6333db0d64d3912 2694 jackson-databind_2.8.6-1+deb9u3.dsc 00ab252cfc0253a28dc7e73248302bc1d717f23b43e25fbd8ce6c7fe6b260e82 8424 jackson-databind_2.8.6-1+deb9u3.debian.tar.xz b8a011e559004daf812f3f42b111ffad035b803cf6049b4e090d833f8f8215f0 16475 jackson-databind_2.8.6-1+deb9u3_amd64.buildinfo 60457f1efdda8be7c7d8e73f670d809b6aa0d73746f3ab6cd0940de7477883a7 1228842
Bug#888316: marked as done (jackson-databind: CVE-2018-5968)
Your message dated Thu, 25 Jan 2018 23:19:37 + with message-idand subject line Bug#888316: fixed in jackson-databind 2.9.4-1 has caused the Debian Bug report #888316, regarding jackson-databind: CVE-2018-5968 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 888316: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888316 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: jackson-databind Version: 2.9.1-1 Severity: grave Tags: patch security upstream Forwarded: https://github.com/FasterXML/jackson-databind/issues/1899 Control: found -1 2.8.6-1+deb9u2 Control: found -1 2.4.2-2+deb8u2 Hi, the following vulnerability was published for jackson-databind. CVE-2018-5968[0]: | FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 | allows unauthenticated remote code execution because of an incomplete | fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. | This is exploitable via two different gadgets that bypass a blacklist. The upstream issue is at [1], with upstrema fix [2]. If I see it correctly with commit [3] the code was shuffled a bit around, so the patched file is different in meanwhile. If you disagree on the analysis, given I'm unfamiliar iwth jackson-databind let me know. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-5968 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5968 [1] https://github.com/FasterXML/jackson-databind/issues/1899 [2] https://github.com/FasterXML/jackson-databind/commit/038b471e2efde2e8f96b4e0be958d3e5a1ff1d05 [3] https://github.com/FasterXML/jackson-databind/commit/2235894210c75f624a3d0cd60bfb0434a20a18bf Regards, Salvatore --- End Message --- --- Begin Message --- Source: jackson-databind Source-Version: 2.9.4-1 We believe that the bug you reported is fixed in the latest version of jackson-databind, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 888...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Markus Koschany (supplier of updated jackson-databind package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 25 Jan 2018 14:45:19 +0100 Source: jackson-databind Binary: libjackson2-databind-java libjackson2-databind-java-doc Architecture: source Version: 2.9.4-1 Distribution: unstable Urgency: medium Maintainer: Debian Java Maintainers Changed-By: Markus Koschany Description: libjackson2-databind-java - fast and powerful JSON library for Java -- data binding libjackson2-databind-java-doc - Documentation for jackson-databind Closes: 888316 888318 Changes: jackson-databind (2.9.4-1) unstable; urgency=medium . * Team upload. * New upstream version 2.9.4. - Fix CVE-2018-5968: bypass of deserialization blacklist related to CVE-2017-7525 and CVE-2017-17485. (Closes: #888316) - Fix CVE-2017-17485: unauthenticated remote code execution because of an incomplete fix for CVE-2017-7525. (Closes: #888318) * Use compat level 11. * Declare compliance with Debian Policy 4.1.3. Checksums-Sha1: a3d1d2e49764ea0b2c761e8243bb5fe9ec2627f8 2728 jackson-databind_2.9.4-1.dsc 64e99d866cf9520a5d237e614b232c14ef4bd86e 1237542 jackson-databind_2.9.4.orig.tar.gz 0172687bda1e45548c65cedbff7a2a6f5bb51e9b 4320 jackson-databind_2.9.4-1.debian.tar.xz 3bae230b4c23ec8faf6f280446f98289c39f4723 17211 jackson-databind_2.9.4-1_amd64.buildinfo Checksums-Sha256: 63789275fbed8d774c97831bd0ebc6de61e2b2e8ff08baad2e4baeb56529d01e 2728 jackson-databind_2.9.4-1.dsc 08e8439ad91035ec446733037fa85062b3e86f82dd24f5515fb34df30967a2fd 1237542 jackson-databind_2.9.4.orig.tar.gz 2a9ea35c988ba86ed674a1cc6f5eb12261e4d877872c4ca4045f3add2e8aaf14 4320 jackson-databind_2.9.4-1.debian.tar.xz de3ee482f5afd378422980bfe4cb3cc9d39eefadadea36d7cf24bcc11cf9de9e 17211 jackson-databind_2.9.4-1_amd64.buildinfo Files: