Source: jackson-databind Version: 2.9.4-1 Severity: grave Tags: patch security upstream Justification: user security hole Forwarded: https://github.com/FasterXML/jackson-databind/issues/1931
Hi, the following vulnerability was published for jackson-databind. CVE-2018-7489[0]: | FasterXML jackson-databind before 2.8.11.1 and 2.9.x before 2.9.5 | allows unauthenticated remote code execution because of an incomplete | fix for the CVE-2017-7525 deserialization flaw. This is exploitable by | sending maliciously crafted JSON input to the readValue method of the | ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 | libraries are available in the classpath. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-7489 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7489 [1] https://github.com/FasterXML/jackson-databind/issues/1931 [2] https://github.com/FasterXML/jackson-databind/commit/6799f8f10cc78e9af6d443ed6982d00a13f2e7d2 Please adjust the affected versions in the BTS as needed. Regards, Salvatore _______________________________________________ Secure-testing-team mailing list Secure-testing-team@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team