ESB-2019.0674 - [Debian] jackson-databind: Multiple vulnerabilities 2019-03-05

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.0674
               [DLA 1703-1] jackson-databind security update
                               5 March 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           jackson-databind
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-19362 CVE-2018-19361 CVE-2018-19360
                   CVE-2018-14721 CVE-2018-14720 CVE-2018-14719
                   CVE-2018-14718 CVE-2018-12023 CVE-2018-12022
                   CVE-2018-11307  

Reference:         ASB-2019.0025
                   ASB-2019.0019

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : jackson-databind
Version        : 2.4.2-2+deb8u5
CVE ID         : CVE-2018-11307 CVE-2018-12022 CVE-2018-12023 CVE-2018-14718
                 CVE-2018-14719 CVE-2018-14720 CVE-2018-14721 CVE-2018-19360
                 CVE-2018-19361 CVE-2018-19362

Several deserialization flaws were discovered in jackson-databind, a fast
and powerful JSON library for Java, which could allow an unauthenticated
user to perform code execution. The issue was resolved by extending
the blacklist and blocking more classes from polymorphic deserialization.

For Debian 8 "Jessie", these problems have been fixed in version
2.4.2-2+deb8u5.

We recommend that you upgrade your jackson-databind packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=NoXV
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=/Dku
-----END PGP SIGNATURE-----

« Back to bulletins