A jackson-databind security update has been released for Debian GNU/Linux 8 LTS to address multiple security issues.
DLA 2179-1: jackson-databind security update
Package : jackson-databind
Version : 2.4.2-2+deb8u14
CVE ID : CVE-2020-10968 CVE-2020-10969 CVE-2020-11111
CVE-2020-11112 CVE-2020-11113 CVE-2020-11619
CVE-2020-11620
Following CVEs were reported against the jackson-databind source package
:
CVE-2020-10968
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
interaction between serialization gadgets and typing, related
to org.aoju.bus.proxy.provider.remoting.RmiProvider
(aka bus-proxy).
CVE-2020-10969
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
interaction between serialization gadgets and typing, related
to javax.swing.JEditorPane.
CVE-2020-11111
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
interaction between serialization gadgets and typing, related
to org.apache.activemq.* (aka activemq-jms, activemq-core,
activemq-pool, and activemq-pool-jms).
CVE-2020-11112
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
interaction between serialization gadgets and typing, related
to org.apache.commons.proxy.provider.remoting.RmiProvider
(aka apache/commons-proxy).
CVE-2020-11113
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
interaction between serialization gadgets and typing, related
to org.apache.openjpa.ee.WASRegistryManagedRuntime
(aka openjpa).
CVE-2020-11619
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
interaction between serialization gadgets and typing, related
to org.springframework.aop.config.MethodLocatingFactoryBean
(aka spring-aop).
CVE-2020-11620
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the
interaction between serialization gadgets and typing, related
to org.apache.commons.jelly.impl.Embedded (aka commons-jelly).
For Debian 8 "Jessie", these problems have been fixed in version
2.4.2-2+deb8u14.
We recommend that you upgrade your jackson-databind packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS