{"schema_version":"1.7.2","id":"OESA-2021-1014","modified":"2021-02-04T11:02:34Z","published":"2021-02-04T11:02:34Z","upstream":["CVE-2020-35490","CVE-2020-35491","CVE-2020-35728","CVE-2020-36185"],"summary":"jackson-databind security update","details":"The general-purpose data-binding functionality and tree-model for Jackson Data Processor. It builds on core streaming parser/generator package, and uses Jackson Annotations for configuration.\\r\\n\\r\\n\r\nSecurity Fix(es):\\r\\n\\r\\n\r\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.(CVE-2020-35490)\\r\\n\\r\\n\r\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.(CVE-2020-35491)\\r\\n\\r\\n\r\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).(CVE-2020-35728)\\r\\n\\r\\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource.(CVE-2020-36185)\\r\\n\\r\\n","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"jackson-databind","purl":"pkg:rpm/openEuler/jackson-databind\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.9.8-6.oe1"}]}],"ecosystem_specific":{"noarch":["jackson-databind-javadoc-2.9.8-6.oe1.noarch.rpm","jackson-databind-2.9.8-6.oe1.noarch.rpm"],"src":["jackson-databind-2.9.8-6.oe1.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1014"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35490"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35491"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35728"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36185"}],"database_specific":{"severity":"High"}}