{"schema_version":"1.7.2","id":"OESA-2021-1051","modified":"2021-03-05T11:02:38Z","published":"2021-03-05T11:02:38Z","upstream":["CVE-2020-36182","CVE-2020-36183","CVE-2020-36187","CVE-2020-36181","CVE-2020-36186","CVE-2020-36180","CVE-2020-36188","CVE-2020-36184","CVE-2020-36179","CVE-2020-36189","CVE-2021-20190"],"summary":"jackson-databind security update","details":"The general-purpose data-binding functionality and tree-model for Jackson Data Processor. It builds on core streaming parser/generator package, and uses Jackson Annotations for configuration.\r\n\r\nSecurity Fix(es):\r\n\r\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.(CVE-2020-36182)\r\n\r\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool.(CVE-2020-36183)\r\n\r\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.(CVE-2020-36187)\r\n\r\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.(CVE-2020-36181)\r\n\r\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource.(CVE-2020-36186)\r\n\r\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS.(CVE-2020-36180)\r\n\r\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource.(CVE-2020-36188)\r\n\r\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.(CVE-2020-36184)\r\n\r\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS.(CVE-2020-36179)\r\n\r\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource.(CVE-2020-36189)\r\n\r\nA flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-20190)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"jackson-databind","purl":"pkg:rpm/openEuler/jackson-databind\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.9.8-7.oe1"}]}],"ecosystem_specific":{"noarch":["jackson-databind-2.9.8-7.oe1.noarch.rpm","jackson-databind-javadoc-2.9.8-7.oe1.noarch.rpm"],"src":["jackson-databind-2.9.8-7.oe1.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1051"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36182"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36183"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36187"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36181"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36186"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36180"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36188"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36184"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36179"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36189"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20190"}],"database_specific":{"severity":"High"}}