Package        : jackson-databind
Version        : 2.4.2-2+deb8u10
CVE ID         : CVE-2019-17267 CVE-2019-17531

More deserialization flaws were discovered in jackson-databind which
could allow an unauthenticated user to perform remote code execution.
The issue was resolved by extending the blacklist and blocking more
classes from polymorphic deserialization.

For Debian 8 "Jessie", these problems have been fixed in version
2.4.2-2+deb8u10.

We recommend that you upgrade your jackson-databind packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-2030-1: jackson-databind security update

December 10, 2019
More deserialization flaws were discovered in jackson-databind which could allow an unauthenticated user to perform remote code execution

Summary

We recommend that you upgrade your jackson-databind packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : jackson-databind
Version : 2.4.2-2+deb8u10
CVE ID : CVE-2019-17267 CVE-2019-17531

Related News