The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of jackson-databind: information disclosure via Polymorphic Typing

Synthesis of the vulnerability 

An attacker can bypass access restrictions to data via Polymorphic Typing of jackson-databind, in order to obtain sensitive information.
Impacted software: Debian, Fedora, SnapCenter Backup Management, Oracle Communications.
Severity of this computer vulnerability: 2/4.
Creation date: 13/08/2019.
Références of this announce: cpuapr2020, cpujan2020, CVE-2019-14439, DLA-1879-1, DSA-4542-1, FEDORA-2019-ae6a703b8f, FEDORA-2019-fb23eccc03, NTAP-20190814-0001, VIGILANCE-VUL-30022.

Description of the vulnerability 

An attacker can bypass access restrictions to data via Polymorphic Typing of jackson-databind, in order to obtain sensitive information.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer weakness impacts software or systems such as Debian, Fedora, SnapCenter Backup Management, Oracle Communications.

Our Vigil@nce team determined that the severity of this vulnerability note is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this cybersecurity threat.

Solutions for this threat 

Debian 8: new jackson-databind packages.
New packages are available:
  Debian 8: jackson-databind 2.4.2-2+deb8u8

Debian 9/10: new jackson-databind packages.
New packages are available:
  Debian 9: jackson-databind 2.8.6-1+deb9u6
  Debian 10: jackson-databind 2.9.8-3+deb10u1

Fedora: new jackson packages.
New packages are available:
  Fedora 30: jackson-annotations 2.9.9-1.fc30, jackson-core 2.9.9-1.fc30, jackson-bom 2.9.9-1.fc30, jackson-databind 2.9.9.3-1.fc30
  Fedora 29: jackson-annotations 2.9.9-1.fc29, jackson-core 2.9.9-1.fc29, jackson-bom 2.9.9-1.fc29, jackson-databind 2.9.9.3-1.fc29

Oracle Communications: CPU of April 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2647690.1
  https://support.oracle.com/rs?type=doc&id=2654603.1
  https://support.oracle.com/rs?type=doc&id=2652618.1
  https://support.oracle.com/rs?type=doc&id=2653087.1
  https://support.oracle.com/rs?type=doc&id=2653688.1
  https://support.oracle.com/rs?type=doc&id=2652610.1
  https://support.oracle.com/rs?type=doc&id=2653279.1
  https://support.oracle.com/rs?type=doc&id=2652619.1
  https://support.oracle.com/rs?type=doc&id=2652621.1
  https://support.oracle.com/rs?type=doc&id=2652606.1
  https://support.oracle.com/rs?type=doc&id=2653691.1
  https://support.oracle.com/rs?type=doc&id=2653692.1
  https://support.oracle.com/rs?type=doc&id=2647687.1
  https://support.oracle.com/rs?type=doc&id=2652622.1

Oracle Communications: CPU of January 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2625594.1
  https://support.oracle.com/rs?type=doc&id=2626101.1
  https://support.oracle.com/rs?type=doc&id=2628576.1
  https://support.oracle.com/rs?type=doc&id=2626102.1
  https://support.oracle.com/rs?type=doc&id=2622427.1
  https://support.oracle.com/rs?type=doc&id=2595443.1
  https://support.oracle.com/rs?type=doc&id=2595442.1
  https://support.oracle.com/rs?type=doc&id=2617852.1
  https://support.oracle.com/rs?type=doc&id=2626103.1
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides systems vulnerabilities patches. The technology watch team tracks security threats targeting the computer system.