CVE-2020-10650

NameCVE-2020-10650
DescriptionA deserialization flaw was discovered in jackson-databind through 2.9.10.4. It could allow an unauthenticated user to perform code execution via ignite-jta or quartz-core: org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup, org.apache.ignite.cache.jta.jndi.CacheJndiTmFactory, and org.quartz.utils.JNDIConnectionProvider.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3407-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
jackson-databind (PTS)jessie, jessie (lts)2.4.2-2+deb8u17vulnerable
stretch (security)2.8.6-1+deb9u10fixed
stretch (lts), stretch2.8.6-1+deb9u11fixed
buster2.9.8-3+deb10u3vulnerable
buster (security)2.9.8-3+deb10u5fixed
bullseye (security), bullseye2.12.1-1+deb11u1fixed
sid, trixie, bookworm2.14.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
jackson-databindsourcejessie(unfixed)end-of-life
jackson-databindsourcestretch2.8.6-1+deb9u7
jackson-databindsourcebuster2.9.8-3+deb10u5DLA-3407-1
jackson-databindsource(unstable)2.11.1-1

Notes

https://github.com/advisories/GHSA-rpr3-cw39-3pxh
https://github.com/FasterXML/jackson-databind/issues/2658
https://github.com/FasterXML/jackson-databind/commit/a424c038ba0c0d65e579e22001dec925902ac0ef (jackson-databind-2.9.10.4)

Search for package or bug name: Reporting problems