Bug 1666415 (CVE-2018-14718)
Summary: | CVE-2018-14718 jackson-databind: arbitrary code execution in slf4j-ext class | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aboyko, ahardin, aos-bugs, asoldano, atangrin, bbaranow, bbuckingham, bcourt, bkearney, bleanhar, bmaxwell, bmcclain, bmontgom, brian.stansberry, cbillett, cbyrne, ccoleman, cdewolf, chazlett, cmacedo, csutherl, darran.lofthouse, dbecker, dblechte, dedgar, dfediuck, dffrench, dimitris, dkreling, dosoudil, drusso, eedri, eparis, hhorak, iweiss, jawilson, jburrell, jcantril, jgoulding, jjoyce, jmadigan, jochrist, jokerman, jorton, jperkins, jschluet, jshepherd, jwon, kbasil, krathod, kwills, lgao, lhh, loleary, lpeer, mburns, mchappel, mgoldboi, michal.skrivanek, mkolesni, mmccune, mrike, msochure, msvehla, myarboro, ngough, nstielau, nwallace, ohadlevy, pgier, pjindal, pmackay, psakar, pslavice, psotirop, pwright, rchan, rguimara, rhcs-maint, rjerrido, rnetuka, rstancel, rsvoboda, sbonazzo, sclewis, sherold, slinaber, smaestri, spinder, sponnaga, theute, tomckay, tom.jenkinson, trepel, twalsh, vtunka, yturgema |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | jackson-databind 2.9.7, jackson-databind 2.7.9.5, jackson-databind 2.8.11.3 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using slf4j classes. An attacker could use this flaw to execute arbitrary code.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:45:19 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1666416, 1672879, 1672880, 1672881, 1700934, 1700935, 1700962, 1700963, 1703265, 1730588, 1731780, 1731787, 1731789, 1731790, 1731792, 1732286, 1732291, 1732539, 1940563 | ||
Bug Blocks: | 1666431 |
Description
Laura Pardo
2019-01-15 18:40:40 UTC
Created jackson-databind tracking bugs for this issue: Affects: fedora-all [bug 1666416] Statement: This vulnerability in jackson-databind involves exploiting CVE-2018-1088 against slf4j, which was fixed in Red Hat products through the errata referenced at https://access.redhat.com/security/cve/cve-2018-8088. Applications that link only slf4j versions including that fix are not vulnerable to this vulnerability. Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn't bundle slf4j-ext jar. Even though slf4j in part of OpenDaylight-parent aggregator, the versions included are not vulnerable versions, and specifically the slf4j-ext library is not in use. This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2019:0782 https://access.redhat.com/errata/RHSA-2019:0782 This issue has been addressed in the following products: Red Hat Openshift Application Runtimes Via RHSA-2019:0877 https://access.redhat.com/errata/RHSA-2019:0877 adjusting amq-6 to notaffected per discussion in https://engineering.redhat.com/rt/Ticket/Display.html?id=487598 This issue has been addressed in the following products: Red Hat JBoss BRMS 6.4.12 Via RHSA-2019:1782 https://access.redhat.com/errata/RHSA-2019:1782 This issue has been addressed in the following products: Red Hat Process Automation Via RHSA-2019:1797 https://access.redhat.com/errata/RHSA-2019:1797 This issue has been addressed in the following products: Red Hat Process Automation Via RHSA-2019:1823 https://access.redhat.com/errata/RHSA-2019:1823 This issue has been addressed in the following products: Red Hat Decision Manager Via RHSA-2019:1822 https://access.redhat.com/errata/RHSA-2019:1822 This issue has been addressed in the following products: Red Hat Fuse 6.3 Via RHSA-2019:2804 https://access.redhat.com/errata/RHSA-2019:2804 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.1 Via RHSA-2019:2858 https://access.redhat.com/errata/RHSA-2019:2858 This issue has been addressed in the following products: Red Hat Fuse Intergration Services 2.0 based on Fuse 6.3 R13 Via RHSA-2019:3002 https://access.redhat.com/errata/RHSA-2019:3002 This issue has been addressed in the following products: Red Hat JBoss Data Virtualization 6.4.8 Via RHSA-2019:3140 https://access.redhat.com/errata/RHSA-2019:3140 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2019:3149 https://access.redhat.com/errata/RHSA-2019:3149 This issue has been addressed in the following products: Red Hat Fuse 7.5.0 Via RHSA-2019:3892 https://access.redhat.com/errata/RHSA-2019:3892 This issue has been addressed in the following products: Red Hat Data Grid Via RHSA-2019:4037 https://access.redhat.com/errata/RHSA-2019:4037 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2020:2564 https://access.redhat.com/errata/RHSA-2020:2564 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.6 Via RHSA-2021:1230 https://access.redhat.com/errata/RHSA-2021:1230 |