A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.2.2-1ubuntu0.1~esm1", "binary_name": "libjackson2-databind-java" }, { "binary_version": "2.2.2-1ubuntu0.1~esm1", "binary_name": "libjackson2-databind-java-doc" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.9.2-3+deb8u1build0.14.04.1~esm1", "binary_name": "libjackson-json-java" }, { "binary_version": "1.9.2-3+deb8u1build0.14.04.1~esm1", "binary_name": "libjackson-json-java-doc" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.4.2-3ubuntu0.1~esm1", "binary_name": "libjackson2-databind-java" }, { "binary_version": "2.4.2-3ubuntu0.1~esm1", "binary_name": "libjackson2-databind-java-doc" } ] }