Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
jackson-databind-2.10.5.1-2.2 on GA media

Notes

Title of the patch
jackson-databind-2.10.5.1-2.2 on GA media
Description of the patch
These are all security issues fixed in the jackson-databind-2.10.5.1-2.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10868
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
   document: {
      aggregate_severity: {
         namespace: "https://www.suse.com/support/security/rating/",
         text: "moderate",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright 2024 SUSE LLC. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "jackson-databind-2.10.5.1-2.2 on GA media",
            title: "Title of the patch",
         },
         {
            category: "description",
            text: "These are all security issues fixed in the jackson-databind-2.10.5.1-2.2 package on the GA media of openSUSE Tumbleweed.",
            title: "Description of the patch",
         },
         {
            category: "details",
            text: "openSUSE-Tumbleweed-2024-10868",
            title: "Patchnames",
         },
         {
            category: "legal_disclaimer",
            text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
            title: "Terms of use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://www.suse.com/support/security/contact/",
         name: "SUSE Product Security Team",
         namespace: "https://www.suse.com/",
      },
      references: [
         {
            category: "external",
            summary: "SUSE ratings",
            url: "https://www.suse.com/support/security/rating/",
         },
         {
            category: "self",
            summary: "URL of this CSAF notice",
            url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10868-1.json",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-11307 page",
            url: "https://www.suse.com/security/cve/CVE-2018-11307/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-12022 page",
            url: "https://www.suse.com/security/cve/CVE-2018-12022/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-12023 page",
            url: "https://www.suse.com/security/cve/CVE-2018-12023/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-14718 page",
            url: "https://www.suse.com/security/cve/CVE-2018-14718/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-14721 page",
            url: "https://www.suse.com/security/cve/CVE-2018-14721/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-19360 page",
            url: "https://www.suse.com/security/cve/CVE-2018-19360/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-19361 page",
            url: "https://www.suse.com/security/cve/CVE-2018-19361/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-7489 page",
            url: "https://www.suse.com/security/cve/CVE-2018-7489/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-12086 page",
            url: "https://www.suse.com/security/cve/CVE-2019-12086/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-12384 page",
            url: "https://www.suse.com/security/cve/CVE-2019-12384/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-12814 page",
            url: "https://www.suse.com/security/cve/CVE-2019-12814/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-14379 page",
            url: "https://www.suse.com/security/cve/CVE-2019-14379/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-14439 page",
            url: "https://www.suse.com/security/cve/CVE-2019-14439/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-14540 page",
            url: "https://www.suse.com/security/cve/CVE-2019-14540/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-14893 page",
            url: "https://www.suse.com/security/cve/CVE-2019-14893/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-16942 page",
            url: "https://www.suse.com/security/cve/CVE-2019-16942/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-17267 page",
            url: "https://www.suse.com/security/cve/CVE-2019-17267/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-17531 page",
            url: "https://www.suse.com/security/cve/CVE-2019-17531/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-20330 page",
            url: "https://www.suse.com/security/cve/CVE-2019-20330/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-25649 page",
            url: "https://www.suse.com/security/cve/CVE-2020-25649/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-35728 page",
            url: "https://www.suse.com/security/cve/CVE-2020-35728/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-20190 page",
            url: "https://www.suse.com/security/cve/CVE-2021-20190/",
         },
      ],
      title: "jackson-databind-2.10.5.1-2.2 on GA media",
      tracking: {
         current_release_date: "2024-06-15T00:00:00Z",
         generator: {
            date: "2024-06-15T00:00:00Z",
            engine: {
               name: "cve-database.git:bin/generate-csaf.pl",
               version: "1",
            },
         },
         id: "openSUSE-SU-2024:10868-1",
         initial_release_date: "2024-06-15T00:00:00Z",
         revision_history: [
            {
               date: "2024-06-15T00:00:00Z",
               number: "1",
               summary: "Current version",
            },
         ],
         status: "final",
         version: "1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "jackson-databind-2.10.5.1-2.2.aarch64",
                        product: {
                           name: "jackson-databind-2.10.5.1-2.2.aarch64",
                           product_id: "jackson-databind-2.10.5.1-2.2.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                        product: {
                           name: "jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                           product_id: "jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "aarch64",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "jackson-databind-2.10.5.1-2.2.ppc64le",
                        product: {
                           name: "jackson-databind-2.10.5.1-2.2.ppc64le",
                           product_id: "jackson-databind-2.10.5.1-2.2.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                        product: {
                           name: "jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                           product_id: "jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "ppc64le",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "jackson-databind-2.10.5.1-2.2.s390x",
                        product: {
                           name: "jackson-databind-2.10.5.1-2.2.s390x",
                           product_id: "jackson-databind-2.10.5.1-2.2.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                        product: {
                           name: "jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                           product_id: "jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "s390x",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "jackson-databind-2.10.5.1-2.2.x86_64",
                        product: {
                           name: "jackson-databind-2.10.5.1-2.2.x86_64",
                           product_id: "jackson-databind-2.10.5.1-2.2.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
                        product: {
                           name: "jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
                           product_id: "jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "openSUSE Tumbleweed",
                        product: {
                           name: "openSUSE Tumbleweed",
                           product_id: "openSUSE Tumbleweed",
                           product_identification_helper: {
                              cpe: "cpe:/o:opensuse:tumbleweed",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "SUSE Linux Enterprise",
               },
            ],
            category: "vendor",
            name: "SUSE",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "jackson-databind-2.10.5.1-2.2.aarch64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
            },
            product_reference: "jackson-databind-2.10.5.1-2.2.aarch64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jackson-databind-2.10.5.1-2.2.ppc64le as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
            },
            product_reference: "jackson-databind-2.10.5.1-2.2.ppc64le",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jackson-databind-2.10.5.1-2.2.s390x as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
            },
            product_reference: "jackson-databind-2.10.5.1-2.2.s390x",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jackson-databind-2.10.5.1-2.2.x86_64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
            },
            product_reference: "jackson-databind-2.10.5.1-2.2.x86_64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jackson-databind-javadoc-2.10.5.1-2.2.aarch64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
            },
            product_reference: "jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jackson-databind-javadoc-2.10.5.1-2.2.ppc64le as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
            },
            product_reference: "jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jackson-databind-javadoc-2.10.5.1-2.2.s390x as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
            },
            product_reference: "jackson-databind-javadoc-2.10.5.1-2.2.s390x",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "jackson-databind-javadoc-2.10.5.1-2.2.x86_64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            },
            product_reference: "jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2018-11307",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-11307",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-11307",
               url: "https://www.suse.com/security/cve/CVE-2018-11307",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2018-11307",
      },
      {
         cve: "CVE-2018-12022",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-12022",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-12022",
               url: "https://www.suse.com/security/cve/CVE-2018-12022",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2018-12022",
      },
      {
         cve: "CVE-2018-12023",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-12023",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-12023",
               url: "https://www.suse.com/security/cve/CVE-2018-12023",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2018-12023",
      },
      {
         cve: "CVE-2018-14718",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-14718",
            },
         ],
         notes: [
            {
               category: "general",
               text: "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-14718",
               url: "https://www.suse.com/security/cve/CVE-2018-14718",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2018-14718",
      },
      {
         cve: "CVE-2018-14721",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-14721",
            },
         ],
         notes: [
            {
               category: "general",
               text: "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-14721",
               url: "https://www.suse.com/security/cve/CVE-2018-14721",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 10,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2018-14721",
      },
      {
         cve: "CVE-2018-19360",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-19360",
            },
         ],
         notes: [
            {
               category: "general",
               text: "FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-19360",
               url: "https://www.suse.com/security/cve/CVE-2018-19360",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2018-19360",
      },
      {
         cve: "CVE-2018-19361",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-19361",
            },
         ],
         notes: [
            {
               category: "general",
               text: "FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-19361",
               url: "https://www.suse.com/security/cve/CVE-2018-19361",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2018-19361",
      },
      {
         cve: "CVE-2018-7489",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-7489",
            },
         ],
         notes: [
            {
               category: "general",
               text: "FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-7489",
               url: "https://www.suse.com/security/cve/CVE-2018-7489",
            },
            {
               category: "external",
               summary: "SUSE Bug 1202327 for CVE-2018-7489",
               url: "https://bugzilla.suse.com/1202327",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2018-7489",
      },
      {
         cve: "CVE-2019-12086",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-12086",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-12086",
               url: "https://www.suse.com/security/cve/CVE-2019-12086",
            },
            {
               category: "external",
               summary: "SUSE Bug 1202327 for CVE-2019-12086",
               url: "https://bugzilla.suse.com/1202327",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-12086",
      },
      {
         cve: "CVE-2019-12384",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-12384",
            },
         ],
         notes: [
            {
               category: "general",
               text: "FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-12384",
               url: "https://www.suse.com/security/cve/CVE-2019-12384",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-12384",
      },
      {
         cve: "CVE-2019-12814",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-12814",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-12814",
               url: "https://www.suse.com/security/cve/CVE-2019-12814",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-12814",
      },
      {
         cve: "CVE-2019-14379",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-14379",
            },
         ],
         notes: [
            {
               category: "general",
               text: "SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-14379",
               url: "https://www.suse.com/security/cve/CVE-2019-14379",
            },
            {
               category: "external",
               summary: "SUSE Bug 1165035 for CVE-2019-14379",
               url: "https://bugzilla.suse.com/1165035",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2019-14379",
      },
      {
         cve: "CVE-2019-14439",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-14439",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-14439",
               url: "https://www.suse.com/security/cve/CVE-2019-14439",
            },
            {
               category: "external",
               summary: "SUSE Bug 1165034 for CVE-2019-14439",
               url: "https://bugzilla.suse.com/1165034",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-14439",
      },
      {
         cve: "CVE-2019-14540",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-14540",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-14540",
               url: "https://www.suse.com/security/cve/CVE-2019-14540",
            },
            {
               category: "external",
               summary: "SUSE Bug 1165038 for CVE-2019-14540",
               url: "https://bugzilla.suse.com/1165038",
            },
            {
               category: "external",
               summary: "SUSE Bug 1165039 for CVE-2019-14540",
               url: "https://bugzilla.suse.com/1165039",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-14540",
      },
      {
         cve: "CVE-2019-14893",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-14893",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-14893",
               url: "https://www.suse.com/security/cve/CVE-2019-14893",
            },
            {
               category: "external",
               summary: "SUSE Bug 1157186 for CVE-2019-14893",
               url: "https://bugzilla.suse.com/1157186",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2019-14893",
      },
      {
         cve: "CVE-2019-16942",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-16942",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-16942",
               url: "https://www.suse.com/security/cve/CVE-2019-16942",
            },
            {
               category: "external",
               summary: "SUSE Bug 1165041 for CVE-2019-16942",
               url: "https://bugzilla.suse.com/1165041",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2019-16942",
      },
      {
         cve: "CVE-2019-17267",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-17267",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-17267",
               url: "https://www.suse.com/security/cve/CVE-2019-17267",
            },
            {
               category: "external",
               summary: "SUSE Bug 1165044 for CVE-2019-17267",
               url: "https://bugzilla.suse.com/1165044",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-17267",
      },
      {
         cve: "CVE-2019-17531",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-17531",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-17531",
               url: "https://www.suse.com/security/cve/CVE-2019-17531",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2019-17531",
      },
      {
         cve: "CVE-2019-20330",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-20330",
            },
         ],
         notes: [
            {
               category: "general",
               text: "FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-20330",
               url: "https://www.suse.com/security/cve/CVE-2019-20330",
            },
            {
               category: "external",
               summary: "SUSE Bug 1160113 for CVE-2019-20330",
               url: "https://bugzilla.suse.com/1160113",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-20330",
      },
      {
         cve: "CVE-2020-25649",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-25649",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-25649",
               url: "https://www.suse.com/security/cve/CVE-2020-25649",
            },
            {
               category: "external",
               summary: "SUSE Bug 1177616 for CVE-2020-25649",
               url: "https://bugzilla.suse.com/1177616",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.8,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-25649",
      },
      {
         cve: "CVE-2020-35728",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-35728",
            },
         ],
         notes: [
            {
               category: "general",
               text: "FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-35728",
               url: "https://www.suse.com/security/cve/CVE-2020-35728",
            },
            {
               category: "external",
               summary: "SUSE Bug 1180391 for CVE-2020-35728",
               url: "https://bugzilla.suse.com/1180391",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.3,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2020-35728",
      },
      {
         cve: "CVE-2021-20190",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-20190",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
               "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-20190",
               url: "https://www.suse.com/security/cve/CVE-2021-20190",
            },
            {
               category: "external",
               summary: "SUSE Bug 1181118 for CVE-2021-20190",
               url: "https://bugzilla.suse.com/1181118",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-2.10.5.1-2.2.x86_64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.aarch64",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.ppc64le",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.s390x",
                  "openSUSE Tumbleweed:jackson-databind-javadoc-2.10.5.1-2.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2021-20190",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.