A deserialization flaw was discovered in the jackson-databind in versions
before 2.8.10 and 2.9.1, which could allow an unauthenticated user to
perform code execution by sending the maliciously crafted input to the
readValue method of the ObjectMapper. This issue extends the previous flaw
CVE-2017-7525 by blacklisting more classes that could be used maliciously.
Upstream:released (2.9.1-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Trusty/esm:DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.9.1-1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (2.9.1-1)
Ubuntu 19.04 (Disco Dingo):not-affected (2.9.1-1)
Ubuntu 19.10 (Eoan):not-affected (2.9.1-1)
More Information

Updated: 2019-04-26 14:20:17 UTC (commit 30899e40836d26e1bb5f0b072d31fd87b6cf3bd4)