A flaw was discovered in FasterXML jackson-databind in all versions before
2.9.10 and 2.10.0, where it would permit polymorphic deserialization of
malicious objects using the xalan JNDI gadget when used in conjunction with
polymorphic type handling methods such as `enableDefaultTyping()` or when
@JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way
which ObjectMapper.readValue might instantiate objects from unsafe sources.
An attacker could use this flaw to execute arbitrary code.
Upstream:released (2.10.0-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 19.10 (Eoan Ermine):needed
Ubuntu 20.04 (Focal Fossa):not-affected (2.10.0-2)
More Information

Updated: 2020-04-24 03:53:50 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)