{"id":"CVE-2019-16335","details":"A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.","aliases":["GHSA-85cw-hj65-qqv9"],"modified":"2026-04-16T04:37:23.917633936Z","published":"2019-09-15T22:15:10.590Z","related":["ALSA-2020:1644"],"references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/a360b46061c91c5cad789b6c3190aef9b9f223a2b75c9c9f046fe016%40%3Cissues.hbase.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/40c00861b53bb611dee7d6f35f864aa7d1c1bd77df28db597cbf27e1%40%3Cissues.hbase.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/e90c3feb21702e68a8c08afce37045adb3870f2bf8223fa403fb93fb%40%3Ccommits.hbase.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/ad0d238e97a7da5eca47a014f0f7e81f440ed6bf74a93183825e18b9%40%3Cissues.hbase.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/dc6b5cad721a4f6b3b62ed1163894941140d9d5656140fb757505ca0%40%3Cissues.hbase.apache.org%3E"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/"},{"type":"WEB","url":"https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/"},{"type":"WEB","url":"https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69%40%3Ccommits.tinkerpop.apache.org%3E"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3200"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0161"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20191004-0002/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0164"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0445"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0159"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0729"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4542"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0160"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"REPORT","url":"https://seclists.org/bugtraq/2019/Oct/6"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"type":"FIX","url":"https://github.com/FasterXML/jackson-databind/issues/2449"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/FasterXML/jackson-databind","events":[{"introduced":"e8df0987e3034d102ee6d704d30a05a2e3ac7089"},{"fixed":"ec1adf8c72625fd51b30105afad7464c4332d542"},{"introduced":"50791cc7856376949287e0be3e96147665ab8f68"},{"fixed":"ba9ac61920a4391568f4959e399a25833eae9cf6"},{"introduced":"e969f0a31b781f5dfb74e16ddd5ee4b4fa36e8d8"},{"fixed":"5b33f88541a25999e1c43ca2eda1aeacacd6d13d"},{"introduced":"0"},{"last_affected":"a5807c566af27b184731dd4eb7dfcc420962db32"},{"introduced":"0"},{"last_affected":"7a095bcc66b228ea48e37c57eafd7d78ce5c090c"},{"introduced":"0"},{"last_affected":"9efc4abb22c664c492271bc9907bbfbf4f70889c"},{"introduced":"0"},{"last_affected":"21f90cf247018c1286cc20544029782450dc270a"},{"introduced":"0"},{"last_affected":"060726b011b008496cd8bb0997ee94a6b73530d1"},{"introduced":"0"},{"last_affected":"50791cc7856376949287e0be3e96147665ab8f68"},{"introduced":"0"},{"last_affected":"ce9dc07af83f77568a613fd45a86f58c93ba1a02"}],"database_specific":{"versions":[{"introduced":"2.0.0"},{"fixed":"2.6.7.3"},{"introduced":"2.7.0"},{"fixed":"2.8.11.5"},{"introduced":"2.9.0"},{"fixed":"2.9.10"},{"introduced":"0"},{"last_affected":"2.4.0"},{"introduced":"0"},{"last_affected":"2.4.1"},{"introduced":"0"},{"last_affected":"2.5.0"},{"introduced":"0"},{"last_affected":"2.6.0"},{"introduced":"0"},{"last_affected":"2.6.1"},{"introduced":"0"},{"last_affected":"2.7.0"},{"introduced":"0"},{"last_affected":"2.7.1"}]}}],"versions":["2.2.0c","2.6.0-rc3b","jackson-databind-2.0.0","jackson-databind-2.0.1","jackson-databind-2.0.2","jackson-databind-2.1.0","jackson-databind-2.1.1","jackson-databind-2.2.0","jackson-databind-2.2.1","jackson-databind-2.2.2","jackson-databind-2.3.0","jackson-databind-2.3.0-rc1","jackson-databind-2.3.1","jackson-databind-2.4.0","jackson-databind-2.4.0-rc1","jackson-databind-2.4.0-rc2","jackson-databind-2.4.0-rc3","jackson-databind-2.4.1","jackson-databind-2.4.1.1","jackson-databind-2.4.1.2","jackson-databind-2.4.1.3","jackson-databind-2.5.0","jackson-databind-2.5.0-rc1","jackson-databind-2.6.0","jackson-databind-2.6.0-rc1","jackson-databind-2.6.0-rc4","jackson-databind-2.6.1","jackson-databind-2.6.2","jackson-databind-2.6.3","jackson-databind-2.6.4","jackson-databind-2.6.5","jackson-databind-2.6.6","jackson-databind-2.6.7","jackson-databind-2.6.7.1","jackson-databind-2.6.7.2","jackson-databind-2.7.0","jackson-databind-2.7.1","jackson-databind-2.7.1-1","jackson-databind-2.8.0","jackson-databind-2.8.1","jackson-databind-2.8.10","jackson-databind-2.8.11","jackson-databind-2.8.11.1","jackson-databind-2.8.11.2","jackson-databind-2.8.11.3","jackson-databind-2.8.11.4","jackson-databind-2.8.2","jackson-databind-2.8.3","jackson-databind-2.8.4","jackson-databind-2.8.5","jackson-databind-2.8.6","jackson-databind-2.8.7","jackson-databind-2.8.8","jackson-databind-2.8.8.1","jackson-databind-2.8.9","jackson-databind-2.9.0","jackson-databind-2.9.1","jackson-databind-2.9.3","jackson-databind-2.9.4","jackson-databind-2.9.5","jackson-databind-2.9.6","jackson-databind-2.9.7","jackson-databind-2.9.8","jackson-databind-2.9.9","jackson-databind-2.9.9.1","jackson-databind-2.9.9.2","jackson-databind-2.9.9.3"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"18.0"}]},{"events":[{"introduced":"8.0.2"},{"last_affected":"8.0.8"}]},{"events":[{"introduced":"0"},{"fixed":"11.2.0.3.23"}]},{"events":[{"introduced":"12.2.0.1.0"},{"fixed":"12.2.0.1.19"}]},{"events":[{"introduced":"13.9.4.0.0"},{"fixed":"13.9.4.2.1"}]},{"events":[{"introduced":"0"},{"last_affected":"19.1.0.0.0"}]},{"events":[{"introduced":"0"},{"fixed":"19.1.0.0.1"}]},{"events":[{"introduced":"17.7"},{"last_affected":"17.12"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]},{"events":[{"introduced":"0"},{"last_affected":"16.1"}]},{"events":[{"introduced":"0"},{"last_affected":"16.2"}]},{"events":[{"introduced":"0"},{"last_affected":"18.8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"17.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0"}]},{"events":[{"introduced":"0"},{"last_affected":"17.0"}]},{"events":[{"introduced":"0"},{"last_affected":"18.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.3.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-16335.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}