Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in XStream
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in XStream
ID: FEDORA-2014-2372
Distribution: Fedora
Plattformen: Fedora 20
Datum: So, 23. Februar 2014, 10:04
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7285
Applikationen: XStream

Originalnachricht

Name        : xstream
Product : Fedora 20
Version : 1.3.1
Release : 9.fc20
URL : http://xstream.codehaus.org/
Summary : Java XML serialization library
Description :
XStream is a simple library to serialize objects to XML
and back again. A high level facade is supplied that
simplifies common use cases. Custom objects can be serialized
without need for specifying mappings. Speed and low memory
footprint are a crucial part of the design, making it suitable
for large object graphs or systems with high message throughput.
No information is duplicated that can be obtained via reflection.
This results in XML that is easier to read for humans and more
compact than native Java serialization. XStream serializes internal
fields, including private and final. Supports non-public and inner
classes. Classes are not required to have default constructor.
Duplicate references encountered in the object-model will be
maintained. Supports circular references. By implementing an
interface, XStream can serialize directly to/from any tree
structure (not just XML). Strategies can be registered allowing
customization of how particular types are represented as XML.
When an exception occurs due to malformed XML, detailed diagnostics
are provided to help isolate and fix the problem.

-------------------------------------------------------------------------------
-
Update Information:

This update fixes remote code execution security vulnerability by applying
backported upstream patch.
-------------------------------------------------------------------------------
-
ChangeLog:

* Tue Feb 11 2014 Mikolaj Izdebski <mizdebsk@redhat.com> - 1.3.1-9
- Apply upstream security patch
- Resolves: CVE-2013-7285
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1051277 - CVE-2013-7285 XStream: remote code execution due to
insecure XML deserialization
https://bugzilla.redhat.com/show_bug.cgi?id=1051277
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update xstream' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung