Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in xstream
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in xstream
ID: FEDORA-2021-d894ca87dc
Distribution: Fedora
Plattformen: Fedora 34
Datum: Mi, 13. Oktober 2021, 07:01
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21341
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21346
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21350
Applikationen: XStream

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2021-d894ca87dc
2021-10-12 23:37:48.488199
-------------------------------------------------------------------------------
-

Name : xstream
Product : Fedora 34
Version : 1.4.18
Release : 2.fc34
URL : https://x-stream.github.io
Summary : Java XML serialization library
Description :
XStream is a simple library to serialize objects to XML
and back again. A high level facade is supplied that
simplifies common use cases. Custom objects can be serialized
without need for specifying mappings. Speed and low memory
footprint are a crucial part of the design, making it suitable
for large object graphs or systems with high message throughput.
No information is duplicated that can be obtained via reflection.
This results in XML that is easier to read for humans and more
compact than native Java serialization. XStream serializes internal
fields, including private and final. Supports non-public and inner
classes. Classes are not required to have default constructor.
Duplicate references encountered in the object-model will be
maintained. Supports circular references. By implementing an
interface, XStream can serialize directly to/from any tree
structure (not just XML). Strategies can be registered allowing
customization of how particular types are represented as XML.
When an exception occurs due to malformed XML, detailed diagnostics
are provided to help isolate and fix the problem.

-------------------------------------------------------------------------------
-
Update Information:

``` * Mon Oct 04 2021 Didik Supriadi <didiksupriadi41@fedoraproject.org>
-
1.4.18-2 - Enable activation, cglib, dom4j, jdom, and jdom2 * Fri Oct 01 2021
Didik Supriadi <didiksupriadi41@fedoraproject.org> - 1.4.18-1 - Update to
version 1.4.18 ```
-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Oct 4 2021 Didik Supriadi <didiksupriadi41@fedoraproject.org> -
1.4.18-2
- Enable activation, cglib, dom4j, jdom, and jdom2
* Fri Oct 1 2021 Didik Supriadi <didiksupriadi41@fedoraproject.org> -
1.4.18-1
- Update to version 1.4.18
* Fri Jul 23 2021 Fedora Release Engineering <releng@fedoraproject.org> -
1.4.14-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1908833 - CVE-2020-26258 xstream: Server-Side Forgery Request
vulnerability can be activated when unmarshalling [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1908833
[ 2 ] Bug #1908838 - CVE-2020-26259 xstream: arbitrary file deletion on the
local host when unmarshalling [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1908838
[ 3 ] Bug #1942540 - CVE-2021-21341 xstream: allow a remote attacker to cause
DoS only by manipulating the processed input stream [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1942540
[ 4 ] Bug #1942547 - CVE-2021-21342 xstream: SSRF via crafted input stream
[fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1942547
[ 5 ] Bug #1942551 - CVE-2021-21343 xstream: arbitrary file deletion on the
local host via crafted input stream [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1942551
[ 6 ] Bug #1942556 - CVE-2021-21344 xstream: arbitrary code execution via
crafted input stream [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1942556
[ 7 ] Bug #1942560 - CVE-2021-21345 xstream: allow a remote attacker who has
sufficient rights to execute commands of the host only by manipulating the processed input stream [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1942560
[ 8 ] Bug #1942579 - CVE-2021-21346 xstream: allow a remote attacker to load
and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1942579
[ 9 ] Bug #1942631 - CVE-2021-21347 xstream: allow a remote attacker to load
and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1942631
[ 10 ] Bug #1942634 - CVE-2021-21348 xstream: ReDoS vulnerability
[fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1942634
[ 11 ] Bug #1942636 - CVE-2021-21349 xstream: SSRF can be activated
unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1942636
[ 12 ] Bug #1942638 - CVE-2021-21350 xstream: allow a remote attacker to
execute arbitrary code only by manipulating the processed input stream [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1942638
[ 13 ] Bug #1942643 - CVE-2021-21351 xstream: allow a remote attacker to load
and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1942643
[ 14 ] Bug #1966736 - CVE-2021-29505 xstream: remote command execution attack
by manipulating the processed input stream [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1966736
[ 15 ] Bug #1997764 - CVE-2021-39139 xstream: vulnerable to an arbitrary code
execution attack by manipulating the processed input stream with type information [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1997764
[ 16 ] Bug #1997767 - CVE-2021-39140 xstream: DoS by manipulating the
processed input stream [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1997767
[ 17 ] Bug #1997770 - CVE-2021-39141 xstream: vulnerable to an arbitrary code
execution attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1997770
[ 18 ] Bug #1997773 - CVE-2021-39144 xstream: vulnerable to a remote command
execution attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1997773
[ 19 ] Bug #1997776 - CVE-2021-39145 xstream: vulnerable to an arbitrary code
execution attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1997776
[ 20 ] Bug #1997778 - CVE-2021-39146 xstream: vulnerable to an arbitrary code
execution attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1997778
[ 21 ] Bug #1997780 - CVE-2021-39147 xstream: vulnerable to an arbitrary code
execution attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1997780
[ 22 ] Bug #1997782 - CVE-2021-39148 xstream: vulnerable to an arbitrary code
execution attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1997782
[ 23 ] Bug #1997785 - CVE-2021-39149 xstream: vulnerable to an arbitrary code
execution attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1997785
[ 24 ] Bug #1997788 - CVE-2021-39150 xstream: SSRF can be activated
unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1997788
[ 25 ] Bug #1997792 - CVE-2021-39151 xstream: vulnerable to an arbitrary code
execution attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1997792
[ 26 ] Bug #1997794 - CVE-2021-39152 xstream: SSRF can be activated
unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1997794
[ 27 ] Bug #1997796 - CVE-2021-39153 xstream: vulnerable to an arbitrary code
execution attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1997796
[ 28 ] Bug #1997802 - CVE-2021-39154 xstream: vulnerable to an arbitrary code
execution attack [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1997802
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-d894ca87dc' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung