Fedora Linux 8782 Published by

A xstream security update has been released for Fedora 33.



SECURITY: Fedora 33 Update: xstream-1.4.18-2.fc33


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-fbad11014a
2021-10-12 23:45:00.369090
--------------------------------------------------------------------------------

Name : xstream
Product : Fedora 33
Version : 1.4.18
Release : 2.fc33
URL :   https://x-stream.github.io
Summary : Java XML serialization library
Description :
XStream is a simple library to serialize objects to XML
and back again. A high level facade is supplied that
simplifies common use cases. Custom objects can be serialized
without need for specifying mappings. Speed and low memory
footprint are a crucial part of the design, making it suitable
for large object graphs or systems with high message throughput.
No information is duplicated that can be obtained via reflection.
This results in XML that is easier to read for humans and more
compact than native Java serialization. XStream serializes internal
fields, including private and final. Supports non-public and inner
classes. Classes are not required to have default constructor.
Duplicate references encountered in the object-model will be
maintained. Supports circular references. By implementing an
interface, XStream can serialize directly to/from any tree
structure (not just XML). Strategies can be registered allowing
customization of how particular types are represented as XML.
When an exception occurs due to malformed XML, detailed diagnostics
are provided to help isolate and fix the problem.

--------------------------------------------------------------------------------
Update Information:

``` * Mon Oct 04 2021 Didik Supriadi -
1.4.18-2 - Enable activation, cglib, dom4j, jdom, and jdom2 * Fri Oct 01 2021
Didik Supriadi - 1.4.18-1 - Update to
version 1.4.18 ```
--------------------------------------------------------------------------------
ChangeLog:

* Mon Oct 4 2021 Didik Supriadi - 1.4.18-2
- Enable activation, cglib, dom4j, jdom, and jdom2
* Fri Oct 1 2021 Didik Supriadi - 1.4.18-1
- Update to version 1.4.18
* Fri Jul 23 2021 Fedora Release Engineering - 1.4.14-3
- Rebuilt for   https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
* Thu Jan 28 2021 Fedora Release Engineering - 1.4.14-2
- Rebuilt for   https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #1908833 - CVE-2020-26258 xstream: Server-Side Forgery Request vulnerability can be activated when unmarshalling [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1908833
[ 2 ] Bug #1908838 - CVE-2020-26259 xstream: arbitrary file deletion on the local host when unmarshalling [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1908838
[ 3 ] Bug #1942540 - CVE-2021-21341 xstream: allow a remote attacker to cause DoS only by manipulating the processed input stream [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1942540
[ 4 ] Bug #1942547 - CVE-2021-21342 xstream: SSRF via crafted input stream [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1942547
[ 5 ] Bug #1942551 - CVE-2021-21343 xstream: arbitrary file deletion on the local host via crafted input stream [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1942551
[ 6 ] Bug #1942556 - CVE-2021-21344 xstream: arbitrary code execution via crafted input stream [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1942556
[ 7 ] Bug #1942560 - CVE-2021-21345 xstream: allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1942560
[ 8 ] Bug #1942579 - CVE-2021-21346 xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1942579
[ 9 ] Bug #1942631 - CVE-2021-21347 xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1942631
[ 10 ] Bug #1942634 - CVE-2021-21348 xstream: ReDoS vulnerability [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1942634
[ 11 ] Bug #1942636 - CVE-2021-21349 xstream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1942636
[ 12 ] Bug #1942638 - CVE-2021-21350 xstream: allow a remote attacker to execute arbitrary code only by manipulating the processed input stream [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1942638
[ 13 ] Bug #1942643 - CVE-2021-21351 xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1942643
[ 14 ] Bug #1966736 - CVE-2021-29505 xstream: remote command execution attack by manipulating the processed input stream [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1966736
[ 15 ] Bug #1997764 - CVE-2021-39139 xstream: vulnerable to an arbitrary code execution attack by manipulating the processed input stream with type information [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1997764
[ 16 ] Bug #1997767 - CVE-2021-39140 xstream: DoS by manipulating the processed input stream [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1997767
[ 17 ] Bug #1997770 - CVE-2021-39141 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1997770
[ 18 ] Bug #1997773 - CVE-2021-39144 xstream: vulnerable to a remote command execution attack [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1997773
[ 19 ] Bug #1997776 - CVE-2021-39145 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1997776
[ 20 ] Bug #1997778 - CVE-2021-39146 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1997778
[ 21 ] Bug #1997780 - CVE-2021-39147 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1997780
[ 22 ] Bug #1997782 - CVE-2021-39148 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1997782
[ 23 ] Bug #1997785 - CVE-2021-39149 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1997785
[ 24 ] Bug #1997788 - CVE-2021-39150 xstream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1997788
[ 25 ] Bug #1997792 - CVE-2021-39151 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1997792
[ 26 ] Bug #1997794 - CVE-2021-39152 xstream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1997794
[ 27 ] Bug #1997796 - CVE-2021-39153 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1997796
[ 28 ] Bug #1997802 - CVE-2021-39154 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1997802
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-fbad11014a' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys