https://bugzilla.redhat.com/show_bug.cgi?id=2049784
Bug ID: 2049784 Summary: CVE-2021-43859 xstream: Injecting highly recursive collections or maps can cause a DoS [fedora-all] Product: Fedora Version: 35 Status: NEW Component: xstream Keywords: Security, SecurityTracking Severity: medium Priority: medium Assignee: didiksupriadi41@gmail.com Reporter: gsuckevi@redhat.com QA Contact: extras-qa@fedoraproject.org CC: didiksupriadi41@gmail.com, fedoraproject.org@bluhm-de.com, java-sig-commits@lists.fedoraproject.org, lkundrak@v3.sk, mizdebsk@redhat.com Target Milestone: --- Classification: Fedora
This is an automatically created tracking bug! It was created to ensure that one or more security vulnerabilities are fixed in affected versions of fedora-all.
For comments that are specific to the vulnerability please use bugs filed against the "Security Response" product referenced in the "Blocks" field.
For more information see: http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next comment(s). This will include the bug IDs of this tracking bug as well as the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only one tracking bug has been filed, please correct all affected versions at the same time. If you need to fix the versions independent of each other, you may clone this bug as appropriate.
https://bugzilla.redhat.com/show_bug.cgi?id=2049784
--- Comment #1 from Guilherme de Almeida Suckevicz gsuckevi@redhat.com --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associated bugs get updated when new packages are pushed to stable.
=====
# bugfix, security, enhancement, newpackage (required) type=security
# low, medium, high, urgent (required) severity=medium
# testing, stable request=testing
# Bug numbers: 1234,9876 bugs=2049783,2049784
# Description of your update notes=Security fix for [PUT CVEs HERE]
# Enable request automation based on the stable/unstable karma thresholds autokarma=True stable_karma=3 unstable_karma=-3
# Automatically close bugs when this marked as stable close_bugs=True
# Suggest that users restart after update suggest_reboot=False
======
Additionally, you may opt to use the bodhi web interface to submit updates:
https://bodhi.fedoraproject.org/updates/new
https://bugzilla.redhat.com/show_bug.cgi?id=2049784
Guilherme de Almeida Suckevicz gsuckevi@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Blocks| |2049783 (CVE-2021-43859)
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2049783 [Bug 2049783] CVE-2021-43859 xstream: Injecting highly recursive collections or maps can cause a DoS
https://bugzilla.redhat.com/show_bug.cgi?id=2049784
Fedora Update System updates@fedoraproject.org changed:
What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |MODIFIED
--- Comment #2 from Fedora Update System updates@fedoraproject.org --- FEDORA-2022-983a78275c has been submitted as an update to Fedora 35. https://bodhi.fedoraproject.org/updates/FEDORA-2022-983a78275c
https://bugzilla.redhat.com/show_bug.cgi?id=2049784
--- Comment #3 from Fedora Update System updates@fedoraproject.org --- FEDORA-2022-ad5cf1c0dd has been submitted as an update to Fedora 34. https://bodhi.fedoraproject.org/updates/FEDORA-2022-ad5cf1c0dd
https://bugzilla.redhat.com/show_bug.cgi?id=2049784
Fedora Update System updates@fedoraproject.org changed:
What |Removed |Added ---------------------------------------------------------------------------- Status|MODIFIED |ON_QA
--- Comment #4 from Fedora Update System updates@fedoraproject.org --- FEDORA-2022-ad5cf1c0dd has been pushed to the Fedora 34 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2022-ad5cf1c0dd` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2022-ad5cf1c0dd
See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
https://bugzilla.redhat.com/show_bug.cgi?id=2049784
--- Comment #5 from Fedora Update System updates@fedoraproject.org --- FEDORA-2022-983a78275c has been pushed to the Fedora 35 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2022-983a78275c` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2022-983a78275c
See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
https://bugzilla.redhat.com/show_bug.cgi?id=2049784
Fedora Update System updates@fedoraproject.org changed:
What |Removed |Added ---------------------------------------------------------------------------- Status|ON_QA |CLOSED Resolution|--- |ERRATA Fixed In Version| |xstream-1.4.19-1.fc34 Last Closed| |2022-02-12 01:14:56
--- Comment #6 from Fedora Update System updates@fedoraproject.org --- FEDORA-2022-ad5cf1c0dd has been pushed to the Fedora 34 stable repository. If problem still persists, please make note of it in this bug report.
https://bugzilla.redhat.com/show_bug.cgi?id=2049784
Fedora Update System updates@fedoraproject.org changed:
What |Removed |Added ---------------------------------------------------------------------------- Fixed In Version|xstream-1.4.19-1.fc34 |xstream-1.4.19-1.fc34 | |xstream-1.4.19-1.fc35
--- Comment #7 from Fedora Update System updates@fedoraproject.org --- FEDORA-2022-983a78275c has been pushed to the Fedora 35 stable repository. If problem still persists, please make note of it in this bug report.
https://bugzilla.redhat.com/show_bug.cgi?id=2049784
--- Comment #8 from Fedora Update System updates@fedoraproject.org --- FEDORA-EPEL-2023-3e2af74f4d has been submitted as an update to Fedora EPEL 8. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-3e2af74f4d
https://bugzilla.redhat.com/show_bug.cgi?id=2049784
--- Comment #9 from Fedora Update System updates@fedoraproject.org --- FEDORA-EPEL-2023-3e2af74f4d has been pushed to the Fedora EPEL 8 testing repository.
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-3e2af74f4d
See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
https://bugzilla.redhat.com/show_bug.cgi?id=2049784
Fedora Update System updates@fedoraproject.org changed:
What |Removed |Added ---------------------------------------------------------------------------- Fixed In Version|xstream-1.4.19-1.fc34 |xstream-1.4.19-1.fc34 |xstream-1.4.19-1.fc35 |xstream-1.4.19-1.fc35 | |xstream-1.4.20-1.el8
--- Comment #10 from Fedora Update System updates@fedoraproject.org --- FEDORA-EPEL-2023-3e2af74f4d has been pushed to the Fedora EPEL 8 stable repository. If problem still persists, please make note of it in this bug report.
java-sig-commits@lists.fedoraproject.org