-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2021-fbad11014a 2021-10-12 23:45:00.369090 --------------------------------------------------------------------------------
Name : xstream Product : Fedora 33 Version : 1.4.18 Release : 2.fc33 URL : https://x-stream.github.io Summary : Java XML serialization library Description : XStream is a simple library to serialize objects to XML and back again. A high level facade is supplied that simplifies common use cases. Custom objects can be serialized without need for specifying mappings. Speed and low memory footprint are a crucial part of the design, making it suitable for large object graphs or systems with high message throughput. No information is duplicated that can be obtained via reflection. This results in XML that is easier to read for humans and more compact than native Java serialization. XStream serializes internal fields, including private and final. Supports non-public and inner classes. Classes are not required to have default constructor. Duplicate references encountered in the object-model will be maintained. Supports circular references. By implementing an interface, XStream can serialize directly to/from any tree structure (not just XML). Strategies can be registered allowing customization of how particular types are represented as XML. When an exception occurs due to malformed XML, detailed diagnostics are provided to help isolate and fix the problem.
-------------------------------------------------------------------------------- Update Information:
``` * Mon Oct 04 2021 Didik Supriadi didiksupriadi41@fedoraproject.org - 1.4.18-2 - Enable activation, cglib, dom4j, jdom, and jdom2 * Fri Oct 01 2021 Didik Supriadi didiksupriadi41@fedoraproject.org - 1.4.18-1 - Update to version 1.4.18 ``` -------------------------------------------------------------------------------- ChangeLog:
* Mon Oct 4 2021 Didik Supriadi didiksupriadi41@fedoraproject.org - 1.4.18-2 - Enable activation, cglib, dom4j, jdom, and jdom2 * Fri Oct 1 2021 Didik Supriadi didiksupriadi41@fedoraproject.org - 1.4.18-1 - Update to version 1.4.18 * Fri Jul 23 2021 Fedora Release Engineering releng@fedoraproject.org - 1.4.14-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild * Thu Jan 28 2021 Fedora Release Engineering releng@fedoraproject.org - 1.4.14-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1908833 - CVE-2020-26258 xstream: Server-Side Forgery Request vulnerability can be activated when unmarshalling [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1908833 [ 2 ] Bug #1908838 - CVE-2020-26259 xstream: arbitrary file deletion on the local host when unmarshalling [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1908838 [ 3 ] Bug #1942540 - CVE-2021-21341 xstream: allow a remote attacker to cause DoS only by manipulating the processed input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942540 [ 4 ] Bug #1942547 - CVE-2021-21342 xstream: SSRF via crafted input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942547 [ 5 ] Bug #1942551 - CVE-2021-21343 xstream: arbitrary file deletion on the local host via crafted input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942551 [ 6 ] Bug #1942556 - CVE-2021-21344 xstream: arbitrary code execution via crafted input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942556 [ 7 ] Bug #1942560 - CVE-2021-21345 xstream: allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942560 [ 8 ] Bug #1942579 - CVE-2021-21346 xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942579 [ 9 ] Bug #1942631 - CVE-2021-21347 xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942631 [ 10 ] Bug #1942634 - CVE-2021-21348 xstream: ReDoS vulnerability [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942634 [ 11 ] Bug #1942636 - CVE-2021-21349 xstream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942636 [ 12 ] Bug #1942638 - CVE-2021-21350 xstream: allow a remote attacker to execute arbitrary code only by manipulating the processed input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942638 [ 13 ] Bug #1942643 - CVE-2021-21351 xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942643 [ 14 ] Bug #1966736 - CVE-2021-29505 xstream: remote command execution attack by manipulating the processed input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1966736 [ 15 ] Bug #1997764 - CVE-2021-39139 xstream: vulnerable to an arbitrary code execution attack by manipulating the processed input stream with type information [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997764 [ 16 ] Bug #1997767 - CVE-2021-39140 xstream: DoS by manipulating the processed input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997767 [ 17 ] Bug #1997770 - CVE-2021-39141 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997770 [ 18 ] Bug #1997773 - CVE-2021-39144 xstream: vulnerable to a remote command execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997773 [ 19 ] Bug #1997776 - CVE-2021-39145 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997776 [ 20 ] Bug #1997778 - CVE-2021-39146 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997778 [ 21 ] Bug #1997780 - CVE-2021-39147 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997780 [ 22 ] Bug #1997782 - CVE-2021-39148 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997782 [ 23 ] Bug #1997785 - CVE-2021-39149 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997785 [ 24 ] Bug #1997788 - CVE-2021-39150 xstream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997788 [ 25 ] Bug #1997792 - CVE-2021-39151 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997792 [ 26 ] Bug #1997794 - CVE-2021-39152 xstream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997794 [ 27 ] Bug #1997796 - CVE-2021-39153 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997796 [ 28 ] Bug #1997802 - CVE-2021-39154 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997802 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2021-fbad11014a' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------