--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2021-fbad11014a
2021-10-12 23:45:00.369090
--------------------------------------------------------------------------------Name        : xstream
Product     : Fedora 33
Version     : 1.4.18
Release     : 2.fc33
URL         : https://x-stream.github.io
Summary     : Java XML serialization library
Description :
XStream is a simple library to serialize objects to XML
and back again. A high level facade is supplied that
simplifies common use cases. Custom objects can be serialized
without need for specifying mappings. Speed and low memory
footprint are a crucial part of the design, making it suitable
for large object graphs or systems with high message throughput.
No information is duplicated that can be obtained via reflection.
This results in XML that is easier to read for humans and more
compact than native Java serialization. XStream serializes internal
fields, including private and final. Supports non-public and inner
classes. Classes are not required to have default constructor.
Duplicate references encountered in the object-model will be
maintained. Supports circular references. By implementing an
interface, XStream can serialize directly to/from any tree
structure (not just XML). Strategies can be registered allowing
customization of how particular types are represented as XML.
When an exception occurs due to malformed XML, detailed diagnostics
are provided to help isolate and fix the problem.

--------------------------------------------------------------------------------Update Information:

``` * Mon Oct 04 2021 Didik Supriadi  -1.4.18-2 - Enable activation, cglib, dom4j, jdom, and jdom2   * Fri Oct 01 2021
Didik Supriadi  - 1.4.18-1 - Update to
version 1.4.18 ```
--------------------------------------------------------------------------------ChangeLog:

* Mon Oct  4 2021 Didik Supriadi  - 1.4.18-2
- Enable activation, cglib, dom4j, jdom, and jdom2
* Fri Oct  1 2021 Didik Supriadi  - 1.4.18-1
- Update to version 1.4.18
* Fri Jul 23 2021 Fedora Release Engineering  - 1.4.14-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
* Thu Jan 28 2021 Fedora Release Engineering  - 1.4.14-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1908833 - CVE-2020-26258 xstream: Server-Side Forgery Request vulnerability can be activated when unmarshalling [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1908833
  [ 2 ] Bug #1908838 - CVE-2020-26259 xstream: arbitrary file deletion on the local host when unmarshalling [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1908838
  [ 3 ] Bug #1942540 - CVE-2021-21341 xstream: allow a remote attacker to cause DoS only by manipulating the processed input stream [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1942540
  [ 4 ] Bug #1942547 - CVE-2021-21342 xstream: SSRF via crafted input stream [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1942547
  [ 5 ] Bug #1942551 - CVE-2021-21343 xstream: arbitrary file deletion on the local host via crafted input stream [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1942551
  [ 6 ] Bug #1942556 - CVE-2021-21344 xstream: arbitrary code execution via crafted input stream [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1942556
  [ 7 ] Bug #1942560 - CVE-2021-21345 xstream: allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1942560
  [ 8 ] Bug #1942579 - CVE-2021-21346 xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1942579
  [ 9 ] Bug #1942631 - CVE-2021-21347 xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1942631
  [ 10 ] Bug #1942634 - CVE-2021-21348 xstream: ReDoS vulnerability [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1942634
  [ 11 ] Bug #1942636 - CVE-2021-21349 xstream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1942636
  [ 12 ] Bug #1942638 - CVE-2021-21350 xstream: allow a remote attacker to execute arbitrary code only by manipulating the processed input stream [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1942638
  [ 13 ] Bug #1942643 - CVE-2021-21351 xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1942643
  [ 14 ] Bug #1966736 - CVE-2021-29505 xstream: remote command execution attack by manipulating the processed input stream [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1966736
  [ 15 ] Bug #1997764 - CVE-2021-39139 xstream: vulnerable to an arbitrary code execution attack by manipulating the processed input stream with type information [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1997764
  [ 16 ] Bug #1997767 - CVE-2021-39140 xstream: DoS by manipulating the processed input stream [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1997767
  [ 17 ] Bug #1997770 - CVE-2021-39141 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1997770
  [ 18 ] Bug #1997773 - CVE-2021-39144 xstream: vulnerable to a remote command execution attack [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1997773
  [ 19 ] Bug #1997776 - CVE-2021-39145 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1997776
  [ 20 ] Bug #1997778 - CVE-2021-39146 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1997778
  [ 21 ] Bug #1997780 - CVE-2021-39147 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1997780
  [ 22 ] Bug #1997782 - CVE-2021-39148 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1997782
  [ 23 ] Bug #1997785 - CVE-2021-39149 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1997785
  [ 24 ] Bug #1997788 - CVE-2021-39150 xstream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1997788
  [ 25 ] Bug #1997792 - CVE-2021-39151 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1997792
  [ 26 ] Bug #1997794 - CVE-2021-39152 xstream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1997794
  [ 27 ] Bug #1997796 - CVE-2021-39153 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1997796
  [ 28 ] Bug #1997802 - CVE-2021-39154 xstream: vulnerable to an arbitrary code execution attack [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1997802
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-fbad11014a' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
--------------------------------------------------------------------------------_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Fedora 33: xstream 2021-fbad11014a

October 12, 2021
``` * Mon Oct 04 2021 Didik Supriadi - 1.4.18-2 - Enable activation, cglib, dom4j, jdom, and jdom2 * Fri Oct 01 2021 Didik Supriadi

Summary

XStream is a simple library to serialize objects to XML

and back again. A high level facade is supplied that

simplifies common use cases. Custom objects can be serialized

without need for specifying mappings. Speed and low memory

footprint are a crucial part of the design, making it suitable

for large object graphs or systems with high message throughput.

No information is duplicated that can be obtained via reflection.

This results in XML that is easier to read for humans and more

compact than native Java serialization. XStream serializes internal

fields, including private and final. Supports non-public and inner

classes. Classes are not required to have default constructor.

Duplicate references encountered in the object-model will be

maintained. Supports circular references. By implementing an

interface, XStream can serialize directly to/from any tree

structure (not just XML). Strategies can be registered allowing

customization of how particular types are represented as XML.

When an exception occurs due to malformed XML, detailed diagnostics

are provided to help isolate and fix the problem.

``` * Mon Oct 04 2021 Didik Supriadi -1.4.18-2 - Enable activation, cglib, dom4j, jdom, and jdom2 * Fri Oct 01 2021

Didik Supriadi - 1.4.18-1 - Update to

version 1.4.18 ```

* Mon Oct 4 2021 Didik Supriadi - 1.4.18-2

- Enable activation, cglib, dom4j, jdom, and jdom2

* Fri Oct 1 2021 Didik Supriadi - 1.4.18-1

- Update to version 1.4.18

* Fri Jul 23 2021 Fedora Release Engineering - 1.4.14-3

- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild

* Thu Jan 28 2021 Fedora Release Engineering - 1.4.14-2

- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild

[ 1 ] Bug #1908833 - CVE-2020-26258 xstream: Server-Side Forgery Request vulnerability can be activated when unmarshalling [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1908833

[ 2 ] Bug #1908838 - CVE-2020-26259 xstream: arbitrary file deletion on the local host when unmarshalling [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1908838

[ 3 ] Bug #1942540 - CVE-2021-21341 xstream: allow a remote attacker to cause DoS only by manipulating the processed input stream [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1942540

[ 4 ] Bug #1942547 - CVE-2021-21342 xstream: SSRF via crafted input stream [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1942547

[ 5 ] Bug #1942551 - CVE-2021-21343 xstream: arbitrary file deletion on the local host via crafted input stream [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1942551

[ 6 ] Bug #1942556 - CVE-2021-21344 xstream: arbitrary code execution via crafted input stream [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1942556

[ 7 ] Bug #1942560 - CVE-2021-21345 xstream: allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1942560

[ 8 ] Bug #1942579 - CVE-2021-21346 xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1942579

[ 9 ] Bug #1942631 - CVE-2021-21347 xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1942631

[ 10 ] Bug #1942634 - CVE-2021-21348 xstream: ReDoS vulnerability [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1942634

[ 11 ] Bug #1942636 - CVE-2021-21349 xstream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1942636

[ 12 ] Bug #1942638 - CVE-2021-21350 xstream: allow a remote attacker to execute arbitrary code only by manipulating the processed input stream [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1942638

[ 13 ] Bug #1942643 - CVE-2021-21351 xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1942643

[ 14 ] Bug #1966736 - CVE-2021-29505 xstream: remote command execution attack by manipulating the processed input stream [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1966736

[ 15 ] Bug #1997764 - CVE-2021-39139 xstream: vulnerable to an arbitrary code execution attack by manipulating the processed input stream with type information [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1997764

[ 16 ] Bug #1997767 - CVE-2021-39140 xstream: DoS by manipulating the processed input stream [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1997767

[ 17 ] Bug #1997770 - CVE-2021-39141 xstream: vulnerable to an arbitrary code execution attack [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1997770

[ 18 ] Bug #1997773 - CVE-2021-39144 xstream: vulnerable to a remote command execution attack [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1997773

[ 19 ] Bug #1997776 - CVE-2021-39145 xstream: vulnerable to an arbitrary code execution attack [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1997776

[ 20 ] Bug #1997778 - CVE-2021-39146 xstream: vulnerable to an arbitrary code execution attack [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1997778

[ 21 ] Bug #1997780 - CVE-2021-39147 xstream: vulnerable to an arbitrary code execution attack [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1997780

[ 22 ] Bug #1997782 - CVE-2021-39148 xstream: vulnerable to an arbitrary code execution attack [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1997782

[ 23 ] Bug #1997785 - CVE-2021-39149 xstream: vulnerable to an arbitrary code execution attack [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1997785

[ 24 ] Bug #1997788 - CVE-2021-39150 xstream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1997788

[ 25 ] Bug #1997792 - CVE-2021-39151 xstream: vulnerable to an arbitrary code execution attack [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1997792

[ 26 ] Bug #1997794 - CVE-2021-39152 xstream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1997794

[ 27 ] Bug #1997796 - CVE-2021-39153 xstream: vulnerable to an arbitrary code execution attack [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1997796

[ 28 ] Bug #1997802 - CVE-2021-39154 xstream: vulnerable to an arbitrary code execution attack [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1997802

su -c 'dnf upgrade --advisory FEDORA-2021-fbad11014a' at the command

line. For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

FEDORA-2021-fbad11014a 2021-10-12 23:45:00.369090 Product : Fedora 33 Version : 1.4.18 Release : 2.fc33 URL : https://x-stream.github.io Summary : Java XML serialization library Description : XStream is a simple library to serialize objects to XML and back again. A high level facade is supplied that simplifies common use cases. Custom objects can be serialized without need for specifying mappings. Speed and low memory footprint are a crucial part of the design, making it suitable for large object graphs or systems with high message throughput. No information is duplicated that can be obtained via reflection. This results in XML that is easier to read for humans and more compact than native Java serialization. XStream serializes internal fields, including private and final. Supports non-public and inner classes. Classes are not required to have default constructor. Duplicate references encountered in the object-model will be maintained. Supports circular references. By implementing an interface, XStream can serialize directly to/from any tree structure (not just XML). Strategies can be registered allowing customization of how particular types are represented as XML. When an exception occurs due to malformed XML, detailed diagnostics are provided to help isolate and fix the problem. ``` * Mon Oct 04 2021 Didik Supriadi -1.4.18-2 - Enable activation, cglib, dom4j, jdom, and jdom2 * Fri Oct 01 2021 Didik Supriadi - 1.4.18-1 - Update to version 1.4.18 ``` * Mon Oct 4 2021 Didik Supriadi - 1.4.18-2 - Enable activation, cglib, dom4j, jdom, and jdom2 * Fri Oct 1 2021 Didik Supriadi - 1.4.18-1 - Update to version 1.4.18 * Fri Jul 23 2021 Fedora Release Engineering - 1.4.14-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild * Thu Jan 28 2021 Fedora Release Engineering - 1.4.14-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild [ 1 ] Bug #1908833 - CVE-2020-26258 xstream: Server-Side Forgery Request vulnerability can be activated when unmarshalling [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1908833 [ 2 ] Bug #1908838 - CVE-2020-26259 xstream: arbitrary file deletion on the local host when unmarshalling [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1908838 [ 3 ] Bug #1942540 - CVE-2021-21341 xstream: allow a remote attacker to cause DoS only by manipulating the processed input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942540 [ 4 ] Bug #1942547 - CVE-2021-21342 xstream: SSRF via crafted input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942547 [ 5 ] Bug #1942551 - CVE-2021-21343 xstream: arbitrary file deletion on the local host via crafted input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942551 [ 6 ] Bug #1942556 - CVE-2021-21344 xstream: arbitrary code execution via crafted input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942556 [ 7 ] Bug #1942560 - CVE-2021-21345 xstream: allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942560 [ 8 ] Bug #1942579 - CVE-2021-21346 xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942579 [ 9 ] Bug #1942631 - CVE-2021-21347 xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942631 [ 10 ] Bug #1942634 - CVE-2021-21348 xstream: ReDoS vulnerability [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942634 [ 11 ] Bug #1942636 - CVE-2021-21349 xstream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942636 [ 12 ] Bug #1942638 - CVE-2021-21350 xstream: allow a remote attacker to execute arbitrary code only by manipulating the processed input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942638 [ 13 ] Bug #1942643 - CVE-2021-21351 xstream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1942643 [ 14 ] Bug #1966736 - CVE-2021-29505 xstream: remote command execution attack by manipulating the processed input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1966736 [ 15 ] Bug #1997764 - CVE-2021-39139 xstream: vulnerable to an arbitrary code execution attack by manipulating the processed input stream with type information [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997764 [ 16 ] Bug #1997767 - CVE-2021-39140 xstream: DoS by manipulating the processed input stream [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997767 [ 17 ] Bug #1997770 - CVE-2021-39141 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997770 [ 18 ] Bug #1997773 - CVE-2021-39144 xstream: vulnerable to a remote command execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997773 [ 19 ] Bug #1997776 - CVE-2021-39145 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997776 [ 20 ] Bug #1997778 - CVE-2021-39146 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997778 [ 21 ] Bug #1997780 - CVE-2021-39147 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997780 [ 22 ] Bug #1997782 - CVE-2021-39148 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997782 [ 23 ] Bug #1997785 - CVE-2021-39149 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997785 [ 24 ] Bug #1997788 - CVE-2021-39150 xstream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997788 [ 25 ] Bug #1997792 - CVE-2021-39151 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997792 [ 26 ] Bug #1997794 - CVE-2021-39152 xstream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997794 [ 27 ] Bug #1997796 - CVE-2021-39153 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997796 [ 28 ] Bug #1997802 - CVE-2021-39154 xstream: vulnerable to an arbitrary code execution attack [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1997802 su -c 'dnf upgrade --advisory FEDORA-2021-fbad11014a' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/ Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Change Log

References

Update Instructions

Severity
Product : Fedora 33
Version : 1.4.18
Release : 2.fc33
URL : https://x-stream.github.io
Summary : Java XML serialization library

Related News