Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.3251 libxstream-java security update 30 September 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: libxstream-java Publisher: Debian Operating System: Debian GNU/Linux UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Denial of Service -- Existing Account Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-39154 CVE-2021-39153 CVE-2021-39152 CVE-2021-39151 CVE-2021-39150 CVE-2021-39149 CVE-2021-39148 CVE-2021-39147 CVE-2021-39146 CVE-2021-39145 CVE-2021-39144 CVE-2021-39141 CVE-2021-39140 CVE-2021-39139 Original Bulletin: http://www.debian.org/lts/security/2021/dla-2769 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running libxstream-java check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2769-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Markus Koschany September 29, 2021 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : libxstream-java Version : 1.4.11.1-1+deb9u4 CVE ID : CVE-2021-39139 CVE-2021-39140 CVE-2021-39141 CVE-2021-39144 CVE-2021-39145 CVE-2021-39146 CVE-2021-39147 CVE-2021-39148 CVE-2021-39149 CVE-2021-39150 CVE-2021-39151 CVE-2021-39152 CVE-2021-39153 CVE-2021-39154 Multiple security vulnerabilities have been discovered in XStream, a Java library to serialize objects to XML and back again. These vulnerabilities may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. XStream itself sets up a whitelist by default now, i.e. it blocks all classes except those types it has explicit converters for. It used to have a blacklist by default, i.e. it tried to block all currently known critical classes of the Java runtime. Main reason for the blacklist were compatibility, it allowed to use newer versions of XStream as drop-in replacement. However, this approach has failed. A growing list of security reports has proven, that a blacklist is inherently unsafe, apart from the fact that types of 3rd libraries were not even considered. A blacklist scenario should be avoided in general, because it provides a false sense of security. See also https://x-stream.github.io/security.html#framework For Debian 9 stretch, these problems have been fixed in version 1.4.11.1-1+deb9u4. We recommend that you upgrade your libxstream-java packages. For the detailed security status of libxstream-java please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libxstream-java Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQKTBAABCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmFU9pFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeTH7g/+Nf0ETVemHVCxH9x5u5oufe4Cq4or4GX6Tt9ja4VL4R0rlIN7XO39mrvH BE/TZ8lfu/pq84335BlROxJWJ3Jut1hA0bMULNTZ7MMuMU4wjUzTmp+dyhV4oiet OzSGFd+ZvuG6Px38vMDFASGHvAYJHdZge9HZtwWP4W5c6OdQOSWFHMPrxZzOBJlq 7binsaV845VLTYu12K3Qxd3xvq0LozKHBVMG4bMmG57M/Z8rDphma8c51m+WpDLu jUCFErj/ltZvOf1vKogw4Lm7VhfezrCyPAUNz9S6D+orqVPpYW0CFmjt4DONaGoa xYThrdAzn/v+fR3QjOy1dDF068pStodFFx9pjiG4xun3gnoJxba9nkqVD977qzXn PxTBfKlvXV8i/2lCAGsZnhruELlKoWD4LeHEXQtDwcYEtvAMmpqhFprypU0Ps4BH E4+4q4r8uXNXnVSLJotmI2scZ4e0nemYJX7U95ywxl120iO25iPs78zgQwxJ4HS4 iKOXTI3vdiznBOX9AS6RikrzlypL9VflsGQ98GBmRzqbLXtYXpTTTCe8BVNdKI7U HSPhQOj/2ondTwBck/zEffV7fHAoQLSjTWgkJBq7WlJ8PVaRVRPys8dgPIN1ftdg w1hPcf0qH4Ooln6YczwuEPkwBBAOSElOQrui39DMMr6VtL3rggU= =wja5 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYVVMIONLKJtyKPYoAQjXbA//fKzoflByKDjGSEgOOB2IaGHB7lJITVV0 t4+xkUNnX4jHKyMkO3suoc+7nMtnmqchVlgR7jAFcBjvQ0v6AJKiNqftJvCswlc5 KzMCHA908wZr85LQu+4FojHoubxrdONfVsXfCKvx+jSsBO2hh6c33c3leHdEUJKP V/vyI3zXel+qR/P6ZXmRpanpcgXRV0NxygRq4SHKb9R+VIKQcld6qFxYSkRiTGc8 enGJs7354Pjp5yFrpdXtcv1K8H7Q8UFOq+eYOpmaXBT+aNgUTYihpH228V+F60yX RgGh9244aUVmwGkBoRCHNRVvRMcF+iRRDiPcz3E+aWk6TOUqLGXT0BE/yB+zHjlR TIkAw7avFGA71muxKxfTvCihXBrvnAkZIoJiO2tXj0+PZUQs/V06Ey5FxuIgLKu6 XCHGjzcC0lCZJDj88EDzjie0d0neBEqam+K4hRepPGAdegRLnnexaZP/dp7f39ot sHBhJKUhOa32ZgxJkdiUizwHe/S2zVptuIEvuuX0lTmGouugk0YgGBP3kgkYlqcL U68I5RAGIU0dpEB/sc+iHEp3d9zcGhsU/XEvfwqs/TtDpOpX6iGdE06HtIEEj136 xcvhsSjwW0zAzx9VjYIiNKOWAWwDdR0pnXKbIu+5XcGjBHv8lvL8fj86K8HJ++m2 /qT5L+F3OKU= =8fxI -----END PGP SIGNATURE-----