it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Markus Koschany <apo AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5315-1] libxstream-java security update
- Date: Wed, 11 Jan 2023 22:35:02 +0000
- Authentication-results: mail.piratenpartei.de; dkim=none; dmarc=none; spf=none (mail.piratenpartei.de: domain of "bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org" has no SPF policy when checking 82.195.75.100) smtp.mailfrom="bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org"
- List-archive: https://lists.debian.org/msgid-search/Y785lvQoO82rhaDw AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=nWb75gpb2+bLO1NVamVmYRvx17lMX4lqJPx8qJF2yiw=; b=hF RjNGeJuz4kYMl0XgaBTo5kqVYtyv9wEnvUx1NenSKitIpFAoQ4KGDzfxlPZiPpbOwvPMbPijJoMAb 2phRPLT7y0ZDnH9PnK0gFIYXxK+KRwPhyH+MqL4dX3/fiFexv31ketpiuBU2l4aFHsM+BTenqwF+G tiqQXzcF3LJYoQpE8e41gCu7ApQQLFoEwdynJrgUuMuN0ytGBExIub5eKDnDtpz/Iu68JjRkVIW6k gYeeKi/5AWJtfdFfhEeBUB1L1Fhu/cUAtmMXKRCd0eVNfH+gUIqPuJy9MziHvb69Tms4y3jAWf5O9 jrWggB91X3VnDdJuPvTxr/bACdTik9fQ==;
- Old-return-path: <apo AT seger.debian.org>
- Priority: urgent
- Resent-date: Wed, 11 Jan 2023 22:51:12 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <MpQ6pKyVM8D.A.XJE.g1zvjB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5315-1 security AT debian.org
https://www.debian.org/security/ Markus Koschany
January 11, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libxstream-java
CVE ID : CVE-2022-41966
Debian Bug : 1027754
XStream serializes Java objects to XML and back again. Versions prior to
1.4.15-3+deb11u2 may allow a remote attacker to terminate the application with
a stack overflow error, resulting in a denial of service only via manipulation
of the processed input stream. The attack uses the hash code implementation
for
collections and maps to force recursive hash calculation causing a stack
overflow. This update handles the stack overflow and raises an
InputManipulationException instead.
For the stable distribution (bullseye), this problem has been fixed in
version 1.4.15-3+deb11u2.
We recommend that you upgrade your libxstream-java packages.
For the detailed security status of libxstream-java please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libxstream-java
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=Bf6i
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5315-1] libxstream-java security update, Markus Koschany, 11.01.2023
Archiv bereitgestellt durch MHonArc 2.6.24.