[USN-5946-1] XStream vulnerabilities

Amir Naseredini amir.naseredini at canonical.com
Mon Mar 13 13:06:21 UTC 2023


==========================================================================
Ubuntu Security Notice USN-5946-1
March 13, 2023

libxstream-java vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in XStream.

Software Description:
- libxstream-java: Java library to serialize objects to XML and back again

Details:

Lai Han discovered that XStream incorrectly handled certain inputs.
If a user or an automated system were tricked into opening a specially 
crafted
input file, a remote attacker could possibly use this issue to cause a 
denial
of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2021-39140)

It was discovered that XStream incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to execute
arbitrary code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04
LTS. (CVE-2021-39139, CVE-2021-39141, CVE-2021-39144, CVE-2021-39145,
CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149,
CVE-2021-39151, CVE-2021-39153, CVE-2021-39154)

It was discovered that XStream incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to obtain
sensitive information. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2021-39150, CVE-2021-39152)

Lai Han discovered that XStream incorrectly handled certain inputs.
If a user or an automated system were tricked into opening a specially 
crafted
input file, a remote attacker could possibly use this issue to cause a 
denial
of service. (CVE-2022-41966)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
   libxstream-java                 1.4.19-1ubuntu0.1

Ubuntu 22.04 LTS:
   libxstream-java                 1.4.18-2ubuntu0.1

Ubuntu 20.04 LTS:
   libxstream-java                 1.4.11.1-1ubuntu0.3

Ubuntu 18.04 LTS:
   libxstream-java                 1.4.11.1-1+deb10u4build0.18.04.1

Ubuntu 16.04 ESM:
   libxstream-java                 1.4.8-1ubuntu0.1+esm1

Ubuntu 14.04 ESM:
   libxstream-java                 1.4.7-1ubuntu0.1+esm1

In general, a standard system update will make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-5946-1
   CVE-2021-39139, CVE-2021-39140, CVE-2021-39141, CVE-2021-39144,
   CVE-2021-39145, CVE-2021-39146, CVE-2021-39147, CVE-2021-39148,
   CVE-2021-39149, CVE-2021-39150, CVE-2021-39151, CVE-2021-39152,
   CVE-2021-39153, CVE-2021-39154, CVE-2022-41966

Package Information:
   https://launchpad.net/ubuntu/+source/libxstream-java/1.4.19-1ubuntu0.1
   https://launchpad.net/ubuntu/+source/libxstream-java/1.4.18-2ubuntu0.1
   https://launchpad.net/ubuntu/+source/libxstream-java/1.4.11.1-1ubuntu0.3
 
https://launchpad.net/ubuntu/+source/libxstream-java/1.4.11.1-1+deb10u4build0.18.04.1

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0x56383E35D153B8B2.asc
Type: application/pgp-keys
Size: 3208 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20230313/9f1cf62d/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 665 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20230313/9f1cf62d/attachment.sig>


More information about the ubuntu-security-announce mailing list