[Git][java-team/libxstream-java][buster] 3 commits: Add debian/patches/0004-Fix-CVE-2021-29505-from-upstream-commit-Closes-98949.patch

Markus Koschany (@apo) gitlab at salsa.debian.org
Fri Jun 18 14:10:30 BST 2021



Markus Koschany pushed to branch buster at Debian Java Maintainers / libxstream-java


Commits:
0cfdd479 by Hideki Yamane at 2021-06-17T22:01:56+09:00
Add debian/patches/0004-Fix-CVE-2021-29505-from-upstream-commit-Closes-98949.patch

- - - - -
dac776fe by Hideki Yamane at 2021-06-17T22:05:36+09:00
note to changelog (1.4.11.1-1+deb10u3) for buster-security

- - - - -
d4edc8dc by Markus Koschany at 2021-06-18T13:10:28+00:00
Merge branch 'buster' into 'buster'

CVE-2021-29505 for Buster

See merge request java-team/libxstream-java!2
- - - - -


3 changed files:

- debian/changelog
- + debian/patches/0004-Fix-CVE-2021-29505-from-upstream-commit-Closes-98949.patch
- debian/patches/series


Changes:

=====================================
debian/changelog
=====================================
@@ -1,3 +1,15 @@
+libxstream-java (1.4.11.1-1+deb10u3) buster-security; urgency=high
+
+  * Team upload.
+  * Fix CVE-2021-29505:
+    - The vulnerability may allow a remote attacker has sufficient rights
+      to execute commands of the host only by manipulating the processed
+      input stream. No user is affected, who followed the recommendation
+      to setup XStream's security framework with a whitelist limited to
+      the minimal required types.
+
+ -- Hideki Yamane <henrich at debian.org>  Thu, 17 Jun 2021 22:02:16 +0900
+
 libxstream-java (1.4.11.1-1+deb10u2) buster-security; urgency=high
 
   * Team upload.


=====================================
debian/patches/0004-Fix-CVE-2021-29505-from-upstream-commit-Closes-98949.patch
=====================================
@@ -0,0 +1,38 @@
+From: Hideki Yamane <henrich at debian.org>
+Date: Thu, 17 Jun 2021 21:42:35 +0900
+Subject: Fix CVE-2021-29505 from upstream commit (Closes:#989491)
+
+See https://github.com/x-stream/xstream/commit/f0c4a8d861b68ffc3119cfbbbd632deee624e227
+---
+ xstream/src/java/com/thoughtworks/xstream/XStream.java | 6 ++++--
+ 1 file changed, 4 insertions(+), 2 deletions(-)
+
+diff --git a/xstream/src/java/com/thoughtworks/xstream/XStream.java b/xstream/src/java/com/thoughtworks/xstream/XStream.java
+index b5e43af..7a166ca 100644
+--- a/xstream/src/java/com/thoughtworks/xstream/XStream.java
++++ b/xstream/src/java/com/thoughtworks/xstream/XStream.java
+@@ -336,11 +336,13 @@ public class XStream {
+     private static final Pattern IGNORE_ALL = Pattern.compile(".*");
+     private static final Pattern GETTER_SETTER_REFLECTION = Pattern.compile(".*\\$GetterSetterReflection");
+     private static final Pattern PRIVILEGED_GETTER = Pattern.compile(".*\\$PrivilegedGetter");
++    private static final Pattern LAZY_ENUMERATORS = Pattern.compile(".*\\.Lazy(?:Search)?Enumeration.*");
+     private static final Pattern LAZY_ITERATORS = Pattern.compile(".*\\$LazyIterator");
+     private static final Pattern JAXWS_ITERATORS = Pattern.compile(".*\\$ServiceNameIterator");
+     private static final Pattern JAVAFX_OBSERVABLE_LIST__ = Pattern.compile(
+         "javafx\\.collections\\.ObservableList\\$.*");
+     private static final Pattern JAVAX_CRYPTO = Pattern.compile("javax\\.crypto\\..*");
++    private static final Pattern JAVA_RMI = Pattern.compile("(?:java|sun)\\.rmi\\..*");
+     private static final Pattern BCEL_CL = Pattern.compile(".*\\.bcel\\..*\\.util\\.ClassLoader");
+ 
+     /**
+@@ -657,8 +659,8 @@ public class XStream {
+             "sun.awt.datatransfer.DataTransferer$IndexOrderComparator", //
+             "sun.swing.SwingLazyValue"});
+         denyTypesByRegExp(new Pattern[]{
+-            LAZY_ITERATORS, GETTER_SETTER_REFLECTION, PRIVILEGED_GETTER, JAVAX_CRYPTO, JAXWS_ITERATORS,
+-            JAVAFX_OBSERVABLE_LIST__, BCEL_CL});
++            LAZY_ITERATORS, LAZY_ENUMERATORS, GETTER_SETTER_REFLECTION, PRIVILEGED_GETTER, JAVA_RMI, JAVAX_CRYPTO,
++            JAXWS_ITERATORS, JAVAFX_OBSERVABLE_LIST__, BCEL_CL});
+         denyTypeHierarchy(InputStream.class);
+         denyTypeHierarchyDynamically("java.nio.channels.Channel");
+         denyTypeHierarchyDynamically("javax.activation.DataSource");


=====================================
debian/patches/series
=====================================
@@ -2,3 +2,4 @@
 CVE-2020-26217.patch
 CVE-2020-26258.patch
 CVE-2020-26259.patch
+0004-Fix-CVE-2021-29505-from-upstream-commit-Closes-98949.patch



View it on GitLab: https://salsa.debian.org/java-team/libxstream-java/-/compare/8b4c8a5457f2781e07207e9beecdddafb1cbea52...d4edc8dcd008a6373f4542f45f5da90401818d21

-- 
View it on GitLab: https://salsa.debian.org/java-team/libxstream-java/-/compare/8b4c8a5457f2781e07207e9beecdddafb1cbea52...d4edc8dcd008a6373f4542f45f5da90401818d21
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/pkg-java-commits/attachments/20210618/f7175329/attachment.htm>


More information about the pkg-java-commits mailing list