A vulnerability was found in XStream. Parsing a maliciously crafted file could cause the application to crash. The processed stream at unmarshalling type contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. The crash occurrs if this information advices XStream to create an instance of the primitive type 'void'. This situation can only happen if an attacker was able to manipulate the incoming data, since such an instance does not exist. References: http://seclists.org/oss-sec/2017/q2/9
Created jenkins-xstream tracking bugs for this issue: Affects: fedora-all [bug 1441541] Created xstream tracking bugs for this issue: Affects: fedora-all [bug 1441542]
External References: http://x-stream.github.io/CVE-2017-7957.html
This issue has been addressed in the following products: Red Hat JBoss Fuse Via RHSA-2017:1832 https://access.redhat.com/errata/RHSA-2017:1832
Created xstream tracking bugs for this issue: Affects: fedora-all [bug 1481373]
This issue has been addressed in the following products: Red Hat JBoss BRMS Via RHSA-2017:2888 https://access.redhat.com/errata/RHSA-2017:2888
This issue has been addressed in the following products: Red Hat JBoss BPM Suite Via RHSA-2017:2889 https://access.redhat.com/errata/RHSA-2017:2889
Created xstream tracking bugs for this issue: Affects: fedora-all [bug 1598330]