Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1441538 - (CVE-2017-7957) CVE-2017-7957 XStream: DoS when unmarshalling void type
CVE-2017-7957 XStream: DoS when unmarshalling void type
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20170403,repor...
: Security
Depends On: 1598351 1441541 1441542 1472040 1472041 1481373 1598330
Blocks: 1441543 1497821 1500546 1551389
  Show dependency treegraph
 
Reported: 2017-04-12 04:12 EDT by Andrej Nemec
Modified: 2018-07-05 03:51 EDT (History)
54 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
It was found that XStream contains a vulnerability that allows a maliciously crafted file to be parsed successfully which could cause an application crash. The crash occurs if the file that is being fed into XStream input stream contains an instances of the primitive type 'void'. An attacker could use this flaw to create a denial of service on the target system.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-10-16 09:44:00 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:1832 normal SHIPPED_LIVE Important: Red Hat JBoss Fuse/A-MQ 6.3 R4 security and bug fix update 2017-08-15 01:47:49 EDT
Red Hat Product Errata RHSA-2017:2888 normal SHIPPED_LIVE Important: Red Hat JBoss BRMS 6.4.6 security update 2017-10-12 21:59:23 EDT
Red Hat Product Errata RHSA-2017:2889 normal SHIPPED_LIVE Important: Red Hat JBoss BPM Suite 6.4.6 security update 2017-10-12 21:59:42 EDT

  None (edit)
Description Andrej Nemec 2017-04-12 04:12:40 EDT
A vulnerability was found in XStream. Parsing a maliciously crafted file could cause the application to crash.

The processed stream at unmarshalling type contains type information to  recreate the formerly written objects. XStream creates therefore new instances based on these type information. The crash occurrs if this information advices XStream to create an instance of the primitive type 'void'. This situation can only happen if an attacker was able to manipulate the incoming data, since such an instance does not exist.

References:

http://seclists.org/oss-sec/2017/q2/9
Comment 1 Andrej Nemec 2017-04-12 04:18:00 EDT
Created jenkins-xstream tracking bugs for this issue:

Affects: fedora-all [bug 1441541]


Created xstream tracking bugs for this issue:

Affects: fedora-all [bug 1441542]
Comment 5 Andrej Nemec 2017-05-02 10:03:20 EDT
External References:

http://x-stream.github.io/CVE-2017-7957.html
Comment 8 errata-xmlrpc 2017-08-10 19:04:30 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Fuse

Via RHSA-2017:1832 https://access.redhat.com/errata/RHSA-2017:1832
Comment 9 Kurt Seifried 2017-08-14 14:47:58 EDT
Created xstream tracking bugs for this issue:

Affects: fedora-all [bug 1481373]
Comment 12 errata-xmlrpc 2017-10-12 17:59:58 EDT
This issue has been addressed in the following products:

  Red Hat JBoss BRMS

Via RHSA-2017:2888 https://access.redhat.com/errata/RHSA-2017:2888
Comment 13 errata-xmlrpc 2017-10-12 18:00:55 EDT
This issue has been addressed in the following products:

  Red Hat JBoss BPM Suite

Via RHSA-2017:2889 https://access.redhat.com/errata/RHSA-2017:2889
Comment 17 Doran Moppert 2018-07-05 03:08:24 EDT
Created xstream tracking bugs for this issue:

Affects: fedora-all [bug 1598330]

Note You need to log in before you can comment on or make changes to this bug.