First published: Mon Jul 12 2021(Updated: )
XStream is a Java XML serialization library to serialize objects to and deserialize object from XML.<br>Security Fix(es):<br><li> XStream: remote command execution attack by manipulating the processed input stream (CVE-2021-29505)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/xstream | <1.3.1-14.el7_9 | 1.3.1-14.el7_9 |
redhat/xstream | <1.3.1-14.el7_9 | 1.3.1-14.el7_9 |
redhat/xstream-javadoc | <1.3.1-14.el7_9 | 1.3.1-14.el7_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:2683 is rated as critical due to the potential for remote command execution.
To fix RHSA-2021:2683, update the xstream package to version 1.3.1-14.el7_9 or later.
RHSA-2021:2683 addresses a remote command execution vulnerability in the XStream library.
Version 1.3.1-14.el7_9 and earlier of the xstream package are affected by RHSA-2021:2683.
Yes, the xstream package and its javadoc variant are specifically impacted by RHSA-2021:2683.