Your message dated Sat, 11 Jan 2025 11:03:09 +0000 with message-id <E1tWZGn-009jZI-46@coccia.debian.org> and subject line Close 1091084 has caused the Debian Bug report #1091084, regarding bookworm-pu: package libxstream-java 1.4.20-1+deb12u1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1091084: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091084 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>, Debian Bug Tracking System <submit@bugs.debian.org>
- Cc: Pierre Gruet <pgt@debian.org>, Pierre Gruet <pgt@debian.org>
- Subject: bookworm-pu: package libxstream-java 1.4.20-1+deb12u1
- From: Bastien Roucariès <rouca@debian.org>
- Date: Sun, 22 Dec 2024 10:42:18 +0000
- Message-id: <13147200.pX8ycCsDK1@portable-bastien>
Package: release.debian.org Severity: normal Tags: bookworm User: release.debian.org@packages.debian.org Usertags: pu X-Debbugs-CC: Pierre Gruet <pgt@debian.org> (Please provide enough information to help the release team to judge the request efficiently. E.g. by filling in the sections below.) [Reason] CVE-2024-47072: stack overflow [ Impact ] Remote DoS is likely possible [ Tests ] Manual test test does not backport [ Risks ] Code is simple. [ Checklist ] [X] *all* changes are documented in the d/changelog [X] I reviewed all changes and I approve them [X] attach debdiff against the package in (old)stable [X] the issue is verified as fixed in unstable [ Changes ] * Team upload * Fix CVE-2024-47072: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream. (Closes: #1087274) [ Other info ] pgt will likely reviewdiff -Nru libxstream-java-1.4.20/debian/changelog libxstream-java-1.4.20/debian/changelog --- libxstream-java-1.4.20/debian/changelog 2023-01-11 12:15:53.000000000 +0000 +++ libxstream-java-1.4.20/debian/changelog 2024-12-22 10:12:11.000000000 +0000 @@ -1,3 +1,13 @@ +libxstream-java (1.4.20-1+deb12u1) bookworm; urgency=medium + + * Team upload + * Fix CVE-2024-47072: XStream is vulnerable to a + Denial of Service attack due to stack overflow + from a manipulated binary input stream. + (Closes: #1087274) + + -- Bastien Roucariès <rouca@debian.org> Sun, 22 Dec 2024 10:12:11 +0000 + libxstream-java (1.4.20-1) unstable; urgency=medium * Team upload. diff -Nru libxstream-java-1.4.20/debian/patches/0004-CVE-2024-47072.patch libxstream-java-1.4.20/debian/patches/0004-CVE-2024-47072.patch --- libxstream-java-1.4.20/debian/patches/0004-CVE-2024-47072.patch 1970-01-01 00:00:00.000000000 +0000 +++ libxstream-java-1.4.20/debian/patches/0004-CVE-2024-47072.patch 2024-12-22 10:10:35.000000000 +0000 @@ -0,0 +1,61 @@ +From: joehni <joerg.schaible@gmx.de> +Date: Wed, 18 Sep 2024 20:19:13 +0200 +Subject: CVE-2024-47072 + +This vulnerability may allow a remote attacker to terminate the application +with a stack overflow error resulting in a denial of service only +by manipulating the processed input stream when XStream is configured +to use the BinaryStreamDrive + +origin: backport, https://github.com/x-stream/xstream/commit/fdd9f7d3de0d7ccf2f9979bcd09fbf3e6a0c881a +bug: https://github.com/x-stream/xstream/security/advisories/GHSA-hfq9-hggm-c56q +--- + .../xstream/io/binary/BinaryStreamReader.java | 18 ++++++++++++------ + 1 file changed, 12 insertions(+), 6 deletions(-) + +diff --git a/xstream/src/java/com/thoughtworks/xstream/io/binary/BinaryStreamReader.java b/xstream/src/java/com/thoughtworks/xstream/io/binary/BinaryStreamReader.java +index 2839651..cd870cd 100644 +--- a/xstream/src/java/com/thoughtworks/xstream/io/binary/BinaryStreamReader.java ++++ b/xstream/src/java/com/thoughtworks/xstream/io/binary/BinaryStreamReader.java +@@ -1,6 +1,6 @@ + /* + * Copyright (C) 2006 Joe Walnes. +- * Copyright (C) 2006, 2007, 2011, 2013 XStream Committers. ++ * Copyright (C) 2006, 2007, 2011, 2013, 2024 XStream Committers. + * All rights reserved. + * + * The software in this package is published under the terms of the BSD +@@ -15,6 +15,7 @@ import com.thoughtworks.xstream.converters.ErrorWriter; + import com.thoughtworks.xstream.io.ExtendedHierarchicalStreamReader; + import com.thoughtworks.xstream.io.HierarchicalStreamReader; + import com.thoughtworks.xstream.io.StreamException; ++import com.thoughtworks.xstream.security.InputManipulationException; + + import java.io.DataInputStream; + import java.io.IOException; +@@ -150,15 +151,20 @@ public class BinaryStreamReader implements ExtendedHierarchicalStreamReader { + private Token readToken() { + if (pushback == null) { + try { +- Token token = tokenFormatter.read(in); +- switch (token.getType()) { ++ boolean mapping = false; ++ do { ++ final Token token = tokenFormatter.read(in); ++ switch (token.getType()) { + case Token.TYPE_MAP_ID_TO_VALUE: + idRegistry.put(token.getId(), token.getValue()); +- return readToken(); // Next one please. ++ mapping ^= true; ++ continue; // Next one please. + default: + return token; +- } +- } catch (IOException e) { ++ } ++ } while (mapping); ++ throw new InputManipulationException("Binary stream will never have two mapping tokens in sequence"); ++ } catch (final IOException e) { + throw new StreamException(e); + } + } else { diff -Nru libxstream-java-1.4.20/debian/patches/series libxstream-java-1.4.20/debian/patches/series --- libxstream-java-1.4.20/debian/patches/series 2023-01-11 12:15:53.000000000 +0000 +++ libxstream-java-1.4.20/debian/patches/series 2024-12-22 10:10:35.000000000 +0000 @@ -1,3 +1,4 @@ 01-java7-compatibility.patch 02-disable-beastax-driver.patch no-mxparser.patch +0004-CVE-2024-47072.patchAttachment: signature.asc
Description: This is a digitally signed message part.
--- End Message ---
--- Begin Message ---
- To: 1091084-done@bugs.debian.org
- Subject: Close 1091084
- From: jmw@debian.org
- Date: Sat, 11 Jan 2025 11:03:09 +0000
- Message-id: <E1tWZGn-009jZI-46@coccia.debian.org>
Version: 12.9 This update has been released as part of 12.9. Thank you for your contribution.
--- End Message ---