CVE-2020-26217

NameCVE-2020-26217
DescriptionXStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2471-1, DSA-4811-1, ELA-326-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxstream-java (PTS)jessie, jessie (lts)1.4.11.1-1+deb8u6fixed
stretch (security)1.4.11.1-1+deb9u5fixed
stretch (lts), stretch1.4.11.1-1+deb9u6fixed
buster (security), buster, buster (lts)1.4.11.1-1+deb10u4fixed
bullseye1.4.15-3+deb11u2fixed
bullseye (security)1.4.15-3+deb11u3fixed
bookworm1.4.20-1fixed
sid, trixie1.4.21-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxstream-javasourcejessie1.4.7-2+deb8u3ELA-326-1
libxstream-javasourcestretch1.4.9-2+deb9u1DLA-2471-1
libxstream-javasourcebuster1.4.11.1-1+deb10u1DSA-4811-1
libxstream-javasource(unstable)1.4.14-1

Notes

https://x-stream.github.io/CVE-2020-26217.html
https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2
https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a

Search for package or bug name: Reporting problems