Malicious XML, when deserialized using XStream, can execute arbitrary code because the program runs the XML code specified without first verifying the type.
Upstream mailing list discussion: http://markmail.org/message/kfqoqdfj5fnup5co?q=list:org.codehaus.xstream.dev Upstream patch commit: https://fisheye.codehaus.org/changelog/xstream?cs=2210 External References: http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html
xstream 1.4.7 and 1.4.8 contains the fix
commit 9b1f3f6 (HEAD, master) Author: Patrice Clement <monsieurp@gentoo.org> Date: Sat Oct 31 17:31:57 2015 +0000 dev-java/xstream: Version bump. Fixes security bug 497652. Package-Manager: portage-2.2.20.1 Signed-off-by: Patrice Clement <monsieurp@gentoo.org> create mode 100644 dev-java/xstream/xstream-1.4.8.ebuild I needed it to bump groovy to its lastest iteration. Arch teams Please stabilise: =dev-java/xstream-1.4.8 Target arches: amd64 ppc ppc64 x86 Thank you!
There was a bug with xstream-1.4.8: this package does need Java 8, meaning at least a {jdk,jre} version >= 1.8. As a result, please stabilise: =dev-java/xstream-1.4.8-r1 Target arches: amd64 x86 (we don't support Java 8 on ppc+ppc64.. yet). Thank you.
This will have to wait until virtual/{jre,jdk}-1.8 is marked stable. James is working at it. Please bear with us.
CC back arches when 547912 is resolved.
Java 8 is stable now. Go forth, monsieurp!
amd64 stable
x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one.
commit 144dad3f486dbd6189724db13c28566110aaa482 (HEAD -> master) Author: Patrice Clement <monsieurp@gentoo.org> AuthorDate: Thu May 19 21:54:00 2016 +0100 Commit: Patrice Clement <monsieurp@gentoo.org> CommitDate: Thu May 19 23:27:26 2016 +0000 dev-java/xstream: Remove vulnerable version. Fixes bug 497652. Package-Manager: portage-2.2.28 dev-java/xstream/Manifest | 1 - dev-java/xstream/xstream-1.3.1-r4.ebuild | 62 -------------------------------------------------------------- 2 files changed, 63 deletions(-) delete mode 100644 dev-java/xstream/xstream-1.3.1-r4.ebuild
New GLSA created.
This issue was resolved and addressed in GLSA 201612-35 at https://security.gentoo.org/glsa/201612-35 by GLSA coordinator Aaron Bauman (b-man).