SUSE-SU-2021:3476-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:3476-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2021:3476-1
Related
Published
2021-10-20T06:42:25Z
Modified
2021-10-20T06:42:25Z
Summary
Security update for xstream
Details

This update for xstream fixes the following issues:

  • Upgrade to 1.4.18
  • CVE-2021-39139: Fixed an issue that allowed an attacker to execute arbitrary code execution by manipulating the processed input stream with type information. (bsc#1189798)
  • CVE-2021-39140: Fixed an issue that allowed an attacker to execute a DoS attack by manipulating the processed input stream. (bsc#1189798)
  • CVE-2021-39141: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
  • CVE-2021-39144: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
  • CVE-2021-39145: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
  • CVE-2021-39146: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
  • CVE-2021-39147: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
  • CVE-2021-39148: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
  • CVE-2021-39149: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
  • CVE-2021-39150: Fixed an issue that allowed an attacker to access protected resources hosted within the intranet or in the host itself. (bsc#1189798)
  • CVE-2021-39151: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
  • CVE-2021-39152: Fixed an issue that allowed an attacker to access protected resources hosted within the intranet or in the host itself. (bsc#1189798)
  • CVE-2021-39153: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
  • CVE-2021-39154: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
References

Affected packages

SUSE:Linux Enterprise Module for Development Tools 15 SP2 / xstream

Package

Name
xstream
Purl
purl:rpm/suse/xstream&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.18-3.14.1

Ecosystem specific

{
    "binaries": [
        {
            "xstream": "1.4.18-3.14.1"
        }
    ]
}

SUSE:Linux Enterprise Module for Development Tools 15 SP3 / xstream

Package

Name
xstream
Purl
purl:rpm/suse/xstream&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.18-3.14.1

Ecosystem specific

{
    "binaries": [
        {
            "xstream": "1.4.18-3.14.1"
        }
    ]
}

SUSE:Manager Server Module 4.1 / xstream

Package

Name
xstream
Purl
purl:rpm/suse/xstream&distro=SUSE%20Manager%20Server%20Module%204.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.18-3.14.1

Ecosystem specific

{
    "binaries": [
        {
            "xstream": "1.4.18-3.14.1"
        }
    ]
}

SUSE:Manager Server Module 4.2 / xstream

Package

Name
xstream
Purl
purl:rpm/suse/xstream&distro=SUSE%20Manager%20Server%20Module%204.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.18-3.14.1

Ecosystem specific

{
    "binaries": [
        {
            "xstream": "1.4.18-3.14.1"
        }
    ]
}