openSUSE-SU-2021:1840-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2021:1840-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2021:1840-1
Related
Published
2021-07-11T08:25:40Z
Modified
2021-07-11T08:25:40Z
Summary
Security update for xstream
Details

This update for xstream fixes the following issues:

  • Upgrade to 1.4.16
  • CVE-2021-21351: remote attacker to load and execute arbitrary code (bsc#1184796)
  • CVE-2021-21349: SSRF can lead to a remote attacker to request data from internal resources (bsc#1184797)
  • CVE-2021-21350: arbitrary code execution (bsc#1184380)
  • CVE-2021-21348: remote attacker could cause denial of service by consuming maximum CPU time (bsc#1184374)
  • CVE-2021-21347: remote attacker to load and execute arbitrary code from a remote host (bsc#1184378)
  • CVE-2021-21344: remote attacker could load and execute arbitrary code from a remote host (bsc#1184375)
  • CVE-2021-21342: server-side forgery (bsc#1184379)
  • CVE-2021-21341: remote attacker could cause a denial of service by allocating 100% CPU time (bsc#1184377)
  • CVE-2021-21346: remote attacker could load and execute arbitrary code (bsc#1184373)
  • CVE-2021-21345: remote attacker with sufficient rights could execute commands (bsc#1184372)
  • CVE-2021-21343: replace or inject objects, that result in the deletion of files on the local host (bsc#1184376)
References

Affected packages

openSUSE:Leap 15.3 / xstream

Package

Name
xstream
Purl
pkg:rpm/opensuse/xstream&distro=openSUSE%20Leap%2015.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.16-3.8.1

Ecosystem specific

{
    "binaries": [
        {
            "xstream-parent": "1.4.16-3.8.1",
            "xstream": "1.4.16-3.8.1",
            "xstream-javadoc": "1.4.16-3.8.1",
            "xstream-benchmark": "1.4.16-3.8.1"
        }
    ]
}