Security update for xstream
SUSE Security Update: Security update for xstreamAnnouncement ID: | SUSE-SU-2021:1840-2 |
Rating: | important |
References: | #1184372 #1184373 #1184374 #1184375 #1184376 #1184377 #1184378 #1184379 #1184380 #1184796 #1184797 |
Cross-References: | CVE-2021-21341 CVE-2021-21342 CVE-2021-21343 CVE-2021-21344 CVE-2021-21345 CVE-2021-21346 CVE-2021-21347 CVE-2021-21348 CVE-2021-21349 CVE-2021-21350 CVE-2021-21351 |
Affected Products: |
|
An update that fixes 11 vulnerabilities is now available.
Description:
This update for xstream fixes the following issues:
- Upgrade to 1.4.16
- CVE-2021-21351: remote attacker to load and execute arbitrary code (bsc#1184796)
- CVE-2021-21349: SSRF can lead to a remote attacker to request data from internal resources (bsc#1184797)
- CVE-2021-21350: arbitrary code execution (bsc#1184380)
- CVE-2021-21348: remote attacker could cause denial of service by consuming maximum CPU time (bsc#1184374)
- CVE-2021-21347: remote attacker to load and execute arbitrary code from a remote host (bsc#1184378)
- CVE-2021-21344: remote attacker could load and execute arbitrary code from a remote host (bsc#1184375)
- CVE-2021-21342: server-side forgery (bsc#1184379)
- CVE-2021-21341: remote attacker could cause a denial of service by allocating 100% CPU time (bsc#1184377)
- CVE-2021-21346: remote attacker could load and execute arbitrary code (bsc#1184373)
- CVE-2021-21345: remote attacker with sufficient rights could execute commands (bsc#1184372)
- CVE-2021-21343: replace or inject objects, that result in the deletion of files on the local host (bsc#1184376)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for SUSE Manager Server 4.2:
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-1840=1
Package List:
- SUSE Linux Enterprise Module for SUSE Manager Server 4.2 (noarch):
- xstream-1.4.16-3.8.1
References:
- https://www.suse.com/security/cve/CVE-2021-21341.html
- https://www.suse.com/security/cve/CVE-2021-21342.html
- https://www.suse.com/security/cve/CVE-2021-21343.html
- https://www.suse.com/security/cve/CVE-2021-21344.html
- https://www.suse.com/security/cve/CVE-2021-21345.html
- https://www.suse.com/security/cve/CVE-2021-21346.html
- https://www.suse.com/security/cve/CVE-2021-21347.html
- https://www.suse.com/security/cve/CVE-2021-21348.html
- https://www.suse.com/security/cve/CVE-2021-21349.html
- https://www.suse.com/security/cve/CVE-2021-21350.html
- https://www.suse.com/security/cve/CVE-2021-21351.html
- https://bugzilla.suse.com/1184372
- https://bugzilla.suse.com/1184373
- https://bugzilla.suse.com/1184374
- https://bugzilla.suse.com/1184375
- https://bugzilla.suse.com/1184376
- https://bugzilla.suse.com/1184377
- https://bugzilla.suse.com/1184378
- https://bugzilla.suse.com/1184379
- https://bugzilla.suse.com/1184380
- https://bugzilla.suse.com/1184796
- https://bugzilla.suse.com/1184797