Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-39153 (GCVE-0-2021-39153)
Vulnerability from cvelistv5 – Published: 2021-08-23 17:55 – Updated: 2024-08-04 01:58| URL | Tags |
|---|---|
| https://github.com/x-stream/xstream/security/advi… | x_refsource_CONFIRM |
| https://x-stream.github.io/CVE-2021-39153.html | x_refsource_MISC |
| https://lists.debian.org/debian-lts-announce/2021… | mailing-listx_refsource_MLIST |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://www.debian.org/security/2021/dsa-5004 | vendor-advisoryx_refsource_DEBIAN |
| https://www.oracle.com/security-alerts/cpujan2022.html | x_refsource_MISC |
| https://security.netapp.com/advisory/ntap-2021092… | x_refsource_CONFIRM |
| https://www.oracle.com/security-alerts/cpuapr2022.html | x_refsource_MISC |
| https://www.oracle.com/security-alerts/cpujul2022.html | x_refsource_MISC |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T01:58:18.194Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://x-stream.github.io/CVE-2021-39153.html"
},
{
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html"
},
{
"name": "FEDORA-2021-fbad11014a",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/"
},
{
"name": "FEDORA-2021-d894ca87dc",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/"
},
{
"name": "FEDORA-2021-5e376c0ed9",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/"
},
{
"name": "DSA-5004",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2021/dsa-5004"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "xstream",
"vendor": "x-stream",
"versions": [
{
"status": "affected",
"version": "\u003c 1.4.18"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "CWE-434: Unrestricted Upload of File with Dangerous Type",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "CWE-502: Deserialization of Untrusted Data",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-07-25T16:34:16.000Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://x-stream.github.io/CVE-2021-39153.html"
},
{
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html"
},
{
"name": "FEDORA-2021-fbad11014a",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/"
},
{
"name": "FEDORA-2021-d894ca87dc",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/"
},
{
"name": "FEDORA-2021-5e376c0ed9",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/"
},
{
"name": "DSA-5004",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2021/dsa-5004"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
],
"source": {
"advisory": "GHSA-2q8x-2p7f-574v",
"discovery": "UNKNOWN"
},
"title": "XStream is vulnerable to an Arbitrary Code Execution attack",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2021-39153",
"STATE": "PUBLIC",
"TITLE": "XStream is vulnerable to an Arbitrary Code Execution attack"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "xstream",
"version": {
"version_data": [
{
"version_value": "\u003c 1.4.18"
}
]
}
}
]
},
"vendor_name": "x-stream"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-434: Unrestricted Upload of File with Dangerous Type"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-502: Deserialization of Untrusted Data"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v",
"refsource": "CONFIRM",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v"
},
{
"name": "https://x-stream.github.io/CVE-2021-39153.html",
"refsource": "MISC",
"url": "https://x-stream.github.io/CVE-2021-39153.html"
},
{
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html"
},
{
"name": "FEDORA-2021-fbad11014a",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/"
},
{
"name": "FEDORA-2021-d894ca87dc",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/"
},
{
"name": "FEDORA-2021-5e376c0ed9",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/"
},
{
"name": "DSA-5004",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-5004"
},
{
"name": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
},
{
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
]
},
"source": {
"advisory": "GHSA-2q8x-2p7f-574v",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2021-39153",
"datePublished": "2021-08-23T17:55:14.000Z",
"dateReserved": "2021-08-16T00:00:00.000Z",
"dateUpdated": "2024-08-04T01:58:18.194Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-39153",
"date": "2026-05-19",
"epss": "0.00625",
"percentile": "0.70391"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.4.18\", \"matchCriteriaId\": \"C167B4EE-A889-44E0-A745-51B37BEEEA70\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A930E247-0B43-43CB-98FF-6CE7B8189835\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*\", \"matchCriteriaId\": \"26A2B713-7D6D-420A-93A4-E0D983C983DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*\", \"matchCriteriaId\": \"64DE38C8-94F1-4860-B045-F33928F676A8\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA8461A2-428C-4817-92A9-0C671545698D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:11.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A9E4125-B744-4A9D-BFE6-5D82939958FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"261212BD-125A-487F-97E8-A9587935DFE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4CA84D6-F312-4C29-A02B-050FCB7A902B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6B6FE82-7BFA-481D-99D6-789B146CA18B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4479F76A-4B67-41CC-98C7-C76B81050F8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D299528-8EF0-49AF-9BDE-4B6C6B1DA36C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17A91FD9-9F77-42D3-A4D9-48BC7568ADE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"539DA24F-E3E0-4455-84C6-A9D96CD601B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7637F8B-15F1-42E2-BE18-E1FF7C66587D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E43D793A-7756-4D58-A8ED-72DC4EC9CEA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5435B365-BFF3-4A9E-B45C-42D8F1E20FB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FAC3840-2CF8-44CE-81BB-EEEBDA00A34A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:utilities_framework:4.3.0.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"900521A0-453C-4D97-B5EB-BADF0245370D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DF02546-3F0D-4FDD-89B1-8A3FE43FB5BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F906F04-39E4-4BE4-8A73-9D058AAADB43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B393A82-476A-4270-A903-38ED4169E431\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85CAE52B-C2CA-4C6B-A0B7-2B9D6F0499E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3ED272C-A545-4F8C-86C0-2736B3F2DCAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6A4F71A-4269-40FC-8F61-1D1301F2B728\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A502118-5B2B-47AE-82EC-1999BD841103\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.\"}, {\"lang\": \"es\", \"value\": \"XStream es una biblioteca sencilla para serializar objetos a XML y viceversa. En las versiones afectadas esta vulnerabilidad puede permitir a un atacante remoto cargar y ejecutar c\\u00f3digo arbitrario desde un host remoto s\\u00f3lo al manipular el flujo de entrada procesado, si se usa la versi\\u00f3n out of the box con Java runtime versi\\u00f3n 14 hasta 8 o con JavaFX instalado. No est\\u00e1 afectado ning\\u00fan usuario que haya seguido la recomendaci\\u00f3n de configurar el framework de seguridad de XStream con una lista blanca limitada a los tipos m\\u00ednimos necesarios. XStream versi\\u00f3n 1.4.18 ya no usa una lista negra por defecto, ya que no puede ser asegurada para fines generales.\"}]",
"id": "CVE-2021-39153",
"lastModified": "2024-11-21T06:18:43.803",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 8.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 6.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 8.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 6.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 6.8, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-08-23T18:15:13.043",
"references": "[{\"url\": \"https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20210923-0003/\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2021/dsa-5004\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2022.html\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujan2022.html\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujul2022.html\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://x-stream.github.io/CVE-2021-39153.html\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20210923-0003/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2021/dsa-5004\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2022.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujan2022.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujul2022.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://x-stream.github.io/CVE-2021-39153.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-434\"}, {\"lang\": \"en\", \"value\": \"CWE-502\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-39153\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2021-08-23T18:15:13.043\",\"lastModified\":\"2025-05-23T16:50:17.600\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.\"},{\"lang\":\"es\",\"value\":\"XStream es una biblioteca sencilla para serializar objetos a XML y viceversa. En las versiones afectadas esta vulnerabilidad puede permitir a un atacante remoto cargar y ejecutar c\u00f3digo arbitrario desde un host remoto s\u00f3lo al manipular el flujo de entrada procesado, si se usa la versi\u00f3n out of the box con Java runtime versi\u00f3n 14 hasta 8 o con JavaFX instalado. No est\u00e1 afectado ning\u00fan usuario que haya seguido la recomendaci\u00f3n de configurar el framework de seguridad de XStream con una lista blanca limitada a los tipos m\u00ednimos necesarios. XStream versi\u00f3n 1.4.18 ya no usa una lista negra por defecto, ya que no puede ser asegurada para fines generales.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:P/I:P/A:P\",\"baseScore\":6.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.8,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-434\"},{\"lang\":\"en\",\"value\":\"CWE-502\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-434\"},{\"lang\":\"en\",\"value\":\"CWE-502\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xstream:xstream:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4.18\",\"matchCriteriaId\":\"A01843B3-11E1-4CD5-9C77-CC57B908B845\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*\",\"matchCriteriaId\":\"26A2B713-7D6D-420A-93A4-E0D983C983DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*\",\"matchCriteriaId\":\"64DE38C8-94F1-4860-B045-F33928F676A8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA8461A2-428C-4817-92A9-0C671545698D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A9E4125-B744-4A9D-BFE6-5D82939958FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"261212BD-125A-487F-97E8-A9587935DFE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4CA84D6-F312-4C29-A02B-050FCB7A902B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6B6FE82-7BFA-481D-99D6-789B146CA18B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4479F76A-4B67-41CC-98C7-C76B81050F8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D299528-8EF0-49AF-9BDE-4B6C6B1DA36C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17A91FD9-9F77-42D3-A4D9-48BC7568ADE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"539DA24F-E3E0-4455-84C6-A9D96CD601B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7637F8B-15F1-42E2-BE18-E1FF7C66587D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E43D793A-7756-4D58-A8ED-72DC4EC9CEA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5435B365-BFF3-4A9E-B45C-42D8F1E20FB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FAC3840-2CF8-44CE-81BB-EEEBDA00A34A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:utilities_framework:4.3.0.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"900521A0-453C-4D97-B5EB-BADF0245370D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DF02546-3F0D-4FDD-89B1-8A3FE43FB5BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F906F04-39E4-4BE4-8A73-9D058AAADB43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B393A82-476A-4270-A903-38ED4169E431\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85CAE52B-C2CA-4C6B-A0B7-2B9D6F0499E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3ED272C-A545-4F8C-86C0-2736B3F2DCAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6A4F71A-4269-40FC-8F61-1D1301F2B728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A502118-5B2B-47AE-82EC-1999BD841103\"}]}]}],\"references\":[{\"url\":\"https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210923-0003/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-5004\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://x-stream.github.io/CVE-2021-39153.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210923-0003/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-5004\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://x-stream.github.io/CVE-2021-39153.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2021-AVI-943
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges, un déni de service à distance et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Spectrum | IBM Spectrum Protect Server versions 8.1.x antérieures à 8.1.13 | ||
| IBM | Spectrum | IBM Spectrum Protect Client versions 7.1.x antérieures à 7.1.8.12 | ||
| IBM | Spectrum | IBM Spectrum Protect Client versions 8.1.x antérieures à 8.1.13 | ||
| IBM | N/A | Rational Developer for i (RDi) RPG and COBOL + Modernization Tools, Java Edition toutes versions | ||
| IBM | Spectrum | IBM Spectrum Copy Data Management version 2.2.x antérieures à 2.2.14 | ||
| IBM | Spectrum | IBM Spectrum Protect Plus versions 10.1.x antérieures à 10.1.9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Spectrum Protect Server versions 8.1.x ant\u00e9rieures \u00e0 8.1.13",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Client versions 7.1.x ant\u00e9rieures \u00e0 7.1.8.12",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Client versions 8.1.x ant\u00e9rieures \u00e0 8.1.13",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Rational Developer for i (RDi) RPG and COBOL + Modernization Tools, Java Edition toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Copy Data Management version 2.2.x ant\u00e9rieures \u00e0 2.2.14",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Plus versions 10.1.x ant\u00e9rieures \u00e0 10.1.9",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-39154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39154"
},
{
"name": "CVE-2021-21343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21343"
},
{
"name": "CVE-2021-38947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38947"
},
{
"name": "CVE-2021-32027",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32027"
},
{
"name": "CVE-2021-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21348"
},
{
"name": "CVE-2021-29505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29505"
},
{
"name": "CVE-2021-39146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39146"
},
{
"name": "CVE-2021-33502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33502"
},
{
"name": "CVE-2020-13956",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13956"
},
{
"name": "CVE-2020-10673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10673"
},
{
"name": "CVE-2020-35728",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
},
{
"name": "CVE-2020-26258",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26258"
},
{
"name": "CVE-2020-36181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
},
{
"name": "CVE-2020-36182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
},
{
"name": "CVE-2020-24616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24616"
},
{
"name": "CVE-2021-22940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22940"
},
{
"name": "CVE-2020-10683",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10683"
},
{
"name": "CVE-2021-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21344"
},
{
"name": "CVE-2020-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2021-39149",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39149"
},
{
"name": "CVE-2021-39065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39065"
},
{
"name": "CVE-2020-36179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
},
{
"name": "CVE-2020-26259",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26259"
},
{
"name": "CVE-2021-39139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39139"
},
{
"name": "CVE-2021-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21341"
},
{
"name": "CVE-2020-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
},
{
"name": "CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"name": "CVE-2021-39064",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39064"
},
{
"name": "CVE-2021-39054",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39054"
},
{
"name": "CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"name": "CVE-2021-35516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35516"
},
{
"name": "CVE-2021-39147",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39147"
},
{
"name": "CVE-2021-39152",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39152"
},
{
"name": "CVE-2021-22939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22939"
},
{
"name": "CVE-2019-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14893"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2020-11113",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11113"
},
{
"name": "CVE-2021-39145",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39145"
},
{
"name": "CVE-2021-37713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
},
{
"name": "CVE-2021-35517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35517"
},
{
"name": "CVE-2021-35065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35065"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2021-39144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39144"
},
{
"name": "CVE-2020-10672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10672"
},
{
"name": "CVE-2021-37712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
},
{
"name": "CVE-2020-10969",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10969"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2021-21347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21347"
},
{
"name": "CVE-2020-36187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
},
{
"name": "CVE-2021-36090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36090"
},
{
"name": "CVE-2020-26217",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26217"
},
{
"name": "CVE-2021-39151",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39151"
},
{
"name": "CVE-2020-11620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11620"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2021-21346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21346"
},
{
"name": "CVE-2020-24750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
},
{
"name": "CVE-2021-39148",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39148"
},
{
"name": "CVE-2021-21351",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21351"
},
{
"name": "CVE-2021-21345",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21345"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2020-14195",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14195"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2020-14061",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14061"
},
{
"name": "CVE-2021-32028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32028"
},
{
"name": "CVE-2020-11619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11619"
},
{
"name": "CVE-2020-36183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2019-10172",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10172"
},
{
"name": "CVE-2021-39052",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39052"
},
{
"name": "CVE-2021-39150",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39150"
},
{
"name": "CVE-2020-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
},
{
"name": "CVE-2021-22931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22931"
},
{
"name": "CVE-2021-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21349"
},
{
"name": "CVE-2020-36180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-39134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39134"
},
{
"name": "CVE-2021-39140",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39140"
},
{
"name": "CVE-2021-39058",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39058"
},
{
"name": "CVE-2020-10968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10968"
},
{
"name": "CVE-2021-39153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39153"
},
{
"name": "CVE-2020-25649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25649"
},
{
"name": "CVE-2021-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21342"
},
{
"name": "CVE-2021-23368",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23368"
},
{
"name": "CVE-2021-39135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39135"
},
{
"name": "CVE-2021-35515",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35515"
},
{
"name": "CVE-2021-29060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29060"
},
{
"name": "CVE-2021-32029",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32029"
},
{
"name": "CVE-2021-21350",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21350"
},
{
"name": "CVE-2020-11112",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11112"
},
{
"name": "CVE-2020-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7656"
},
{
"name": "CVE-2020-11111",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11111"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-39053",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39053"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2020-14060",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14060"
},
{
"name": "CVE-2020-36188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
},
{
"name": "CVE-2021-39141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39141"
},
{
"name": "CVE-2020-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14062"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-943",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges, un\nd\u00e9ni de service \u00e0 distance et une injection de code indirecte \u00e0 distance\n(XSS).\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525034 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525034"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525250 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525250"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525260 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525260"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6524712 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6524712"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525674 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525674"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6524908 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6524908"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525554 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525554"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525182 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525182"
}
]
}
CERTFR-2021-AVI-943
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges, un déni de service à distance et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Spectrum | IBM Spectrum Protect Server versions 8.1.x antérieures à 8.1.13 | ||
| IBM | Spectrum | IBM Spectrum Protect Client versions 7.1.x antérieures à 7.1.8.12 | ||
| IBM | Spectrum | IBM Spectrum Protect Client versions 8.1.x antérieures à 8.1.13 | ||
| IBM | N/A | Rational Developer for i (RDi) RPG and COBOL + Modernization Tools, Java Edition toutes versions | ||
| IBM | Spectrum | IBM Spectrum Copy Data Management version 2.2.x antérieures à 2.2.14 | ||
| IBM | Spectrum | IBM Spectrum Protect Plus versions 10.1.x antérieures à 10.1.9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Spectrum Protect Server versions 8.1.x ant\u00e9rieures \u00e0 8.1.13",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Client versions 7.1.x ant\u00e9rieures \u00e0 7.1.8.12",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Client versions 8.1.x ant\u00e9rieures \u00e0 8.1.13",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Rational Developer for i (RDi) RPG and COBOL + Modernization Tools, Java Edition toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Copy Data Management version 2.2.x ant\u00e9rieures \u00e0 2.2.14",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Protect Plus versions 10.1.x ant\u00e9rieures \u00e0 10.1.9",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-39154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39154"
},
{
"name": "CVE-2021-21343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21343"
},
{
"name": "CVE-2021-38947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38947"
},
{
"name": "CVE-2021-32027",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32027"
},
{
"name": "CVE-2021-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21348"
},
{
"name": "CVE-2021-29505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29505"
},
{
"name": "CVE-2021-39146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39146"
},
{
"name": "CVE-2021-33502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33502"
},
{
"name": "CVE-2020-13956",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13956"
},
{
"name": "CVE-2020-10673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10673"
},
{
"name": "CVE-2020-35728",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
},
{
"name": "CVE-2020-26258",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26258"
},
{
"name": "CVE-2020-36181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
},
{
"name": "CVE-2020-36182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
},
{
"name": "CVE-2020-24616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24616"
},
{
"name": "CVE-2021-22940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22940"
},
{
"name": "CVE-2020-10683",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10683"
},
{
"name": "CVE-2021-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21344"
},
{
"name": "CVE-2020-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2021-39149",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39149"
},
{
"name": "CVE-2021-39065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39065"
},
{
"name": "CVE-2020-36179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
},
{
"name": "CVE-2020-26259",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26259"
},
{
"name": "CVE-2021-39139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39139"
},
{
"name": "CVE-2021-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21341"
},
{
"name": "CVE-2020-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
},
{
"name": "CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"name": "CVE-2021-39064",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39064"
},
{
"name": "CVE-2021-39054",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39054"
},
{
"name": "CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"name": "CVE-2021-35516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35516"
},
{
"name": "CVE-2021-39147",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39147"
},
{
"name": "CVE-2021-39152",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39152"
},
{
"name": "CVE-2021-22939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22939"
},
{
"name": "CVE-2019-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14893"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2020-11113",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11113"
},
{
"name": "CVE-2021-39145",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39145"
},
{
"name": "CVE-2021-37713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
},
{
"name": "CVE-2021-35517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35517"
},
{
"name": "CVE-2021-35065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35065"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2021-39144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39144"
},
{
"name": "CVE-2020-10672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10672"
},
{
"name": "CVE-2021-37712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
},
{
"name": "CVE-2020-10969",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10969"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2021-21347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21347"
},
{
"name": "CVE-2020-36187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
},
{
"name": "CVE-2021-36090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36090"
},
{
"name": "CVE-2020-26217",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26217"
},
{
"name": "CVE-2021-39151",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39151"
},
{
"name": "CVE-2020-11620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11620"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2021-21346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21346"
},
{
"name": "CVE-2020-24750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
},
{
"name": "CVE-2021-39148",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39148"
},
{
"name": "CVE-2021-21351",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21351"
},
{
"name": "CVE-2021-21345",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21345"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2020-14195",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14195"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2020-14061",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14061"
},
{
"name": "CVE-2021-32028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32028"
},
{
"name": "CVE-2020-11619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11619"
},
{
"name": "CVE-2020-36183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2019-10172",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10172"
},
{
"name": "CVE-2021-39052",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39052"
},
{
"name": "CVE-2021-39150",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39150"
},
{
"name": "CVE-2020-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
},
{
"name": "CVE-2021-22931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22931"
},
{
"name": "CVE-2021-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21349"
},
{
"name": "CVE-2020-36180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-39134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39134"
},
{
"name": "CVE-2021-39140",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39140"
},
{
"name": "CVE-2021-39058",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39058"
},
{
"name": "CVE-2020-10968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10968"
},
{
"name": "CVE-2021-39153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39153"
},
{
"name": "CVE-2020-25649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25649"
},
{
"name": "CVE-2021-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21342"
},
{
"name": "CVE-2021-23368",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23368"
},
{
"name": "CVE-2021-39135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39135"
},
{
"name": "CVE-2021-35515",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35515"
},
{
"name": "CVE-2021-29060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29060"
},
{
"name": "CVE-2021-32029",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32029"
},
{
"name": "CVE-2021-21350",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21350"
},
{
"name": "CVE-2020-11112",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11112"
},
{
"name": "CVE-2020-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7656"
},
{
"name": "CVE-2020-11111",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11111"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-39053",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39053"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2020-14060",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14060"
},
{
"name": "CVE-2020-36188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
},
{
"name": "CVE-2021-39141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39141"
},
{
"name": "CVE-2020-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14062"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-943",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges, un\nd\u00e9ni de service \u00e0 distance et une injection de code indirecte \u00e0 distance\n(XSS).\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525034 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525034"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525250 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525250"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525260 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525260"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6524712 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6524712"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525674 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525674"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6524908 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6524908"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525554 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525554"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6525182 du 10 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6525182"
}
]
}
CNVD-2021-67818
Vulnerability from cnvd - Published: 2021-09-03厂商已发布了漏洞修复程序,请及时关注更新: http://x-stream.github.io/changes.html
| Name | XStream XStream <=1.4.17 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-39153",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-39153"
}
},
"description": "XStream\u662f\u4e00\u4e2a\u5f00\u6e90Java\u7c7b\u5e93\uff0c\u4e3b\u8981\u7528\u4e8e\u5c06\u5bf9\u8c61\u5e8f\u5217\u5316\u6210XML\uff08JSON\uff09\u6216\u53cd\u5e8f\u5217\u5316\u4e3a\u5bf9\u8c61\u3002\n\nXStream 1.4.17\u53ca\u4e4b\u524d\u7248\u672c\u5b58\u5728\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u4efb\u610f\u4ee3\u7801\u6267\u884c\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttp://x-stream.github.io/changes.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-67818",
"openTime": "2021-09-03",
"patchDescription": "XStream\u662f\u4e00\u4e2a\u5f00\u6e90Java\u7c7b\u5e93\uff0c\u4e3b\u8981\u7528\u4e8e\u5c06\u5bf9\u8c61\u5e8f\u5217\u5316\u6210XML\uff08JSON\uff09\u6216\u53cd\u5e8f\u5217\u5316\u4e3a\u5bf9\u8c61\u3002\r\n\r\nXStream 1.4.17\u53ca\u4e4b\u524d\u7248\u672c\u5b58\u5728\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u4efb\u610f\u4ee3\u7801\u6267\u884c\u3002\r\n\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "XStream\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2021-67818\uff09\u7684\u8865\u4e01",
"products": {
"product": "XStream XStream \u003c=1.4.17"
},
"referenceLink": "http://x-stream.github.io/changes.html",
"serverity": "\u4e2d",
"submitTime": "2021-08-23",
"title": "XStream\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2021-67818\uff09"
}
FKIE_CVE-2021-39153
Vulnerability from fkie_nvd - Published: 2021-08-23 18:15 - Updated: 2025-05-23 16:508.5 (High) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xstream:xstream:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A01843B3-11E1-4CD5-9C77-CC57B908B845",
"versionEndExcluding": "1.4.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"matchCriteriaId": "26A2B713-7D6D-420A-93A4-E0D983C983DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"matchCriteriaId": "64DE38C8-94F1-4860-B045-F33928F676A8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BA8461A2-428C-4817-92A9-0C671545698D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5A9E4125-B744-4A9D-BFE6-5D82939958FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "261212BD-125A-487F-97E8-A9587935DFE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4CA84D6-F312-4C29-A02B-050FCB7A902B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B6B6FE82-7BFA-481D-99D6-789B146CA18B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4479F76A-4B67-41CC-98C7-C76B81050F8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0D299528-8EF0-49AF-9BDE-4B6C6B1DA36C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "17A91FD9-9F77-42D3-A4D9-48BC7568ADE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "539DA24F-E3E0-4455-84C6-A9D96CD601B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A7637F8B-15F1-42E2-BE18-E1FF7C66587D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E43D793A-7756-4D58-A8ED-72DC4EC9CEA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5435B365-BFF3-4A9E-B45C-42D8F1E20FB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1FAC3840-2CF8-44CE-81BB-EEEBDA00A34A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:utilities_framework:4.3.0.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "900521A0-453C-4D97-B5EB-BADF0245370D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8DF02546-3F0D-4FDD-89B1-8A3FE43FB5BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3F906F04-39E4-4BE4-8A73-9D058AAADB43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7B393A82-476A-4270-A903-38ED4169E431",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85CAE52B-C2CA-4C6B-A0B7-2B9D6F0499E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A3ED272C-A545-4F8C-86C0-2736B3F2DCAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A4F71A-4269-40FC-8F61-1D1301F2B728",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5A502118-5B2B-47AE-82EC-1999BD841103",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose."
},
{
"lang": "es",
"value": "XStream es una biblioteca sencilla para serializar objetos a XML y viceversa. En las versiones afectadas esta vulnerabilidad puede permitir a un atacante remoto cargar y ejecutar c\u00f3digo arbitrario desde un host remoto s\u00f3lo al manipular el flujo de entrada procesado, si se usa la versi\u00f3n out of the box con Java runtime versi\u00f3n 14 hasta 8 o con JavaFX instalado. No est\u00e1 afectado ning\u00fan usuario que haya seguido la recomendaci\u00f3n de configurar el framework de seguridad de XStream con una lista blanca limitada a los tipos m\u00ednimos necesarios. XStream versi\u00f3n 1.4.18 ya no usa una lista negra por defecto, ya que no puede ser asegurada para fines generales."
}
],
"id": "CVE-2021-39153",
"lastModified": "2025-05-23T16:50:17.600",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-08-23T18:15:13.043",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-5004"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://x-stream.github.io/CVE-2021-39153.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-5004"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://x-stream.github.io/CVE-2021-39153.html"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-434"
},
{
"lang": "en",
"value": "CWE-502"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-434"
},
{
"lang": "en",
"value": "CWE-502"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-2Q8X-2P7F-574V
Vulnerability from github – Published: 2021-08-25 14:46 – Updated: 2022-02-08 20:43Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
Workarounds
See workarounds for the different versions covering all CVEs.
References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for CVE-2021-39153.
Credits
Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it.
For more information
If you have any questions or comments about this advisory: * Open an issue in XStream * Contact us at XStream Google Group
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "com.thoughtworks.xstream:xstream"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.18"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2021-39153"
],
"database_specific": {
"cwe_ids": [
"CWE-502"
],
"github_reviewed": true,
"github_reviewed_at": "2021-08-23T18:22:32Z",
"nvd_published_at": "2021-08-23T18:15:00Z",
"severity": "HIGH"
},
"details": "### Impact\nThe vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types.\n\n### Patches\nXStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.\n\n### Workarounds\nSee [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.\n\n### References\nSee full information about the nature of the vulnerability and the steps to reproduce it in XStream\u0027s documentation for [CVE-2021-39153](https://x-stream.github.io/CVE-2021-39153.html).\n\n### Credits\nCeclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it.\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)\n* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)\n",
"id": "GHSA-2q8x-2p7f-574v",
"modified": "2022-02-08T20:43:56Z",
"published": "2021-08-25T14:46:49Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39153"
},
{
"type": "PACKAGE",
"url": "https://github.com/x-stream/xstream"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20210923-0003"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2021/dsa-5004"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"type": "WEB",
"url": "https://x-stream.github.io/CVE-2021-39153.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "XStream is vulnerable to an Arbitrary Code Execution attack"
}
GSD-2021-39153
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-39153",
"description": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"id": "GSD-2021-39153",
"references": [
"https://www.suse.com/security/cve/CVE-2021-39153.html",
"https://www.debian.org/security/2021/dsa-5004",
"https://access.redhat.com/errata/RHSA-2022:0520",
"https://access.redhat.com/errata/RHSA-2022:0297",
"https://access.redhat.com/errata/RHSA-2022:0296",
"https://access.redhat.com/errata/RHSA-2021:4918",
"https://access.redhat.com/errata/RHSA-2021:4767",
"https://access.redhat.com/errata/RHSA-2021:3956",
"https://advisories.mageia.org/CVE-2021-39153.html",
"https://linux.oracle.com/cve/CVE-2021-39153.html",
"https://ubuntu.com/security/CVE-2021-39153"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-39153"
],
"details": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"id": "GSD-2021-39153",
"modified": "2023-12-13T01:23:16.194498Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2021-39153",
"STATE": "PUBLIC",
"TITLE": "XStream is vulnerable to an Arbitrary Code Execution attack"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "xstream",
"version": {
"version_data": [
{
"version_value": "\u003c 1.4.18 "
}
]
}
}
]
},
"vendor_name": "x-stream"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-434: Unrestricted Upload of File with Dangerous Type"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-502: Deserialization of Untrusted Data"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v",
"refsource": "CONFIRM",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v"
},
{
"name": "https://x-stream.github.io/CVE-2021-39153.html",
"refsource": "MISC",
"url": "https://x-stream.github.io/CVE-2021-39153.html"
},
{
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html"
},
{
"name": "FEDORA-2021-fbad11014a",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/"
},
{
"name": "FEDORA-2021-d894ca87dc",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/"
},
{
"name": "FEDORA-2021-5e376c0ed9",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/"
},
{
"name": "DSA-5004",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-5004"
},
{
"name": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
},
{
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
]
},
"source": {
"advisory": "GHSA-2q8x-2p7f-574v",
"discovery": "UNKNOWN"
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "(,1.4.18)",
"affected_versions": "All versions before 1.4.18",
"cvss_v2": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-502",
"CWE-937"
],
"date": "2022-10-05",
"description": "XStream is a simple library to serialize objects to XML and back again. if using the version out of the box with Java runtime to 8 or with JavaFX installed. Users who followed the recommendation to setup XStream\u0027s security framework with an allow list limited to the minimal required types are not impacted.",
"fixed_versions": [
"1.4.18"
],
"identifier": "CVE-2021-39153",
"identifiers": [
"CVE-2021-39153",
"GHSA-2q8x-2p7f-574v"
],
"not_impacted": "",
"package_slug": "maven/com.thoughtworks.xstream/xstream",
"pubdate": "2021-08-23",
"solution": "Upgrade to version 1.4.18 or above.",
"title": "Deserialization of Untrusted Data",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2021-39153"
],
"uuid": "90f5620b-8455-4780-ad7a-214c38cc2898"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.4.18",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:11.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:12.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:utilities_framework:4.3.0.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2021-39153"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://x-stream.github.io/CVE-2021-39153.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://x-stream.github.io/CVE-2021-39153.html"
},
{
"name": "https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210923-0003/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20210923-0003/"
},
{
"name": "[debian-lts-announce] 20210929 [SECURITY] [DLA 2769-1] libxstream-java security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html"
},
{
"name": "FEDORA-2021-fbad11014a",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/"
},
{
"name": "FEDORA-2021-d894ca87dc",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/"
},
{
"name": "FEDORA-2021-5e376c0ed9",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/"
},
{
"name": "DSA-5004",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-5004"
},
{
"name": "https://www.oracle.com/security-alerts/cpujan2022.html",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"name": "N/A",
"refsource": "N/A",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
}
},
"lastModifiedDate": "2022-10-05T12:23Z",
"publishedDate": "2021-08-23T18:15Z"
}
}
}
OPENSUSE-SU-2021:1401-1
Vulnerability from csaf_opensuse - Published: 2021-10-31 14:52 - Updated: 2021-10-31 14:52| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xstream",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xstream fixes the following issues:\n\n- Upgrade to 1.4.18\n- CVE-2021-39139: Fixed an issue that allowed an attacker to execute arbitrary code execution by manipulating the processed input stream with type information. (bsc#1189798)\n- CVE-2021-39140: Fixed an issue that allowed an attacker to execute a DoS attack by manipulating the processed input stream. (bsc#1189798)\n- CVE-2021-39141: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39144: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39145: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39146: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39147: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39148: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39149: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39150: Fixed an issue that allowed an attacker to access protected resources hosted within the intranet or in the host itself. (bsc#1189798)\n- CVE-2021-39151: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39152: Fixed an issue that allowed an attacker to access protected resources hosted within the intranet or in the host itself. (bsc#1189798)\n- CVE-2021-39153: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39154: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-1401",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1401-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1401-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1401-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/"
},
{
"category": "self",
"summary": "SUSE Bug 1189798",
"url": "https://bugzilla.suse.com/1189798"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39140 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39141 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39144 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39145 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39146 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39147 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39148 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39149 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39150 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39151 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39151/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39152 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39152/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39153 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39154/"
}
],
"title": "Security update for xstream",
"tracking": {
"current_release_date": "2021-10-31T14:52:41Z",
"generator": {
"date": "2021-10-31T14:52:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1401-1",
"initial_release_date": "2021-10-31T14:52:41Z",
"revision_history": [
{
"date": "2021-10-31T14:52:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xstream-1.4.18-lp152.2.12.1.noarch",
"product": {
"name": "xstream-1.4.18-lp152.2.12.1.noarch",
"product_id": "xstream-1.4.18-lp152.2.12.1.noarch"
}
},
{
"category": "product_version",
"name": "xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"product": {
"name": "xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"product_id": "xstream-benchmark-1.4.18-lp152.2.12.1.noarch"
}
},
{
"category": "product_version",
"name": "xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"product": {
"name": "xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"product_id": "xstream-javadoc-1.4.18-lp152.2.12.1.noarch"
}
},
{
"category": "product_version",
"name": "xstream-parent-1.4.18-lp152.2.12.1.noarch",
"product": {
"name": "xstream-parent-1.4.18-lp152.2.12.1.noarch",
"product_id": "xstream-parent-1.4.18-lp152.2.12.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-1.4.18-lp152.2.12.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch"
},
"product_reference": "xstream-1.4.18-lp152.2.12.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-benchmark-1.4.18-lp152.2.12.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch"
},
"product_reference": "xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-javadoc-1.4.18-lp152.2.12.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch"
},
"product_reference": "xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-parent-1.4.18-lp152.2.12.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
},
"product_reference": "xstream-parent-1.4.18-lp152.2.12.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-39139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39139"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39139",
"url": "https://www.suse.com/security/cve/CVE-2021-39139"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39139",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-31T14:52:41Z",
"details": "important"
}
],
"title": "CVE-2021-39139"
},
{
"cve": "CVE-2021-39140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39140"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39140",
"url": "https://www.suse.com/security/cve/CVE-2021-39140"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39140",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-31T14:52:41Z",
"details": "important"
}
],
"title": "CVE-2021-39140"
},
{
"cve": "CVE-2021-39141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39141"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39141",
"url": "https://www.suse.com/security/cve/CVE-2021-39141"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39141",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-31T14:52:41Z",
"details": "important"
}
],
"title": "CVE-2021-39141"
},
{
"cve": "CVE-2021-39144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39144"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39144",
"url": "https://www.suse.com/security/cve/CVE-2021-39144"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39144",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-31T14:52:41Z",
"details": "important"
}
],
"title": "CVE-2021-39144"
},
{
"cve": "CVE-2021-39145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39145"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39145",
"url": "https://www.suse.com/security/cve/CVE-2021-39145"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39145",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-31T14:52:41Z",
"details": "important"
}
],
"title": "CVE-2021-39145"
},
{
"cve": "CVE-2021-39146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39146"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39146",
"url": "https://www.suse.com/security/cve/CVE-2021-39146"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39146",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-31T14:52:41Z",
"details": "important"
}
],
"title": "CVE-2021-39146"
},
{
"cve": "CVE-2021-39147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39147"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39147",
"url": "https://www.suse.com/security/cve/CVE-2021-39147"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39147",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-31T14:52:41Z",
"details": "important"
}
],
"title": "CVE-2021-39147"
},
{
"cve": "CVE-2021-39148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39148"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39148",
"url": "https://www.suse.com/security/cve/CVE-2021-39148"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39148",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-31T14:52:41Z",
"details": "important"
}
],
"title": "CVE-2021-39148"
},
{
"cve": "CVE-2021-39149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39149"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39149",
"url": "https://www.suse.com/security/cve/CVE-2021-39149"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39149",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-31T14:52:41Z",
"details": "important"
}
],
"title": "CVE-2021-39149"
},
{
"cve": "CVE-2021-39150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39150"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39150",
"url": "https://www.suse.com/security/cve/CVE-2021-39150"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39150",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-31T14:52:41Z",
"details": "important"
}
],
"title": "CVE-2021-39150"
},
{
"cve": "CVE-2021-39151",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39151"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39151",
"url": "https://www.suse.com/security/cve/CVE-2021-39151"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39151",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-31T14:52:41Z",
"details": "important"
}
],
"title": "CVE-2021-39151"
},
{
"cve": "CVE-2021-39152",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39152"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39152",
"url": "https://www.suse.com/security/cve/CVE-2021-39152"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39152",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-31T14:52:41Z",
"details": "important"
}
],
"title": "CVE-2021-39152"
},
{
"cve": "CVE-2021-39153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39153"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39153",
"url": "https://www.suse.com/security/cve/CVE-2021-39153"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39153",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-31T14:52:41Z",
"details": "important"
}
],
"title": "CVE-2021-39153"
},
{
"cve": "CVE-2021-39154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39154"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39154",
"url": "https://www.suse.com/security/cve/CVE-2021-39154"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39154",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:xstream-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-benchmark-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-javadoc-1.4.18-lp152.2.12.1.noarch",
"openSUSE Leap 15.2:xstream-parent-1.4.18-lp152.2.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-31T14:52:41Z",
"details": "important"
}
],
"title": "CVE-2021-39154"
}
]
}
OPENSUSE-SU-2021:3476-1
Vulnerability from csaf_opensuse - Published: 2021-10-20 06:42 - Updated: 2021-10-20 06:42| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xstream",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xstream fixes the following issues:\n\n- Upgrade to 1.4.18\n- CVE-2021-39139: Fixed an issue that allowed an attacker to execute arbitrary code execution by manipulating the processed input stream with type information. (bsc#1189798)\n- CVE-2021-39140: Fixed an issue that allowed an attacker to execute a DoS attack by manipulating the processed input stream. (bsc#1189798)\n- CVE-2021-39141: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39144: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39145: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39146: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39147: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39148: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39149: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39150: Fixed an issue that allowed an attacker to access protected resources hosted within the intranet or in the host itself. (bsc#1189798)\n- CVE-2021-39151: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39152: Fixed an issue that allowed an attacker to access protected resources hosted within the intranet or in the host itself. (bsc#1189798)\n- CVE-2021-39153: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n- CVE-2021-39154: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-3476",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3476-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:3476-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:3476-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/"
},
{
"category": "self",
"summary": "SUSE Bug 1189798",
"url": "https://bugzilla.suse.com/1189798"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39140 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39141 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39144 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39145 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39146 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39147 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39148 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39149 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39150 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39151 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39151/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39152 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39152/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39153 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39154/"
}
],
"title": "Security update for xstream",
"tracking": {
"current_release_date": "2021-10-20T06:42:26Z",
"generator": {
"date": "2021-10-20T06:42:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:3476-1",
"initial_release_date": "2021-10-20T06:42:26Z",
"revision_history": [
{
"date": "2021-10-20T06:42:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xstream-1.4.18-3.14.1.noarch",
"product": {
"name": "xstream-1.4.18-3.14.1.noarch",
"product_id": "xstream-1.4.18-3.14.1.noarch"
}
},
{
"category": "product_version",
"name": "xstream-benchmark-1.4.18-3.14.1.noarch",
"product": {
"name": "xstream-benchmark-1.4.18-3.14.1.noarch",
"product_id": "xstream-benchmark-1.4.18-3.14.1.noarch"
}
},
{
"category": "product_version",
"name": "xstream-javadoc-1.4.18-3.14.1.noarch",
"product": {
"name": "xstream-javadoc-1.4.18-3.14.1.noarch",
"product_id": "xstream-javadoc-1.4.18-3.14.1.noarch"
}
},
{
"category": "product_version",
"name": "xstream-parent-1.4.18-3.14.1.noarch",
"product": {
"name": "xstream-parent-1.4.18-3.14.1.noarch",
"product_id": "xstream-parent-1.4.18-3.14.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-1.4.18-3.14.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch"
},
"product_reference": "xstream-1.4.18-3.14.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-benchmark-1.4.18-3.14.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch"
},
"product_reference": "xstream-benchmark-1.4.18-3.14.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-javadoc-1.4.18-3.14.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch"
},
"product_reference": "xstream-javadoc-1.4.18-3.14.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-parent-1.4.18-3.14.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
},
"product_reference": "xstream-parent-1.4.18-3.14.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-39139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39139"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39139",
"url": "https://www.suse.com/security/cve/CVE-2021-39139"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39139",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-20T06:42:26Z",
"details": "important"
}
],
"title": "CVE-2021-39139"
},
{
"cve": "CVE-2021-39140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39140"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39140",
"url": "https://www.suse.com/security/cve/CVE-2021-39140"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39140",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-20T06:42:26Z",
"details": "important"
}
],
"title": "CVE-2021-39140"
},
{
"cve": "CVE-2021-39141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39141"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39141",
"url": "https://www.suse.com/security/cve/CVE-2021-39141"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39141",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-20T06:42:26Z",
"details": "important"
}
],
"title": "CVE-2021-39141"
},
{
"cve": "CVE-2021-39144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39144"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39144",
"url": "https://www.suse.com/security/cve/CVE-2021-39144"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39144",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-20T06:42:26Z",
"details": "important"
}
],
"title": "CVE-2021-39144"
},
{
"cve": "CVE-2021-39145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39145"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39145",
"url": "https://www.suse.com/security/cve/CVE-2021-39145"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39145",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-20T06:42:26Z",
"details": "important"
}
],
"title": "CVE-2021-39145"
},
{
"cve": "CVE-2021-39146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39146"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39146",
"url": "https://www.suse.com/security/cve/CVE-2021-39146"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39146",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-20T06:42:26Z",
"details": "important"
}
],
"title": "CVE-2021-39146"
},
{
"cve": "CVE-2021-39147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39147"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39147",
"url": "https://www.suse.com/security/cve/CVE-2021-39147"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39147",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-20T06:42:26Z",
"details": "important"
}
],
"title": "CVE-2021-39147"
},
{
"cve": "CVE-2021-39148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39148"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39148",
"url": "https://www.suse.com/security/cve/CVE-2021-39148"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39148",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-20T06:42:26Z",
"details": "important"
}
],
"title": "CVE-2021-39148"
},
{
"cve": "CVE-2021-39149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39149"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39149",
"url": "https://www.suse.com/security/cve/CVE-2021-39149"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39149",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-20T06:42:26Z",
"details": "important"
}
],
"title": "CVE-2021-39149"
},
{
"cve": "CVE-2021-39150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39150"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39150",
"url": "https://www.suse.com/security/cve/CVE-2021-39150"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39150",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-20T06:42:26Z",
"details": "important"
}
],
"title": "CVE-2021-39150"
},
{
"cve": "CVE-2021-39151",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39151"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39151",
"url": "https://www.suse.com/security/cve/CVE-2021-39151"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39151",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-20T06:42:26Z",
"details": "important"
}
],
"title": "CVE-2021-39151"
},
{
"cve": "CVE-2021-39152",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39152"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39152",
"url": "https://www.suse.com/security/cve/CVE-2021-39152"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39152",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-20T06:42:26Z",
"details": "important"
}
],
"title": "CVE-2021-39152"
},
{
"cve": "CVE-2021-39153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39153"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39153",
"url": "https://www.suse.com/security/cve/CVE-2021-39153"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39153",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-20T06:42:26Z",
"details": "important"
}
],
"title": "CVE-2021-39153"
},
{
"cve": "CVE-2021-39154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39154"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39154",
"url": "https://www.suse.com/security/cve/CVE-2021-39154"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39154",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:xstream-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-benchmark-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-javadoc-1.4.18-3.14.1.noarch",
"openSUSE Leap 15.3:xstream-parent-1.4.18-3.14.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-20T06:42:26Z",
"details": "important"
}
],
"title": "CVE-2021-39154"
}
]
}
OPENSUSE-SU-2024:10592-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "xstream-1.4.18-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the xstream-1.4.18-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10592",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10592-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3674 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7957 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7957/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26217 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26258 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26258/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26259 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26259/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-21341 page",
"url": "https://www.suse.com/security/cve/CVE-2021-21341/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-21342 page",
"url": "https://www.suse.com/security/cve/CVE-2021-21342/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-21343 page",
"url": "https://www.suse.com/security/cve/CVE-2021-21343/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-21344 page",
"url": "https://www.suse.com/security/cve/CVE-2021-21344/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-21345 page",
"url": "https://www.suse.com/security/cve/CVE-2021-21345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-21346 page",
"url": "https://www.suse.com/security/cve/CVE-2021-21346/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-21347 page",
"url": "https://www.suse.com/security/cve/CVE-2021-21347/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-21348 page",
"url": "https://www.suse.com/security/cve/CVE-2021-21348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-21349 page",
"url": "https://www.suse.com/security/cve/CVE-2021-21349/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-21350 page",
"url": "https://www.suse.com/security/cve/CVE-2021-21350/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-21351 page",
"url": "https://www.suse.com/security/cve/CVE-2021-21351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29505 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39139 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39144 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39147 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39150 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39153 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39153/"
}
],
"title": "xstream-1.4.18-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10592-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xstream-1.4.18-1.1.aarch64",
"product": {
"name": "xstream-1.4.18-1.1.aarch64",
"product_id": "xstream-1.4.18-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xstream-benchmark-1.4.18-1.1.aarch64",
"product": {
"name": "xstream-benchmark-1.4.18-1.1.aarch64",
"product_id": "xstream-benchmark-1.4.18-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xstream-javadoc-1.4.18-1.1.aarch64",
"product": {
"name": "xstream-javadoc-1.4.18-1.1.aarch64",
"product_id": "xstream-javadoc-1.4.18-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xstream-parent-1.4.18-1.1.aarch64",
"product": {
"name": "xstream-parent-1.4.18-1.1.aarch64",
"product_id": "xstream-parent-1.4.18-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xstream-1.4.18-1.1.ppc64le",
"product": {
"name": "xstream-1.4.18-1.1.ppc64le",
"product_id": "xstream-1.4.18-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xstream-benchmark-1.4.18-1.1.ppc64le",
"product": {
"name": "xstream-benchmark-1.4.18-1.1.ppc64le",
"product_id": "xstream-benchmark-1.4.18-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xstream-javadoc-1.4.18-1.1.ppc64le",
"product": {
"name": "xstream-javadoc-1.4.18-1.1.ppc64le",
"product_id": "xstream-javadoc-1.4.18-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xstream-parent-1.4.18-1.1.ppc64le",
"product": {
"name": "xstream-parent-1.4.18-1.1.ppc64le",
"product_id": "xstream-parent-1.4.18-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xstream-1.4.18-1.1.s390x",
"product": {
"name": "xstream-1.4.18-1.1.s390x",
"product_id": "xstream-1.4.18-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xstream-benchmark-1.4.18-1.1.s390x",
"product": {
"name": "xstream-benchmark-1.4.18-1.1.s390x",
"product_id": "xstream-benchmark-1.4.18-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xstream-javadoc-1.4.18-1.1.s390x",
"product": {
"name": "xstream-javadoc-1.4.18-1.1.s390x",
"product_id": "xstream-javadoc-1.4.18-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xstream-parent-1.4.18-1.1.s390x",
"product": {
"name": "xstream-parent-1.4.18-1.1.s390x",
"product_id": "xstream-parent-1.4.18-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xstream-1.4.18-1.1.x86_64",
"product": {
"name": "xstream-1.4.18-1.1.x86_64",
"product_id": "xstream-1.4.18-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xstream-benchmark-1.4.18-1.1.x86_64",
"product": {
"name": "xstream-benchmark-1.4.18-1.1.x86_64",
"product_id": "xstream-benchmark-1.4.18-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xstream-javadoc-1.4.18-1.1.x86_64",
"product": {
"name": "xstream-javadoc-1.4.18-1.1.x86_64",
"product_id": "xstream-javadoc-1.4.18-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xstream-parent-1.4.18-1.1.x86_64",
"product": {
"name": "xstream-parent-1.4.18-1.1.x86_64",
"product_id": "xstream-parent-1.4.18-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-1.4.18-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64"
},
"product_reference": "xstream-1.4.18-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-1.4.18-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le"
},
"product_reference": "xstream-1.4.18-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-1.4.18-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x"
},
"product_reference": "xstream-1.4.18-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-1.4.18-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64"
},
"product_reference": "xstream-1.4.18-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-benchmark-1.4.18-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64"
},
"product_reference": "xstream-benchmark-1.4.18-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-benchmark-1.4.18-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le"
},
"product_reference": "xstream-benchmark-1.4.18-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-benchmark-1.4.18-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x"
},
"product_reference": "xstream-benchmark-1.4.18-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-benchmark-1.4.18-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64"
},
"product_reference": "xstream-benchmark-1.4.18-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-javadoc-1.4.18-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64"
},
"product_reference": "xstream-javadoc-1.4.18-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-javadoc-1.4.18-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le"
},
"product_reference": "xstream-javadoc-1.4.18-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-javadoc-1.4.18-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x"
},
"product_reference": "xstream-javadoc-1.4.18-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-javadoc-1.4.18-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64"
},
"product_reference": "xstream-javadoc-1.4.18-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-parent-1.4.18-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64"
},
"product_reference": "xstream-parent-1.4.18-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-parent-1.4.18-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le"
},
"product_reference": "xstream-parent-1.4.18-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-parent-1.4.18-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x"
},
"product_reference": "xstream-parent-1.4.18-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-parent-1.4.18-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
},
"product_reference": "xstream-parent-1.4.18-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-3674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3674"
}
],
"notes": [
{
"category": "general",
"text": "Multiple XML external entity (XXE) vulnerabilities in the (1) Dom4JDriver, (2) DomDriver, (3) JDomDriver, (4) JDom2Driver, (5) SjsxpDriver, (6) StandardStaxDriver, and (7) WstxDriver drivers in XStream before 1.4.9 allow remote attackers to read arbitrary files via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3674",
"url": "https://www.suse.com/security/cve/CVE-2016-3674"
},
{
"category": "external",
"summary": "SUSE Bug 972950 for CVE-2016-3674",
"url": "https://bugzilla.suse.com/972950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-3674"
},
{
"cve": "CVE-2017-7957",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7957"
}
],
"notes": [
{
"category": "general",
"text": "XStream through 1.4.9, when a certain denyTypes workaround is not used, mishandles attempts to create an instance of the primitive type \u0027void\u0027 during unmarshalling, leading to a remote application crash, as demonstrated by an xstream.fromXML(\"\u003cvoid/\u003e\") call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7957",
"url": "https://www.suse.com/security/cve/CVE-2017-7957"
},
{
"category": "external",
"summary": "SUSE Bug 1070731 for CVE-2017-7957",
"url": "https://bugzilla.suse.com/1070731"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7957"
},
{
"cve": "CVE-2020-26217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26217"
}
],
"notes": [
{
"category": "general",
"text": "XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream\u0027s Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26217",
"url": "https://www.suse.com/security/cve/CVE-2020-26217"
},
{
"category": "external",
"summary": "SUSE Bug 1180994 for CVE-2020-26217",
"url": "https://bugzilla.suse.com/1180994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-26217"
},
{
"cve": "CVE-2020-26258",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26258"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream\u0027s Security Framework with a whitelist! Anyone relying on XStream\u0027s default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26258",
"url": "https://www.suse.com/security/cve/CVE-2020-26258"
},
{
"category": "external",
"summary": "SUSE Bug 1180146 for CVE-2020-26258",
"url": "https://bugzilla.suse.com/1180146"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-26258"
},
{
"cve": "CVE-2020-26259",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26259"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream\u0027s Security Framework with a whitelist! Anyone relying on XStream\u0027s default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26259",
"url": "https://www.suse.com/security/cve/CVE-2020-26259"
},
{
"category": "external",
"summary": "SUSE Bug 1180145 for CVE-2020-26259",
"url": "https://bugzilla.suse.com/1180145"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-26259"
},
{
"cve": "CVE-2021-21341",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-21341"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-21341",
"url": "https://www.suse.com/security/cve/CVE-2021-21341"
},
{
"category": "external",
"summary": "SUSE Bug 1184377 for CVE-2021-21341",
"url": "https://bugzilla.suse.com/1184377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-21341"
},
{
"cve": "CVE-2021-21342",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-21342"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-21342",
"url": "https://www.suse.com/security/cve/CVE-2021-21342"
},
{
"category": "external",
"summary": "SUSE Bug 1184379 for CVE-2021-21342",
"url": "https://bugzilla.suse.com/1184379"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-21342"
},
{
"cve": "CVE-2021-21343",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-21343"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-21343",
"url": "https://www.suse.com/security/cve/CVE-2021-21343"
},
{
"category": "external",
"summary": "SUSE Bug 1184376 for CVE-2021-21343",
"url": "https://bugzilla.suse.com/1184376"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-21343"
},
{
"cve": "CVE-2021-21344",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-21344"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-21344",
"url": "https://www.suse.com/security/cve/CVE-2021-21344"
},
{
"category": "external",
"summary": "SUSE Bug 1184375 for CVE-2021-21344",
"url": "https://bugzilla.suse.com/1184375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-21344"
},
{
"cve": "CVE-2021-21345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-21345"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-21345",
"url": "https://www.suse.com/security/cve/CVE-2021-21345"
},
{
"category": "external",
"summary": "SUSE Bug 1184372 for CVE-2021-21345",
"url": "https://bugzilla.suse.com/1184372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-21345"
},
{
"cve": "CVE-2021-21346",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-21346"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-21346",
"url": "https://www.suse.com/security/cve/CVE-2021-21346"
},
{
"category": "external",
"summary": "SUSE Bug 1184373 for CVE-2021-21346",
"url": "https://bugzilla.suse.com/1184373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-21346"
},
{
"cve": "CVE-2021-21347",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-21347"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-21347",
"url": "https://www.suse.com/security/cve/CVE-2021-21347"
},
{
"category": "external",
"summary": "SUSE Bug 1184378 for CVE-2021-21347",
"url": "https://bugzilla.suse.com/1184378"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-21347"
},
{
"cve": "CVE-2021-21348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-21348"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-21348",
"url": "https://www.suse.com/security/cve/CVE-2021-21348"
},
{
"category": "external",
"summary": "SUSE Bug 1184374 for CVE-2021-21348",
"url": "https://bugzilla.suse.com/1184374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-21348"
},
{
"cve": "CVE-2021-21349",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-21349"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-21349",
"url": "https://www.suse.com/security/cve/CVE-2021-21349"
},
{
"category": "external",
"summary": "SUSE Bug 1184797 for CVE-2021-21349",
"url": "https://bugzilla.suse.com/1184797"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-21349"
},
{
"cve": "CVE-2021-21350",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-21350"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-21350",
"url": "https://www.suse.com/security/cve/CVE-2021-21350"
},
{
"category": "external",
"summary": "SUSE Bug 1184380 for CVE-2021-21350",
"url": "https://bugzilla.suse.com/1184380"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-21350"
},
{
"cve": "CVE-2021-21351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-21351"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-21351",
"url": "https://www.suse.com/security/cve/CVE-2021-21351"
},
{
"category": "external",
"summary": "SUSE Bug 1184796 for CVE-2021-21351",
"url": "https://bugzilla.suse.com/1184796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-21351"
},
{
"cve": "CVE-2021-29505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29505"
}
],
"notes": [
{
"category": "general",
"text": "XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29505",
"url": "https://www.suse.com/security/cve/CVE-2021-29505"
},
{
"category": "external",
"summary": "SUSE Bug 1186651 for CVE-2021-29505",
"url": "https://bugzilla.suse.com/1186651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-29505"
},
{
"cve": "CVE-2021-39139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39139"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39139",
"url": "https://www.suse.com/security/cve/CVE-2021-39139"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39139",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-39139"
},
{
"cve": "CVE-2021-39144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39144"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39144",
"url": "https://www.suse.com/security/cve/CVE-2021-39144"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39144",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-39144"
},
{
"cve": "CVE-2021-39147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39147"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39147",
"url": "https://www.suse.com/security/cve/CVE-2021-39147"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39147",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-39147"
},
{
"cve": "CVE-2021-39150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39150"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39150",
"url": "https://www.suse.com/security/cve/CVE-2021-39150"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39150",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-39150"
},
{
"cve": "CVE-2021-39153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39153"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39153",
"url": "https://www.suse.com/security/cve/CVE-2021-39153"
},
{
"category": "external",
"summary": "SUSE Bug 1189798 for CVE-2021-39153",
"url": "https://bugzilla.suse.com/1189798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xstream-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-benchmark-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-javadoc-1.4.18-1.1.x86_64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.aarch64",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.ppc64le",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.s390x",
"openSUSE Tumbleweed:xstream-parent-1.4.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-39153"
}
]
}
RHSA-2021:3956
Vulnerability from csaf_redhat - Published: 2021-10-25 06:54 - Updated: 2026-05-14 22:31A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to request data from internal resources that are not publicly available by manipulating the processed input stream with Java runtime versions 14 to 8. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to request data from internal resources that are not publicly available by manipulating the processed input stream with Java runtime versions 14 to 8. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xstream is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "XStream is a Java XML serialization library to serialize objects to and deserialize object from XML.\n\nSecurity Fix(es):\n\n* xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl (CVE-2021-39139)\n\n* xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* (CVE-2021-39141)\n\n* xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.* (CVE-2021-39144)\n\n* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration (CVE-2021-39145)\n\n* xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue (CVE-2021-39146)\n\n* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration (CVE-2021-39147)\n\n* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator (CVE-2021-39148)\n\n* xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.* (CVE-2021-39149)\n\n* xstream: Server-side request forgery (SSRF) via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* (CVE-2021-39150)\n\n* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration (CVE-2021-39151)\n\n* xstream: Server-side request forgery (SSRF) via unsafe deserialization of jdk.nashorn.internal.runtime.Source$URLData (CVE-2021-39152)\n\n* xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl (CVE-2021-39153)\n\n* xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue (CVE-2021-39154)\n\n* xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler (CVE-2021-39140)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3956",
"url": "https://access.redhat.com/errata/RHSA-2021:3956"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1997763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997763"
},
{
"category": "external",
"summary": "1997765",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997765"
},
{
"category": "external",
"summary": "1997769",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997769"
},
{
"category": "external",
"summary": "1997772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997772"
},
{
"category": "external",
"summary": "1997775",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997775"
},
{
"category": "external",
"summary": "1997777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997777"
},
{
"category": "external",
"summary": "1997779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997779"
},
{
"category": "external",
"summary": "1997781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997781"
},
{
"category": "external",
"summary": "1997784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997784"
},
{
"category": "external",
"summary": "1997786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997786"
},
{
"category": "external",
"summary": "1997791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997791"
},
{
"category": "external",
"summary": "1997793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997793"
},
{
"category": "external",
"summary": "1997795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997795"
},
{
"category": "external",
"summary": "1997801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997801"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3956.json"
}
],
"title": "Red Hat Security Advisory: xstream security update",
"tracking": {
"current_release_date": "2026-05-14T22:31:30+00:00",
"generator": {
"date": "2026-05-14T22:31:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2021:3956",
"initial_release_date": "2021-10-25T06:54:35+00:00",
"revision_history": [
{
"date": "2021-10-25T06:54:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-10-25T06:54:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:31:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xstream-0:1.3.1-16.el7_9.src",
"product": {
"name": "xstream-0:1.3.1-16.el7_9.src",
"product_id": "xstream-0:1.3.1-16.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xstream@1.3.1-16.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xstream-0:1.3.1-16.el7_9.noarch",
"product": {
"name": "xstream-0:1.3.1-16.el7_9.noarch",
"product_id": "xstream-0:1.3.1-16.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xstream@1.3.1-16.el7_9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"product": {
"name": "xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"product_id": "xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xstream-javadoc@1.3.1-16.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-0:1.3.1-16.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch"
},
"product_reference": "xstream-0:1.3.1-16.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-0:1.3.1-16.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src"
},
"product_reference": "xstream-0:1.3.1-16.el7_9.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-javadoc-0:1.3.1-16.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
},
"product_reference": "xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-0:1.3.1-16.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch"
},
"product_reference": "xstream-0:1.3.1-16.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-0:1.3.1-16.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src"
},
"product_reference": "xstream-0:1.3.1-16.el7_9.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-javadoc-0:1.3.1-16.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
},
"product_reference": "xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-0:1.3.1-16.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch"
},
"product_reference": "xstream-0:1.3.1-16.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-0:1.3.1-16.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src"
},
"product_reference": "xstream-0:1.3.1-16.el7_9.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-javadoc-0:1.3.1-16.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
},
"product_reference": "xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-0:1.3.1-16.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch"
},
"product_reference": "xstream-0:1.3.1-16.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-0:1.3.1-16.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src"
},
"product_reference": "xstream-0:1.3.1-16.el7_9.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-javadoc-0:1.3.1-16.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
},
"product_reference": "xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-39139",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997763"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Users who follow the recommended security framework with a whitelist to limit the types to the minimum required should not be affected. XStream 1.4.18 no longer uses a blacklist by default since it cannot be secured for general purposes.\n\nOpenShift Container Platform (OCP) delivers Jenkins LTS package with bundled XStream library. Due to JEP-200 [1] and JEP-228 [2] Jenkins projects, the OCP Jenkins package is not affected by this flaw.\nThis version of the XStream library will be delivered in future Jenkins releases.\n\n[1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc\n[2] https://github.com/jenkinsci/jep/blob/master/jep/228/README.adoc#security",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39139"
},
{
"category": "external",
"summary": "RHBZ#1997763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997763"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39139"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-64xx-cq4q-mf44",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-64xx-cq4q-mf44"
}
],
"release_date": "2021-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-25T06:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl"
},
{
"cve": "CVE-2021-39140",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997765"
}
],
"notes": [
{
"category": "description",
"text": "XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift Container Platform (OCP) delivers Jenkins LTS package with bundled XStream library. Due to JEP-200 [1] and JEP-228 [2] Jenkins projects, OCP Jenkins package is not affected by this flaw.\nThis version of XStream library will be delivered in the future Jenkins releases.\n\n[1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc\n[2] https://github.com/jenkinsci/jep/blob/master/jep/228/README.adoc#security",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39140"
},
{
"category": "external",
"summary": "RHBZ#1997765",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997765"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39140",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39140"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-6wf9-jmg9-vxcc",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-6wf9-jmg9-vxcc"
}
],
"release_date": "2021-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-25T06:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler"
},
{
"cve": "CVE-2021-39141",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997769"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.*",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Users who follow the recommended security framework with a whitelist to limit the types to the minimum required should not be affected. XStream 1.4.18 no longer uses a blacklist by default since it cannot be secured for general purposes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39141"
},
{
"category": "external",
"summary": "RHBZ#1997769",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997769"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39141"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-g5w6-mrj7-75h2",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-g5w6-mrj7-75h2"
}
],
"release_date": "2021-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-25T06:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.*"
},
{
"cve": "CVE-2021-39144",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997772"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.*",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Users who follow the recommended security framework with a whitelist to limit the types to the minimum required should not be affected. XStream 1.4.18 no longer uses a blacklist by default since it cannot be secured for general purposes.\n\nOpenShift Container Platform (OCP) delivers Jenkins LTS package with bundled XStream library. Due to JEP-200 [1] and JEP-228 [2] Jenkins projects, OCP Jenkins package is not affected by this flaw.\nThis version of XStream library will be delivered in future Jenkins releases.\n\n[1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc\n[2] https://github.com/jenkinsci/jep/blob/master/jep/228/README.adoc#security\n\nFor more information, please refer to the [Red Hat solution Article](https://access.redhat.com/solutions/7002450) explaining this issue.\n\nOpenShift Logging\u0027s Elasticsearch 6.8.1 using opendistro_security v0.10.1.2 is not affected by the vulnerable code because com.thoughtworks.xstream is only a build-time dependency.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39144"
},
{
"category": "external",
"summary": "RHBZ#1997772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39144"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-25T06:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-03-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.*"
},
{
"cve": "CVE-2021-39145",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997775"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Users who follow the recommended security framework with a whitelist to limit the types to the minimum required should not be affected. XStream 1.4.18 no longer uses a blacklist by default since it cannot be secured for general purposes.\n\nOpenShift Container Platform (OCP) delivers the Jenkins LTS package with bundled XStream library. Due to JEP-200 [1] and JEP-228 [2] Jenkins projects, the OCP Jenkins package is not affected by this flaw.\nThis version of the XStream library will be delivered in future Jenkins releases.\n\n[1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc\n[2] https://github.com/jenkinsci/jep/blob/master/jep/228/README.adoc#security",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39145"
},
{
"category": "external",
"summary": "RHBZ#1997775",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997775"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39145",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39145"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39145",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39145"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-8jrj-525p-826v",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-8jrj-525p-826v"
}
],
"release_date": "2021-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-25T06:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration"
},
{
"cve": "CVE-2021-39146",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997777"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Users who follow the recommended security framework with a whitelist to limit the types to the minimum required should not be affected. XStream 1.4.18 no longer uses a blacklist by default since it cannot be secured for general purposes.\n\nOpenShift Container Platform (OCP) delivers the Jenkins LTS package with bundled XStream library. Due to JEP-200 [1] and JEP-228 [2] Jenkins projects, the OCP Jenkins package is not affected by this flaw.\nThis version of the XStream library will be delivered in future Jenkins releases.\n\n[1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc\n[2] https://github.com/jenkinsci/jep/blob/master/jep/228/README.adoc#security",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39146"
},
{
"category": "external",
"summary": "RHBZ#1997777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997777"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39146"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39146",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39146"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-p8pq-r894-fm8f",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-p8pq-r894-fm8f"
}
],
"release_date": "2021-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-25T06:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue"
},
{
"cve": "CVE-2021-39147",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997779"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Users who follow the recommended security framework with a whitelist to limit the types to the minimum required should not be affected. XStream 1.4.18 no longer uses a blacklist by default since it cannot be secured for general purposes.\n\nOpenShift Container Platform (OCP) delivers the Jenkins LTS package with bundled XStream library. Due to JEP-200 [1] and JEP-228 [2] Jenkins projects, the OCP Jenkins package is not affected by this flaw.\nThis version of the XStream library will be delivered in future Jenkins releases.\n\n[1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc\n[2] https://github.com/jenkinsci/jep/blob/master/jep/228/README.adoc#security",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39147"
},
{
"category": "external",
"summary": "RHBZ#1997779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997779"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39147",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39147"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39147",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39147"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-h7v4-7xg3-hxcc",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-h7v4-7xg3-hxcc"
}
],
"release_date": "2021-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-25T06:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration"
},
{
"cve": "CVE-2021-39148",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997781"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Users who follow the recommended security framework with a whitelist to limit the types to the minimum required should not be affected. XStream 1.4.18 no longer uses a blacklist by default since it cannot be secured for general purposes.\n\nOpenShift Container Platform (OCP) delivers the Jenkins LTS package with bundled XStream library. Due to JEP-200 [1] and JEP-228 [2] Jenkins projects, the OCP Jenkins package is not affected by this flaw.\nThis version of the XStream library will be delivered in future Jenkins releases.\n\n[1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc\n[2] https://github.com/jenkinsci/jep/blob/master/jep/228/README.adoc#security",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39148"
},
{
"category": "external",
"summary": "RHBZ#1997781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997781"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39148",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39148"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39148",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39148"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2"
}
],
"release_date": "2021-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-25T06:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator"
},
{
"cve": "CVE-2021-39149",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.*",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Users who follow the recommended security framework with a whitelist to limit the types to the minimum required should not be affected. XStream 1.4.18 no longer uses a blacklist by default since it cannot be secured for general purposes.\n\nOpenShift Container Platform (OCP) delivers the Jenkins LTS package with bundled XStream library. Due to JEP-200 [1] and JEP-228 [2] Jenkins projects, the OCP Jenkins package is not affected by this flaw.\nThis version of the XStream library will be delivered in future Jenkins releases.\n\n[1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc\n[2] https://github.com/jenkinsci/jep/blob/master/jep/228/README.adoc#security",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39149"
},
{
"category": "external",
"summary": "RHBZ#1997784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39149",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39149"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39149",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39149"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-3ccq-5vw3-2p6x",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-3ccq-5vw3-2p6x"
}
],
"release_date": "2021-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-25T06:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.*"
},
{
"cve": "CVE-2021-39150",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997786"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to request data from internal resources that are not publicly available by manipulating the processed input stream with Java runtime versions 14 to 8. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Server-side request forgery (SSRF) via unsafe deserialization of com.sun.xml.internal.ws.client.sei.*",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Users who follow the recommended security framework with a whitelist to limit the types to the minimum required should not be affected. If you rely on XStream\u0027s default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.\n\nOpenShift Container Platform (OCP) delivers the Jenkins LTS package with bundled XStream library. Due to JEP-200 [1] and JEP-228 [2] Jenkins projects, the OCP Jenkins package is not affected by this flaw.\nThis version of the XStream library will be delivered in future Jenkins releases.\n\n[1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc\n[2] https://github.com/jenkinsci/jep/blob/master/jep/228/README.adoc#security",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39150"
},
{
"category": "external",
"summary": "RHBZ#1997786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997786"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39150",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39150"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39150",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39150"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-cxfm-5m4g-x7xp",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-cxfm-5m4g-x7xp"
}
],
"release_date": "2021-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-25T06:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xstream: Server-side request forgery (SSRF) via unsafe deserialization of com.sun.xml.internal.ws.client.sei.*"
},
{
"cve": "CVE-2021-39151",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997791"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Users who follow the recommended security framework with a whitelist to limit the types to the minimum required should not be affected. XStream 1.4.18 no longer uses a blacklist by default since it cannot be secured for general purposes.\n\nOpenShift Container Platform (OCP) delivers the Jenkins LTS package with bundled XStream library. Due to JEP-200 [1] and JEP-228 [2] Jenkins projects, the OCP Jenkins package is not affected by this flaw.\n\nThis version of the XStream library will be delivered in future Jenkins releases.\n\n[1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc\n[2] https://github.com/jenkinsci/jep/blob/master/jep/228/README.adoc#security",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39151"
},
{
"category": "external",
"summary": "RHBZ#1997791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39151",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39151"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39151",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39151"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-hph2-m3g5-xxv4",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-hph2-m3g5-xxv4"
}
],
"release_date": "2021-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-25T06:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration"
},
{
"cve": "CVE-2021-39152",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997793"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to request data from internal resources that are not publicly available by manipulating the processed input stream with Java runtime versions 14 to 8. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Server-side request forgery (SSRF) via unsafe deserialization of jdk.nashorn.internal.runtime.Source$URLData",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Users who follow the recommended security framework with a whitelist to limit the types to the minimum required should not be affected. If you rely on XStream\u0027s default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.\n\nOpenShift Container Platform (OCP) delivers the Jenkins LTS package with bundled XStream library. Due to JEP-200 [1] and JEP-228 [2] Jenkins projects, the OCP Jenkins package is not affected by this flaw.\n\nThis version of the XStream library will be delivered in future Jenkins releases.\n\n[1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc\n[2] https://github.com/jenkinsci/jep/blob/master/jep/228/README.adoc#security",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39152"
},
{
"category": "external",
"summary": "RHBZ#1997793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39152",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39152"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39152",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39152"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-xw4p-crpj-vjx2",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-xw4p-crpj-vjx2"
}
],
"release_date": "2021-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-25T06:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xstream: Server-side request forgery (SSRF) via unsafe deserialization of jdk.nashorn.internal.runtime.Source$URLData"
},
{
"cve": "CVE-2021-39153",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997795"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Users who follow the recommended security framework with a whitelist to limit the types to the minimum required should not be affected. XStream 1.4.18 no longer uses a blacklist by default since it cannot be secured for general purposes.\n\nOpenShift Container Platform (OCP) delivers the Jenkins LTS package with bundled XStream library. Due to JEP-200 [1] and JEP-228 [2] Jenkins projects, the OCP Jenkins package is not affected by this flaw.\nThis version of the XStream library will be delivered in future Jenkins releases.\n\n[1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc\n[2] https://github.com/jenkinsci/jep/blob/master/jep/228/README.adoc#security",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39153"
},
{
"category": "external",
"summary": "RHBZ#1997795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997795"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39153"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39153",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39153"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v"
}
],
"release_date": "2021-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-25T06:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl"
},
{
"cve": "CVE-2021-39154",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997801"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Users who follow the recommended security framework with a whitelist to limit the types to the minimum required should not be affected. XStream 1.4.18 no longer uses a blacklist by default since it cannot be secured for general purposes.\n\nOpenShift Container Platform (OCP) delivers the Jenkins LTS package with bundled XStream library. Due to JEP-200 [1] and JEP-228 [2] Jenkins projects, the OCP Jenkins package is not affected by this flaw.\nThis version of the XStream library will be delivered in future Jenkins releases.\n\n[1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc\n[2] https://github.com/jenkinsci/jep/blob/master/jep/228/README.adoc#security",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-39154"
},
{
"category": "external",
"summary": "RHBZ#1997801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-39154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39154"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-6w62-hx7r-mw68",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-6w62-hx7r-mw68"
}
],
"release_date": "2021-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-25T06:54:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3956"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Client-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Client-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7ComputeNode-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Server-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Server-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.noarch",
"7Workstation-optional-7.9.Z:xstream-0:1.3.1-16.el7_9.src",
"7Workstation-optional-7.9.Z:xstream-javadoc-0:1.3.1-16.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.