SUSE alert SUSE-SU-2021:0176-1 (xstream)
From: | sle-security-updates@lists.suse.com | |
To: | sle-security-updates@lists.suse.com | |
Subject: | SUSE-SU-2021:0176-1: important: Security update for xstream | |
Date: | Wed, 20 Jan 2021 15:17:27 +0100 | |
Message-ID: | <20210120141727.4908AFF18@maintenance.suse.de> |
SUSE Security Update: Security update for xstream ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0176-1 Rating: important References: #1180145 #1180146 #1180994 Cross-References: CVE-2020-26217 CVE-2020-26258 CVE-2020-26259 Affected Products: SUSE Linux Enterprise Module for Development Tools 15-SP2 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for xstream fixes the following issues: xstream was updated to version 1.4.15. - CVE-2020-26217: Fixed a remote code execution due to insecure XML deserialization when relying on blocklists (bsc#1180994). - CVE-2020-26258: Fixed a server-side request forgery vulnerability (bsc#1180146). - CVE-2020-26259: Fixed an arbitrary file deletion vulnerability (bsc#1180145). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Development Tools 15-SP2: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2021-176=1 Package List: - SUSE Linux Enterprise Module for Development Tools 15-SP2 (noarch): xstream-1.4.15-3.3.2 References: https://www.suse.com/security/cve/CVE-2020-26217.html https://www.suse.com/security/cve/CVE-2020-26258.html https://www.suse.com/security/cve/CVE-2020-26259.html https://bugzilla.suse.com/1180145 https://bugzilla.suse.com/1180146 https://bugzilla.suse.com/1180994