<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xstream</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2021:1840-2</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-07-11T08:25:39Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-07-11T08:25:39Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-07-11T08:25:39Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xstream</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for xstream fixes the following issues:

- Upgrade to 1.4.16
- CVE-2021-21351: remote attacker to load and execute arbitrary code (bsc#1184796)
- CVE-2021-21349: SSRF can lead to a remote attacker to request data from internal resources (bsc#1184797)
- CVE-2021-21350: arbitrary code execution (bsc#1184380)
- CVE-2021-21348: remote attacker could cause denial of service by consuming maximum CPU time (bsc#1184374)
- CVE-2021-21347: remote attacker to load and execute arbitrary code from a remote host (bsc#1184378)
- CVE-2021-21344: remote attacker could load and execute arbitrary code from a remote host (bsc#1184375)
- CVE-2021-21342: server-side forgery (bsc#1184379)
- CVE-2021-21341: remote attacker could cause a denial of service by allocating 100% CPU time (bsc#1184377)
- CVE-2021-21346: remote attacker could load and execute arbitrary code (bsc#1184373)
- CVE-2021-21345: remote attacker with sufficient rights could execute commands (bsc#1184372)
- CVE-2021-21343: replace or inject objects, that result in the deletion of files on the local host (bsc#1184376)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/manager/5.0/x86_64/server:latest-2021-1840,Container suse/multi-linux-manager/5.1/x86_64/server:latest-2021-1840,Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure-2021-1840,Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM-2021-1840,Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE-2021-1840,Image SLES15-SP4-Manager-Server-4-3-2021-1840,Image SLES15-SP4-Manager-Server-4-3-Azure-llc-2021-1840,Image SLES15-SP4-Manager-Server-4-3-Azure-ltd-2021-1840,Image SLES15-SP4-Manager-Server-4-3-BYOS-2021-1840,Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure-2021-1840,Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2-2021-1840,Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE-2021-1840,Image SLES15-SP4-Manager-Server-4-3-EC2-llc-2021-1840,Image SLES15-SP4-Manager-Server-4-3-EC2-ltd-2021-1840,Image server-image-2021-1840,SUSE-2021-1840,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-1840</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211840-2/</URL>
      <Description>Link for SUSE-SU-2021:1840-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html</URL>
      <Description>E-Mail link for SUSE-SU-2021:1840-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184372</URL>
      <Description>SUSE Bug 1184372</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184373</URL>
      <Description>SUSE Bug 1184373</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184374</URL>
      <Description>SUSE Bug 1184374</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184375</URL>
      <Description>SUSE Bug 1184375</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184376</URL>
      <Description>SUSE Bug 1184376</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184377</URL>
      <Description>SUSE Bug 1184377</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184378</URL>
      <Description>SUSE Bug 1184378</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184379</URL>
      <Description>SUSE Bug 1184379</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184380</URL>
      <Description>SUSE Bug 1184380</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184796</URL>
      <Description>SUSE Bug 1184796</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184797</URL>
      <Description>SUSE Bug 1184797</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21341/</URL>
      <Description>SUSE CVE CVE-2021-21341 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21342/</URL>
      <Description>SUSE CVE CVE-2021-21342 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21343/</URL>
      <Description>SUSE CVE CVE-2021-21343 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21344/</URL>
      <Description>SUSE CVE CVE-2021-21344 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21345/</URL>
      <Description>SUSE CVE CVE-2021-21345 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21346/</URL>
      <Description>SUSE CVE CVE-2021-21346 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21347/</URL>
      <Description>SUSE CVE CVE-2021-21347 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21348/</URL>
      <Description>SUSE CVE CVE-2021-21348 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21349/</URL>
      <Description>SUSE CVE CVE-2021-21349 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21350/</URL>
      <Description>SUSE CVE CVE-2021-21350 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21351/</URL>
      <Description>SUSE CVE CVE-2021-21351 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container suse/manager/5.0/x86_64/server:latest">
      <Branch Type="Product Name" Name="Container suse/manager/5.0/x86_64/server:latest">
        <FullProductName ProductID="Container suse/manager/5.0/x86_64/server:latest">Container suse/manager/5.0/x86_64/server:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/multi-linux-manager/5.1/x86_64/server:latest">
      <Branch Type="Product Name" Name="Container suse/multi-linux-manager/5.1/x86_64/server:latest">
        <FullProductName ProductID="Container suse/multi-linux-manager/5.1/x86_64/server:latest">Container suse/multi-linux-manager/5.1/x86_64/server:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure">
      <Branch Type="Product Name" Name="Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure">
        <FullProductName ProductID="Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure">Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM">
      <Branch Type="Product Name" Name="Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM">
        <FullProductName ProductID="Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM">Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE">
      <Branch Type="Product Name" Name="Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE">
        <FullProductName ProductID="Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE">Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3">Image SLES15-SP4-Manager-Server-4-3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-Azure-llc">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-Azure-llc">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-Azure-llc">Image SLES15-SP4-Manager-Server-4-3-Azure-llc</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-Azure-ltd">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-Azure-ltd">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-Azure-ltd">Image SLES15-SP4-Manager-Server-4-3-Azure-ltd</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS">Image SLES15-SP4-Manager-Server-4-3-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure">Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2">Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE">Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-EC2-llc">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-EC2-llc">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-EC2-llc">Image SLES15-SP4-Manager-Server-4-3-EC2-llc</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP4-Manager-Server-4-3-EC2-ltd">
      <Branch Type="Product Name" Name="Image SLES15-SP4-Manager-Server-4-3-EC2-ltd">
        <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-EC2-ltd">Image SLES15-SP4-Manager-Server-4-3-EC2-ltd</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image server-image">
      <Branch Type="Product Name" Name="Image server-image">
        <FullProductName ProductID="Image server-image">Image server-image</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Server Module 4.2">
      <Branch Type="Product Name" Name="SUSE Manager Server Module 4.2">
        <FullProductName ProductID="SUSE Manager Server Module 4.2" CPE="cpe:/o:suse:sle-module-suse-manager-server:4.2">SUSE Manager Server Module 4.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xstream-1.4.16-3.8.1">
      <FullProductName ProductID="xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xstream-benchmark-1.4.16-3.8.1">
      <FullProductName ProductID="xstream-benchmark-1.4.16-3.8.1">xstream-benchmark-1.4.16-3.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xstream-javadoc-1.4.16-3.8.1">
      <FullProductName ProductID="xstream-javadoc-1.4.16-3.8.1">xstream-javadoc-1.4.16-3.8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xstream-parent-1.4.16-3.8.1">
      <FullProductName ProductID="xstream-parent-1.4.16-3.8.1">xstream-parent-1.4.16-3.8.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xstream-1.4.16-3.8.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/manager/5.0/x86_64/server:latest">
      <FullProductName ProductID="Container suse/manager/5.0/x86_64/server:latest:xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1 as a component of Container suse/manager/5.0/x86_64/server:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="xstream-1.4.16-3.8.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/multi-linux-manager/5.1/x86_64/server:latest">
      <FullProductName ProductID="Container suse/multi-linux-manager/5.1/x86_64/server:latest:xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1 as a component of Container suse/multi-linux-manager/5.1/x86_64/server:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="xstream-1.4.16-3.8.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure">
      <FullProductName ProductID="Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1 as a component of Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="xstream-1.4.16-3.8.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM">
      <FullProductName ProductID="Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1 as a component of Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM</FullProductName>
    </Relationship>
    <Relationship ProductReference="xstream-1.4.16-3.8.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE">
      <FullProductName ProductID="Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE:xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1 as a component of Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE</FullProductName>
    </Relationship>
    <Relationship ProductReference="xstream-1.4.16-3.8.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3:xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1 as a component of Image SLES15-SP4-Manager-Server-4-3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xstream-1.4.16-3.8.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-Azure-llc">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-Azure-llc:xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1 as a component of Image SLES15-SP4-Manager-Server-4-3-Azure-llc</FullProductName>
    </Relationship>
    <Relationship ProductReference="xstream-1.4.16-3.8.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-Azure-ltd">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1 as a component of Image SLES15-SP4-Manager-Server-4-3-Azure-ltd</FullProductName>
    </Relationship>
    <Relationship ProductReference="xstream-1.4.16-3.8.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-BYOS">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS:xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1 as a component of Image SLES15-SP4-Manager-Server-4-3-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xstream-1.4.16-3.8.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1 as a component of Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="xstream-1.4.16-3.8.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1 as a component of Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xstream-1.4.16-3.8.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1 as a component of Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE</FullProductName>
    </Relationship>
    <Relationship ProductReference="xstream-1.4.16-3.8.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-EC2-llc">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-EC2-llc:xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1 as a component of Image SLES15-SP4-Manager-Server-4-3-EC2-llc</FullProductName>
    </Relationship>
    <Relationship ProductReference="xstream-1.4.16-3.8.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP4-Manager-Server-4-3-EC2-ltd">
      <FullProductName ProductID="Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1 as a component of Image SLES15-SP4-Manager-Server-4-3-EC2-ltd</FullProductName>
    </Relationship>
    <Relationship ProductReference="xstream-1.4.16-3.8.1" RelationType="Default Component Of" RelatesToProductReference="Image server-image">
      <FullProductName ProductID="Image server-image:xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1 as a component of Image server-image</FullProductName>
    </Relationship>
    <Relationship ProductReference="xstream-1.4.16-3.8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Server Module 4.2">
      <FullProductName ProductID="SUSE Manager Server Module 4.2:xstream-1.4.16-3.8.1">xstream-1.4.16-3.8.1 as a component of SUSE Manager Server Module 4.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.</Note>
    </Notes>
    <CVE>CVE-2021-21341</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/5.0/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Container suse/multi-linux-manager/5.1/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image server-image:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>SUSE Manager Server Module 4.2:xstream-1.4.16-3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211840-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21341.html</URL>
        <Description>CVE-2021-21341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184377</URL>
        <Description>SUSE Bug 1184377</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.</Note>
    </Notes>
    <CVE>CVE-2021-21342</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/5.0/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Container suse/multi-linux-manager/5.1/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image server-image:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>SUSE Manager Server Module 4.2:xstream-1.4.16-3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211840-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21342.html</URL>
        <Description>CVE-2021-21342</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184379</URL>
        <Description>SUSE Bug 1184379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.</Note>
    </Notes>
    <CVE>CVE-2021-21343</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/5.0/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Container suse/multi-linux-manager/5.1/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image server-image:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>SUSE Manager Server Module 4.2:xstream-1.4.16-3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211840-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21343.html</URL>
        <Description>CVE-2021-21343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184376</URL>
        <Description>SUSE Bug 1184376</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.</Note>
    </Notes>
    <CVE>CVE-2021-21344</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/5.0/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Container suse/multi-linux-manager/5.1/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image server-image:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>SUSE Manager Server Module 4.2:xstream-1.4.16-3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211840-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21344.html</URL>
        <Description>CVE-2021-21344</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184375</URL>
        <Description>SUSE Bug 1184375</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.</Note>
    </Notes>
    <CVE>CVE-2021-21345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/5.0/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Container suse/multi-linux-manager/5.1/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image server-image:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>SUSE Manager Server Module 4.2:xstream-1.4.16-3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211840-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21345.html</URL>
        <Description>CVE-2021-21345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184372</URL>
        <Description>SUSE Bug 1184372</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.</Note>
    </Notes>
    <CVE>CVE-2021-21346</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/5.0/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Container suse/multi-linux-manager/5.1/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image server-image:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>SUSE Manager Server Module 4.2:xstream-1.4.16-3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211840-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21346.html</URL>
        <Description>CVE-2021-21346</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184373</URL>
        <Description>SUSE Bug 1184373</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.</Note>
    </Notes>
    <CVE>CVE-2021-21347</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/5.0/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Container suse/multi-linux-manager/5.1/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image server-image:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>SUSE Manager Server Module 4.2:xstream-1.4.16-3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211840-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21347.html</URL>
        <Description>CVE-2021-21347</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184378</URL>
        <Description>SUSE Bug 1184378</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.</Note>
    </Notes>
    <CVE>CVE-2021-21348</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/5.0/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Container suse/multi-linux-manager/5.1/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image server-image:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>SUSE Manager Server Module 4.2:xstream-1.4.16-3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211840-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21348.html</URL>
        <Description>CVE-2021-21348</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184374</URL>
        <Description>SUSE Bug 1184374</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.</Note>
    </Notes>
    <CVE>CVE-2021-21349</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/5.0/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Container suse/multi-linux-manager/5.1/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image server-image:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>SUSE Manager Server Module 4.2:xstream-1.4.16-3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211840-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21349.html</URL>
        <Description>CVE-2021-21349</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184797</URL>
        <Description>SUSE Bug 1184797</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.</Note>
    </Notes>
    <CVE>CVE-2021-21350</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/5.0/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Container suse/multi-linux-manager/5.1/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image server-image:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>SUSE Manager Server Module 4.2:xstream-1.4.16-3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211840-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21350.html</URL>
        <Description>CVE-2021-21350</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184380</URL>
        <Description>SUSE Bug 1184380</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.</Note>
    </Notes>
    <CVE>CVE-2021-21351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/5.0/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Container suse/multi-linux-manager/5.1/x86_64/server:latest:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-Azure-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-BYOS:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-llc:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3-EC2-ltd:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image SLES15-SP4-Manager-Server-4-3:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>Image server-image:xstream-1.4.16-3.8.1</ProductID>
        <ProductID>SUSE Manager Server Module 4.2:xstream-1.4.16-3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-20211840-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21351.html</URL>
        <Description>CVE-2021-21351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184796</URL>
        <Description>SUSE Bug 1184796</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
