VARIoT IoT vulnerabilities database
| VAR-202110-0396 | CVE-2021-21748 | ZTE MF971R Out-of-bounds write vulnerability in |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
ZTE MF971R product has two stack-based buffer overflow vulnerabilities. An attacker could exploit the vulnerabilities to execute arbitrary code. ZTE MF971R Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. ZTE MF971R is a Cat 6 LTE mobile Wi-Fi router with download speeds up to 300mbps and upload speeds up to 50mbps
| VAR-202110-0399 | CVE-2021-21743 | ZTE MF971R Injection vulnerability in |
CVSS V2: 4.3 CVSS V3: 4.3 Severity: MEDIUM |
ZTE MF971R product has a CRLF injection vulnerability. An attacker could exploit the vulnerability to modify the HTTP response header information through a specially crafted HTTP request. ZTE MF971R is a Cat 6 LTE mobile Wi-Fi router with download speeds up to 300mbps and upload speeds up to 50mbps
| VAR-202110-0395 | CVE-2021-21749 | ZTE MF971R Out-of-bounds write vulnerability in |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
ZTE MF971R product has two stack-based buffer overflow vulnerabilities. An attacker could exploit the vulnerabilities to execute arbitrary code. ZTE MF971R Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. ZTE MF971R is a Cat 6 LTE mobile Wi-Fi router with download speeds up to 300mbps and upload speeds up to 50mbps
| VAR-202110-1670 | CVE-2021-41991 | strongSwan Integer overflow vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility. strongSwan Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4989-1 security@debian.org
https://www.debian.org/security/ Yves-Alexis Perez
October 18, 2021 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : strongswan
CVE ID : CVE-2021-41990 CVE-2021-41991
Researchers at the United States of America National Security Agency (NSA)
identified two denial of services vulnerability in strongSwan, an IKE/IPsec
suite.
CVE-2021-41990
RSASSA-PSS signatures whose parameters define a very high salt length can
trigger an integer overflow that can lead to a segmentation fault.
Generating a signature that bypasses the padding check to trigger the crash
requires access to the private key that signed the certificate. However,
the certificate does not have to be trusted. Because the gmp and the
openssl plugins both check if a parsed certificate is self-signed (and the
signature is valid), this can e.g. be triggered by an unrelated
self-signed CA certificate sent by an initiator. Depending on the generated random value, this could
lead to an integer overflow that results in a double-dereference and a call
using out-of-bounds memory that most likely leads to a segmentation fault.
Remote code execution can't be ruled out completely, but attackers have no
control over the dereferenced memory, so it seems unlikely at this point.
For the oldstable distribution (buster), these problems have been fixed
in version 5.7.2-1+deb10u1.
For the stable distribution (bullseye), these problems have been fixed in
version 5.9.1-1+deb11u1.
We recommend that you upgrade your strongswan packages.
For the detailed security status of strongswan please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/strongswan
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAmFtyAUACgkQ3rYcyPpX
RFudiwf+NNcRRRJychLI5ycMKVxkr2tEAJDeVZjv966YBM1tXnCtROydXf5Zip2M
dn/EYO71uuT5FKhs8tJyx5iv2bFcrvyqQQo6DFQvXZHR0+9U+MHcR9qB7JJDM4nK
+JXOEmAv3akCFhiP6jMx5B6jRWR1e4MOwxmgrgGu/nwy2cYBQPI43qPTrXi3Fcnv
eSgeyLqyZNLmaGmj8jQfTnc8bdVF5xAs6mHhVqNJxQCdouG9b4/S6AxJsl3IMxyF
WZhtCNUvhHH8wz0lZVElR3Qs6fUu0phKdlT9kBv/o6fP3ceiYOCEh8SqBgYU3hQL
xyB0uP4EcSR70TvKZMB2jV/tGG1A8w==
=/Xvi
-----END PGP SIGNATURE-----
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202405-08
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: strongSwan: Multiple Vulnerabilities
Date: May 04, 2024
Bugs: #818841, #832460, #878887, #899964
ID: 202405-08
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Multiple vulnerabilities have been discovered in strongSwan, the worst
of which could possibly lead to remote code execution.
Background
=========
strongSwan is an IPSec implementation for Linux.
Affected packages
================
Package Vulnerable Unaffected
------------------ ------------ ------------
net-vpn/strongswan < 5.9.10 >= 5.9.10
Description
==========
Multiple vulnerabilities have been discovered in strongSwan. Please
review the CVE identifiers referenced below for details.
Impact
=====
Please review the referenced CVE identifiers for details.
Workaround
=========
There is no known workaround at this time.
Resolution
=========
All strongSwan users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-vpn/strongswan-5.9.10"
References
=========
[ 1 ] CVE-2021-41991
https://nvd.nist.gov/vuln/detail/CVE-2021-41991
[ 2 ] CVE-2021-45079
https://nvd.nist.gov/vuln/detail/CVE-2021-45079
[ 3 ] CVE-2022-40617
https://nvd.nist.gov/vuln/detail/CVE-2022-40617
[ 4 ] CVE-2023-26463
https://nvd.nist.gov/vuln/detail/CVE-2023-26463
Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202405-08
Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
======
Copyright 2024 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. ==========================================================================
Ubuntu Security Notice USN-5111-1
October 19, 2021
strongswan vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.10
- Ubuntu 21.04
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in strongSwan.
Software Description:
- strongswan: IPsec VPN solution
Details:
It was discovered that strongSwan incorrectly handled certain RSASSA-PSS
signatures. A remote attacker could use this issue to cause strongSwan to
crash, resulting in a denial of service. (CVE-2021-41990)
It was discovered that strongSwan incorrectly handled replacing
certificates in the cache. A remote attacker could use this issue to cause
strongSwan to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2021-41991)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 21.10:
libstrongswan 5.9.1-1ubuntu3.1
strongswan 5.9.1-1ubuntu3.1
Ubuntu 21.04:
libstrongswan 5.9.1-1ubuntu1.2
strongswan 5.9.1-1ubuntu1.2
Ubuntu 20.04 LTS:
libstrongswan 5.8.2-1ubuntu3.3
strongswan 5.8.2-1ubuntu3.3
Ubuntu 18.04 LTS:
libstrongswan 5.6.2-1ubuntu2.7
strongswan 5.6.2-1ubuntu2.7
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5111-1
CVE-2021-41990, CVE-2021-41991
Package Information:
https://launchpad.net/ubuntu/+source/strongswan/5.9.1-1ubuntu3.1
https://launchpad.net/ubuntu/+source/strongswan/5.9.1-1ubuntu1.2
https://launchpad.net/ubuntu/+source/strongswan/5.8.2-1ubuntu3.3
https://launchpad.net/ubuntu/+source/strongswan/5.6.2-1ubuntu2.7
| VAR-202110-0919 | CVE-2021-36513 | SignalWire freeswitch Vulnerability in resource initialization deficiency in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered in function sofia_handle_sip_i_notify in sofia.c in SignalWire freeswitch before 1.10.6, may allow attackers to view sensitive information due to an uninitialized value. SignalWire freeswitch Exists in a flaw in resource initialization.Information may be obtained. FreeSWITCH is a set of free and open source communication software developed by the individual developer Anthony Minesale in the United States. The software can be used to create audio, video and short message products and applications
| VAR-202110-1915 | No CVE | Leadsec ACM, NetGuard's online behavior management system, has a SQL injection vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Beijing Wangyu Xingyun Information Technology Co., Ltd. was renamed from Lenovo Wangyu Technology (Beijing) Co., Ltd. Its business covers network boundary security protection, application and data security protection, network-wide security risk management, professional security solutions, and professional security services, etc. Multiple directions.
Leadsec ACM, the NetGuard online behavior management system, has a SQL injection vulnerability. Attackers can use the vulnerability to obtain sensitive information in the database.
| VAR-202110-1287 | CVE-2021-37129 | plural Huawei Out-of-bounds write vulnerabilities in the product |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20. plural Huawei The product contains a vulnerability related to out-of-bounds writes.Service operation interruption (DoS) It may be in a state. Huawei Ngfw Module is a firewall module of China's Huawei (Huawei) company. Huawei IPS Module is an intrusion prevention system (IPS) module of China's Huawei (Huawei) company. Huawei S5700, Huawei S12700, Huawei S2700 and Huawei S6700 are all enterprise-class switch products of China's Huawei (Huawei)
| VAR-202110-1007 | CVE-2018-16060 | Mitsubishi Electric SmartRTU Security hole |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Mitsubishi Electric SmartRTU devices allow remote attackers to obtain sensitive information (directory listing and source code) via a direct request to the /web URI
| VAR-202110-0968 | CVE-2021-20836 | Made by OMRON CX-Supervisor Out-of-bounds memory reference vulnerability in |
CVSS V2: 6.0 CVSS V3: 6.5 Severity: MEDIUM |
Out-of-bounds read vulnerability in CX-Supervisor v4.0.0.13 and v4.0.0.16 allows an attacker with administrative privileges to cause information disclosure and/or arbitrary code execution by opening a specially crafted SCS project files. Provided by OMRON Corporation CX-Supervisor Is a memory reference outside the area ( CWE-125 , CVE-2021-20836 ) Vulnerability exists. The following is the vulnerability information JPCERT/CC Report to JPCERT/CC Coordinated with the developers
| VAR-202110-1006 | CVE-2018-16061 | Mitsubishi Electric smartRTU Cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Mitsubishi Electric SmartRTU devices allow XSS via the username parameter or PATH_INFO to login.php.
| VAR-202110-2123 | CVE-2022-21228 | (0Day) Fuji Electric Alpha5 Servo Operator C5P File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code. Alpha5 Smart Loader An out-of-bounds write vulnerability exists in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of C5P files in the Server Operator module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer
| VAR-202110-2124 | CVE-2022-21214 | Alpha5 Smart Loader Heap-based buffer overflow vulnerability in firmware |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
The affected product is vulnerable to a heap-based buffer overflow, which may lead to code execution. Alpha5 Smart Loader A heap-based buffer overflow vulnerability exists in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Alpha5. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of C5P files in the Server Operator module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process
| VAR-202110-2122 | CVE-2022-24383 | Fuji Electric's Alpha5 Smart Loader Out-of-bounds read vulnerability in firmware |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
The affected product is vulnerable to an out-of-bounds read, which may result in code execution. Fuji Electric's Alpha5 Smart Loader An out-of-bounds read vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Alpha5. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of C5P files in the Server Operator module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process
| VAR-202110-2121 | CVE-2022-21202 | Alpha5 Smart Loader Firmware out-of-bounds read vulnerability |
CVSS V2: 4.3 CVSS V3: 3.3 Severity: LOW |
The affected product is vulnerable to an out-of-bounds read, which may result in disclosure of sensitive information. Alpha5 Smart Loader There is an out-of-bounds read vulnerability in the firmware.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Fuji Electric Alpha5. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of A5V files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process
| VAR-202110-1693 | CVE-2021-42340 | Apache Tomcat Resource Management Error Vulnerability (CNVD-2021-83785) |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError. Apache Tomcat is a lightweight web application server of the Apache Foundation. The program implements support for Servlet and JavaServer Page (JSP).
Apache Tomcat has a security vulnerability. The vulnerability is caused by incorrectly verifying the data boundary when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can use this vulnerability to cause buffer overflow or heap overflow, etc. Description:
Red Hat support for Spring Boot provides an application platform that
reduces the complexity of developing and operating applications (monoliths
and microservices) for OpenShift as a containerized platform. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: Red Hat JBoss Web Server 5.6.0 Security release
Advisory ID: RHSA-2021:4861-01
Product: Red Hat JBoss Web Server
Advisory URL: https://access.redhat.com/errata/RHSA-2021:4861
Issue date: 2021-11-30
CVE Names: CVE-2021-30640 CVE-2021-33037 CVE-2021-42340
====================================================================
1. Summary:
Updated Red Hat JBoss Web Server 5.6.0 packages are now available for Red
Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this release as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat JBoss Web Server 5.6 for RHEL 7 Server - noarch, x86_64
Red Hat JBoss Web Server 5.6 for RHEL 8 - noarch, x86_64
3. Description:
Red Hat JBoss Web Server is a fully integrated and certified set of
components for hosting Java web applications.
This release of Red Hat JBoss Web Server 5.6.0 serves as a replacement for
Red Hat JBoss Web Server 5.5.0. This release includes bug fixes,
enhancements and component upgrades, which are documented in the Release
Notes, linked to in the References.
Security Fix(es):
* tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could
lead to DoS (CVE-2021-42340)
* tomcat: HTTP request smuggling when used with a reverse proxy
(CVE-2021-33037)
* tomcat: JNDI realm authentication weakness (CVE-2021-30640)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1981533 - CVE-2021-33037 tomcat: HTTP request smuggling when used with a reverse proxy
1981544 - CVE-2021-30640 tomcat: JNDI realm authentication weakness
2014356 - CVE-2021-42340 tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS
6. Package List:
Red Hat JBoss Web Server 5.6 for RHEL 7 Server:
Source:
jws5-tomcat-9.0.50-3.redhat_00004.1.el7jws.src.rpm
jws5-tomcat-native-1.2.30-3.redhat_3.el7jws.src.rpm
jws5-tomcat-vault-1.1.8-4.Final_redhat_00004.1.el7jws.src.rpm
noarch:
jws5-tomcat-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm
jws5-tomcat-admin-webapps-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm
jws5-tomcat-docs-webapp-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm
jws5-tomcat-el-3.0-api-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm
jws5-tomcat-java-jdk11-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm
jws5-tomcat-java-jdk8-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm
jws5-tomcat-javadoc-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm
jws5-tomcat-jsp-2.3-api-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm
jws5-tomcat-lib-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm
jws5-tomcat-selinux-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm
jws5-tomcat-servlet-4.0-api-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm
jws5-tomcat-vault-1.1.8-4.Final_redhat_00004.1.el7jws.noarch.rpm
jws5-tomcat-vault-javadoc-1.1.8-4.Final_redhat_00004.1.el7jws.noarch.rpm
jws5-tomcat-webapps-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm
x86_64:
jws5-tomcat-native-1.2.30-3.redhat_3.el7jws.x86_64.rpm
jws5-tomcat-native-debuginfo-1.2.30-3.redhat_3.el7jws.x86_64.rpm
Red Hat JBoss Web Server 5.6 for RHEL 8:
Source:
jws5-tomcat-9.0.50-3.redhat_00004.1.el8jws.src.rpm
jws5-tomcat-native-1.2.30-3.redhat_3.el8jws.src.rpm
jws5-tomcat-vault-1.1.8-4.Final_redhat_00004.1.el8jws.src.rpm
noarch:
jws5-tomcat-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm
jws5-tomcat-admin-webapps-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm
jws5-tomcat-docs-webapp-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm
jws5-tomcat-el-3.0-api-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm
jws5-tomcat-javadoc-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm
jws5-tomcat-jsp-2.3-api-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm
jws5-tomcat-lib-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm
jws5-tomcat-selinux-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm
jws5-tomcat-servlet-4.0-api-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm
jws5-tomcat-vault-1.1.8-4.Final_redhat_00004.1.el8jws.noarch.rpm
jws5-tomcat-vault-javadoc-1.1.8-4.Final_redhat_00004.1.el8jws.noarch.rpm
jws5-tomcat-webapps-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm
x86_64:
jws5-tomcat-native-1.2.30-3.redhat_3.el8jws.x86_64.rpm
jws5-tomcat-native-debuginfo-1.2.30-3.redhat_3.el8jws.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-30640
https://access.redhat.com/security/cve/CVE-2021-33037
https://access.redhat.com/security/cve/CVE-2021-42340
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIVAwUBYaaMntzjgjWX9erEAQibyg/9E3I1wMpKriqTZKlf1tGcPt4wShPVNKMh
B4PC8t1vBZJZ2VBMrQJdmYBUKRn3mccCqUxd0ey/UfsacIoKvAACr18iXCxYc4cO
MeNqy7SWRO+Kwze2fYpBu7w5dR34yhUQAN8DAOui7DduZsS209X7WhShrLSjzF5j
g+nhRCi4l5QRwcy7NF4TAhmAN7f819BwDHQJI/ttaOHqEwsDnOlPNKbV0X4Hlkf5
5VRD/8ArImD7tqpSs/9YVh34MJLCVmVkWgHBDY0I06LcRSQJoRBZDEkoPRHQxU26
hKH5oDaVezm92RFFqfwo2HHY6eGJc/qTTcd/WeW4RDfx49+ARsOt2kvO2XcEo45A
iUue2MayqnfdQHRI7MMNaaWoNudI2MVBcbQYhkTZcgApZEmtCe4taeo0YUvFqUeJ
N1Awh8QIN5vqA7wKdtrHiQCMx/6/fqi3VtKN3LZEuUiRMM/sueqc1yob6piuU4Vk
nyHP0ULSyMYnrzoqKN1BwbobRYyXKbVR376qMtxhLMe71PXg26TgDC9seUnooNum
XgcRIdc7Q2WyGaFLxGE5fS0/7FagX/etRlg9DIHi27NVl0WXgmFVLC2ZumjfSoms
FgQUTPwa2Bt90Oat2u7vnB5MBvCR0+OAAsM8TK/cn/31F697MMTI6Qloiq2DDOt4
2c2PkIZ6XrY=6RkQ
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
. Solution:
Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.
The References section of this erratum contains a download link for the
update. You must be logged in to download the update.
For the stable distribution (bullseye), this problem has been fixed in
version 9.0.43-2~deb11u3.
We recommend that you upgrade your tomcat9 packages.
For the detailed security status of tomcat9 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/tomcat9
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=wISU
-----END PGP SIGNATURE-----
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202208-34
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Low
Title: Apache Tomcat: Multiple Vulnerabilities
Date: August 21, 2022
Bugs: #773571, #801916, #818160, #855971
ID: 202208-34
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Multiple vulnerabilities have been discovered in Apache Tomcat, the
worst of which could result in denial of service.
Affected packages
================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-servers/tomcat < 8.5.82:8.5 >= 8.5.82:8.5
< 9.0.65:9 >= 9.0.65:9
< 10.0.23:10 >= 10.0.23:10
Description
==========
Multiple vulnerabilities have been discovered in Apache Tomcat. Please
review the CVE identifiers referenced below for details.
Impact
=====
Please review the referenced CVE identifiers for details.
Workaround
=========
There is no known workaround at this time.
Resolution
=========
All Apache Tomcat 10.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/tomcat-10.0.23:10"
All Apache Tomcat 9.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/tomcat-9.0.65:9"
All Apache Tomcat 8.5.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/tomcat-8.5.82:8.5"
References
=========
[ 1 ] CVE-2021-25122
https://nvd.nist.gov/vuln/detail/CVE-2021-25122
[ 2 ] CVE-2021-25329
https://nvd.nist.gov/vuln/detail/CVE-2021-25329
[ 3 ] CVE-2021-30639
https://nvd.nist.gov/vuln/detail/CVE-2021-30639
[ 4 ] CVE-2021-30640
https://nvd.nist.gov/vuln/detail/CVE-2021-30640
[ 5 ] CVE-2021-33037
https://nvd.nist.gov/vuln/detail/CVE-2021-33037
[ 6 ] CVE-2021-42340
https://nvd.nist.gov/vuln/detail/CVE-2021-42340
[ 7 ] CVE-2022-34305
https://nvd.nist.gov/vuln/detail/CVE-2022-34305
Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202208-34
Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
======
Copyright 2022 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. The purpose of this text-only errata is to inform you about the
security issues fixed in this release.
Installation instructions are available from the Fuse 7.11.0 product
documentation page:
https://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/
4
| VAR-202110-0318 | CVE-2021-42342 | GoAhead Vulnerability in unlimited upload of dangerous types of files in |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts. GoAhead Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. GoAhead is an open source small embedded Web server from Embedthis Software in the United States. GoAhead has a file upload vulnerability, which stems from incomplete filtering in the file upload filter
| VAR-202110-0616 | CVE-2021-31352 | Juniper Networks SRX Series Encryption problem vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6
| VAR-202110-0387 | CVE-2021-0296 | Juniper Networks CtpView Input validation error vulnerability |
CVSS V2: 5.8 CVSS V3: 7.4 Severity: MEDIUM |
The Juniper Networks CTPView server is not enforcing HTTP Strict Transport Security (HSTS). HSTS is an optional response header which allows servers to indicate that content from the requested domain will only be served over HTTPS. The lack of HSTS may leave the system vulnerable to downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections. This issue affects Juniper Networks CTPView: 7.3 versions prior to 7.3R7; 9.1 versions prior to 9.1R3
| VAR-202110-0560 | CVE-2021-41137 | MinIO Security hole |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: MEDIUM |
Minio is a Kubernetes native application for cloud storage. All users on release `RELEASE.2021-10-10T16-53-30Z` are affected by a vulnerability that involves bypassing policy restrictions on regular users. Normally, checkKeyValid() should return owner true for rootCreds. In the affected version, policy restriction did not work properly for users who did not have service (svc) or security token service (STS) accounts. This issue is fixed in `RELEASE.2021-10-13T00-23-17Z`. A downgrade back to release `RELEASE.2021-10-08T23-58-24Z` is available as a workaround.
| VAR-202111-1207 | CVE-2021-0180 | Intel(R) HAXM Resource Exhaustion Vulnerability in Software |
CVSS V2: 4.6 CVSS V3: 8.4 Severity: HIGH |
Uncontrolled resource consumption in the Intel(R) HAXM software before version 7.6.6 may allow an unauthenticated user to potentially enable privilege escalation via local access. Intel(R) HAXM The software has a resource exhaustion vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Intel Hardware Accelerated Execution Manager (Intel Haxm) is a hardware-assisted virtualization engine (hypervisor) from Intel Corporation that can use Intel Virtualization Technology (Vt) to speed up Android* development. There is a security vulnerability in Intel Hardware Accelerated Execution Manager, which is caused by a configuration error in the network system or product during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components. Intel is releasing software updates to mitigate these potential vulnerabilities