VARIoT IoT vulnerabilities database
| VAR-202110-0189 | CVE-2021-25474 | Samsung SystemUI Local Permanent Denial of Service Vulnerability |
CVSS V2: 4.9 CVSS V3: 4.4 Severity: MEDIUM |
Assuming a shell privilege is gained, an improper exception handling for multi_sim_bar_show_on_qspanel value in SystemUI prior to SMR Oct-2021 Release 1 allows an attacker to cause a permanent denial of service in user device before factory reset. Samsung SystemUI is the system program for Samsung mobile devices.
Samsung SystemUI has a local permanent denial of service vulnerability. This vulnerability originates from the incorrect exception handling of multi_sim_bar_show_on_qspanel in SystemUI
| VAR-202110-0187 | CVE-2021-25472 | Samsung BluetoothSettingsProvider Access Control Error Vulnerability |
CVSS V2: 2.1 CVSS V3: 3.3 Severity: LOW |
An improper access control vulnerability in BluetoothSettingsProvider prior to SMR Oct-2021 Release 1 allows untrusted application to overwrite some Bluetooth information. Samsung BluetoothSettingsProvider is the Bluetooth function of Samsung mobile devices.
There is an access control error vulnerability in Samsung BluetoothSettingsProvider. This vulnerability is caused by the lack of correct verification checks
| VAR-202110-0186 | CVE-2021-25471 | Samsung Security Mode Command process Denial of Service Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A lack of replay attack protection in Security Mode Command process prior to SMR Oct-2021 Release 1 can lead to denial of service on mobile network connection and battery depletion. Samsung Security Mode Command process is the safe mode command process in Samsung mobile devices. The vulnerability is due to the lack of replay attack protection. An attacker can exploit this vulnerability to cause a denial of service on the mobile network connection
| VAR-202110-0158 | CVE-2021-25478 | Samsung LTE RRC buffer overflow leak (CNVD-2023-73947) |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: HIGH |
A possible stack-based buffer overflow vulnerability in Exynos CP Chipset prior to SMR Oct-2021 Release 1 allows arbitrary memory write and code execution. Samsung LTE RRC is a protocol for Samsung mobile devices, including the broadcast of non-access layer (NAS) related system information, the broadcast of access layer (AS) related system information, paging, establishment, maintenance and release of UE and RRC connection between E-UTRAN.
There is a buffer overflow vulnerability in Samsung LTE RRC. This vulnerability is caused by the lack of correct bounds checking in Exynos CP Chipset
| VAR-202110-0156 | CVE-2021-25476 | Samsung Widevine TA information leakage vulnerability |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
An information disclosure vulnerability in Widevine TA log prior to SMR Oct-2021 Release 1 allows attackers to bypass the ASLR protection mechanism in TEE. Samsung Widevine TA is a DRM digital rights management feature in Samsung mobile devices.
Samsung Widevine TA has an information leakage vulnerability. This vulnerability is caused by information leakage in the Widevine TA log
| VAR-202110-0155 | CVE-2021-25475 | Samsung Vision DSP Kernel Diver Privilege Elevation Vulnerability |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
A possible heap-based buffer overflow vulnerability in DSP kernel driver prior to SMR Oct-2021 Release 1 allows arbitrary memory write and code execution. Samsung Vision DSP Kernel Diver is a DSP kernel driver for Samsung mobile devices.
Samsung Vision DSP Kernel Diver has an elevation of privilege vulnerability. An attacker can exploit this vulnerability to execute arbitrary code
| VAR-202110-0179 | CVE-2021-25499 | Samsung Galaxy Store Authorization problem vulnerability |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Intent redirection vulnerability in SamsungAccountSDKSigninActivity of Galaxy Store prior to version 4.5.32.4 allows attacker to access content provider of Galaxy Store
| VAR-202110-0171 | CVE-2021-25491 | Samsung MFC driver memory corruption vulnerability |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
A vulnerability in mfc driver prior to SMR Oct-2021 Release 1 allows memory corruption via NULL-pointer dereference. Samsung MFC driver is a driver for Samsung mobile devices
| VAR-202110-0169 | CVE-2021-25489 | Samsung Modem Interface Driver Format String Error Vulnerability |
CVSS V2: 4.9 CVSS V3: 5.5 Severity: MEDIUM |
Assuming radio permission is gained, missing input validation in modem interface driver prior to SMR Oct-2021 Release 1 results in format string bug leading to kernel panic. Samsung mobile devices are a series of mobile products produced by the South Korean company Samsung.
There is a format string error vulnerability in the Samsung modem interface driver. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202110-0167 | CVE-2021-25487 | Samsung OOB driver out-of-bounds read vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Lack of boundary checking of a buffer in set_skb_priv() of modem interface driver prior to SMR Oct-2021 Release 1 allows OOB read and it results in arbitrary code execution by dereference of invalid function pointer. The Samsung OOB driver is a driver that reads the modem interface for Samsung mobile devices.
The Samsung OOB read modem interface driver has an out-of-bounds read vulnerability. An attacker can exploit this vulnerability to execute arbitrary code
| VAR-202110-0165 | CVE-2021-25485 | Samsung FactoryAirCommandManager Path Traversal Vulnerability |
CVSS V2: 5.8 CVSS V3: 8.0 Severity: HIGH |
Path traversal vulnerability in FactoryAirCommnadManger prior to SMR Oct-2021 Release 1 allows attackers to write file as system UID via BT remote socket. Samsung FactoryAirCommandManager is an application for Samsung mobile devices
| VAR-202110-0182 | CVE-2021-25467 | Samsung Vision DSP Kernel Driver Privilege Escalation Vulnerability (CNVD-2025-02726) |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
Assuming system privilege is gained, possible buffer overflow vulnerabilities in the Vision DSP kernel driver prior to SMR Oct-2021 Release 1 allows privilege escalation to Root by hijacking loaded library. Samsung Vision DSP kernel driver is a driver used by Samsung mobile devices. The vulnerability is caused by the lack of correct boundary checking in the Vision DSP kernel driver. Attackers can exploit this vulnerability to escalate privileges by hijacking loaded libraries
| VAR-202110-0572 | CVE-2021-38452 | Moxa MXview Network Management Path traversal vulnerabilities in software |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries. (DoS) It may be in a state
| VAR-202110-0573 | CVE-2021-38454 | Moxa MXview Network Management Fraudulent Authentication Vulnerability in Software |
CVSS V2: 7.5 CVSS V3: 10.0 Severity: CRITICAL |
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries. Moxa MXview Network Management An incorrect authentication vulnerability exists in the software.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202110-1571 | CVE-2021-41524 | Apache HTTP Server Denial of Service Vulnerability (CNVD-2022-09237) |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing, allowing an external source to DoS the server. This requires a specially crafted request. The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project. Apache HTTP Server is an open source web server of the Apache Foundation in the United States. The server is fast, reliable and extensible through a simple API. No detailed vulnerability details are currently provided. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202208-20
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: Apache HTTPD: Multiple Vulnerabilities
Date: August 14, 2022
Bugs: #813429, #816399, #816864, #829722, #835131, #850622
ID: 202208-20
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Multiple vulnerabilities have been discovered in Apache Webserver, the
worst of which could result in remote code execution.
Affected packages
================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-admin/apache-tools < 2.4.54 >= 2.4.54
2 www-servers/apache < 2.4.54 >= 2.4.54
Description
==========
Multiple vulnerabilities have been discovered in Apache HTTPD. Please
review the CVE identifiers referenced below for details.
Impact
=====
Please review the referenced CVE identifiers for details.
Workaround
=========
There is no known workaround at this time.
Resolution
=========
All Apache HTTPD users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/apache-2.4.54"
All Apache HTTPD tools users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/apache-tools-2.4.54"
References
=========
[ 1 ] CVE-2021-33193
https://nvd.nist.gov/vuln/detail/CVE-2021-33193
[ 2 ] CVE-2021-34798
https://nvd.nist.gov/vuln/detail/CVE-2021-34798
[ 3 ] CVE-2021-36160
https://nvd.nist.gov/vuln/detail/CVE-2021-36160
[ 4 ] CVE-2021-39275
https://nvd.nist.gov/vuln/detail/CVE-2021-39275
[ 5 ] CVE-2021-40438
https://nvd.nist.gov/vuln/detail/CVE-2021-40438
[ 6 ] CVE-2021-41524
https://nvd.nist.gov/vuln/detail/CVE-2021-41524
[ 7 ] CVE-2021-41773
https://nvd.nist.gov/vuln/detail/CVE-2021-41773
[ 8 ] CVE-2021-42013
https://nvd.nist.gov/vuln/detail/CVE-2021-42013
[ 9 ] CVE-2021-44224
https://nvd.nist.gov/vuln/detail/CVE-2021-44224
[ 10 ] CVE-2021-44790
https://nvd.nist.gov/vuln/detail/CVE-2021-44790
[ 11 ] CVE-2022-22719
https://nvd.nist.gov/vuln/detail/CVE-2022-22719
[ 12 ] CVE-2022-22720
https://nvd.nist.gov/vuln/detail/CVE-2022-22720
[ 13 ] CVE-2022-22721
https://nvd.nist.gov/vuln/detail/CVE-2022-22721
[ 14 ] CVE-2022-23943
https://nvd.nist.gov/vuln/detail/CVE-2022-23943
[ 15 ] CVE-2022-26377
https://nvd.nist.gov/vuln/detail/CVE-2022-26377
[ 16 ] CVE-2022-28614
https://nvd.nist.gov/vuln/detail/CVE-2022-28614
[ 17 ] CVE-2022-28615
https://nvd.nist.gov/vuln/detail/CVE-2022-28615
[ 18 ] CVE-2022-29404
https://nvd.nist.gov/vuln/detail/CVE-2022-29404
[ 19 ] CVE-2022-30522
https://nvd.nist.gov/vuln/detail/CVE-2022-30522
[ 20 ] CVE-2022-30556
https://nvd.nist.gov/vuln/detail/CVE-2022-30556
[ 21 ] CVE-2022-31813
https://nvd.nist.gov/vuln/detail/CVE-2022-31813
Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202208-20
Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
======
Copyright 2022 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 security update
Advisory ID: RHSA-2022:7143-01
Product: Red Hat JBoss Core Services
Advisory URL: https://access.redhat.com/errata/RHSA-2022:7143
Issue date: 2022-10-26
CVE Names: CVE-2021-33193 CVE-2021-36160 CVE-2021-39275
CVE-2021-41524 CVE-2021-44224 CVE-2021-45960
CVE-2021-46143 CVE-2022-22822 CVE-2022-22823
CVE-2022-22824 CVE-2022-22825 CVE-2022-22826
CVE-2022-22827 CVE-2022-23852 CVE-2022-23990
CVE-2022-25235 CVE-2022-25236 CVE-2022-25313
CVE-2022-25314 CVE-2022-25315
====================================================================
1. Summary:
An update is now available for Red Hat JBoss Core Services.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat JBoss Core Services on RHEL 7 Server - noarch, x86_64
Red Hat JBoss Core Services on RHEL 8 - noarch, x86_64
3. Description:
Red Hat JBoss Core Services is a set of supplementary software for Red Hat
JBoss middleware products. This software, such as Apache HTTP Server, is
common to multiple JBoss middleware products, and is packaged under Red Hat
JBoss Core Services to allow for faster distribution of updates, and for a
more consistent update experience.
This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.51
serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server
2.4.37 Service Pack 10, and includes bug fixes and enhancements, which are
documented in the Release Notes document linked to in the References.
Security Fix(es):
* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code
execution (CVE-2022-25235)
* expat: Namespace-separator characters in "xmlns[:prefix]" attribute
values can lead to arbitrary code execution (CVE-2022-25236)
* expat: Integer overflow in storeRawNames() (CVE-2022-25315)
* httpd: Request splitting via HTTP/2 method injection and mod_proxy
(CVE-2021-33193)
* httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path
(CVE-2021-36160)
* httpd: Out-of-bounds write in ap_escape_quotes() via malicious input
(CVE-2021-39275)
* httpd: NULL pointer dereference via crafted request during HTTP/2 request
processing (CVE-2021-41524)
* httpd: possible NULL dereference or SSRF in forward proxy configurations
(CVE-2021-44224)
* expat: Large number of prefixed XML attributes on a single tag can crash
libexpat (CVE-2021-45960)
* expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143)
* expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822)
* expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823)
* expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824)
* expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825)
* expat: Integer overflow in nextScaffoldPart in xmlparse.c
(CVE-2022-22826)
* expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827)
* expat: Integer overflow in function XML_GetBuffer (CVE-2022-23852)
* expat: stack exhaustion in doctype parsing (CVE-2022-25313)
* expat: integer overflow in copyString() (CVE-2022-25314)
* expat: integer overflow in the doProlog function (CVE-2022-23990)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
Applications using the APR libraries, such as httpd, must be restarted for
this update to take effect. After installing the updated packages, the
httpd daemon will be restarted automatically.
5. Bugs fixed (https://bugzilla.redhat.com/):
1966728 - CVE-2021-33193 httpd: Request splitting via HTTP/2 method injection and mod_proxy
2005119 - CVE-2021-39275 httpd: Out-of-bounds write in ap_escape_quotes() via malicious input
2005124 - CVE-2021-36160 httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path
2010934 - CVE-2021-41524 httpd: NULL pointer dereference via crafted request during HTTP/2 request processing
2034672 - CVE-2021-44224 httpd: possible NULL dereference or SSRF in forward proxy configurations
2044451 - CVE-2021-45960 expat: Large number of prefixed XML attributes on a single tag can crash libexpat
2044455 - CVE-2021-46143 expat: Integer overflow in doProlog in xmlparse.c
2044457 - CVE-2022-22822 expat: Integer overflow in addBinding in xmlparse.c
2044464 - CVE-2022-22823 expat: Integer overflow in build_model in xmlparse.c
2044467 - CVE-2022-22824 expat: Integer overflow in defineAttribute in xmlparse.c
2044479 - CVE-2022-22825 expat: Integer overflow in lookup in xmlparse.c
2044484 - CVE-2022-22826 expat: Integer overflow in nextScaffoldPart in xmlparse.c
2044488 - CVE-2022-22827 expat: Integer overflow in storeAtts in xmlparse.c
2044613 - CVE-2022-23852 expat: Integer overflow in function XML_GetBuffer
2048356 - CVE-2022-23990 expat: integer overflow in the doProlog function
2056350 - CVE-2022-25313 expat: stack exhaustion in doctype parsing
2056354 - CVE-2022-25314 expat: integer overflow in copyString()
2056363 - CVE-2022-25315 expat: Integer overflow in storeRawNames()
2056366 - CVE-2022-25235 expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution
2056370 - CVE-2022-25236 expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution
6. Package List:
Red Hat JBoss Core Services on RHEL 7 Server:
Source:
jbcs-httpd24-apr-1.7.0-6.el7jbcs.src.rpm
jbcs-httpd24-apr-util-1.6.1-98.el7jbcs.src.rpm
jbcs-httpd24-brotli-1.0.9-2.el7jbcs.src.rpm
jbcs-httpd24-curl-7.83.1-6.el7jbcs.src.rpm
jbcs-httpd24-httpd-2.4.51-28.el7jbcs.src.rpm
jbcs-httpd24-jansson-2.14-1.el7jbcs.src.rpm
jbcs-httpd24-mod_http2-1.15.19-17.el7jbcs.src.rpm
jbcs-httpd24-mod_jk-1.2.48-41.redhat_1.el7jbcs.src.rpm
jbcs-httpd24-mod_md-2.4.0-15.el7jbcs.src.rpm
jbcs-httpd24-mod_proxy_cluster-1.3.17-9.el7jbcs.src.rpm
jbcs-httpd24-mod_security-2.9.3-19.el7jbcs.src.rpm
jbcs-httpd24-nghttp2-1.43.0-10.el7jbcs.src.rpm
jbcs-httpd24-openssl-1.1.1k-12.el7jbcs.src.rpm
jbcs-httpd24-openssl-chil-1.0.0-16.el7jbcs.src.rpm
jbcs-httpd24-openssl-pkcs11-0.4.10-31.el7jbcs.src.rpm
noarch:
jbcs-httpd24-httpd-manual-2.4.51-28.el7jbcs.noarch.rpm
x86_64:
jbcs-httpd24-apr-1.7.0-6.el7jbcs.x86_64.rpm
jbcs-httpd24-apr-debuginfo-1.7.0-6.el7jbcs.x86_64.rpm
jbcs-httpd24-apr-devel-1.7.0-6.el7jbcs.x86_64.rpm
jbcs-httpd24-apr-util-1.6.1-98.el7jbcs.x86_64.rpm
jbcs-httpd24-apr-util-debuginfo-1.6.1-98.el7jbcs.x86_64.rpm
jbcs-httpd24-apr-util-devel-1.6.1-98.el7jbcs.x86_64.rpm
jbcs-httpd24-apr-util-ldap-1.6.1-98.el7jbcs.x86_64.rpm
jbcs-httpd24-apr-util-mysql-1.6.1-98.el7jbcs.x86_64.rpm
jbcs-httpd24-apr-util-nss-1.6.1-98.el7jbcs.x86_64.rpm
jbcs-httpd24-apr-util-odbc-1.6.1-98.el7jbcs.x86_64.rpm
jbcs-httpd24-apr-util-openssl-1.6.1-98.el7jbcs.x86_64.rpm
jbcs-httpd24-apr-util-pgsql-1.6.1-98.el7jbcs.x86_64.rpm
jbcs-httpd24-apr-util-sqlite-1.6.1-98.el7jbcs.x86_64.rpm
jbcs-httpd24-brotli-1.0.9-2.el7jbcs.x86_64.rpm
jbcs-httpd24-brotli-debuginfo-1.0.9-2.el7jbcs.x86_64.rpm
jbcs-httpd24-brotli-devel-1.0.9-2.el7jbcs.x86_64.rpm
jbcs-httpd24-curl-7.83.1-6.el7jbcs.x86_64.rpm
jbcs-httpd24-curl-debuginfo-7.83.1-6.el7jbcs.x86_64.rpm
jbcs-httpd24-httpd-2.4.51-28.el7jbcs.x86_64.rpm
jbcs-httpd24-httpd-debuginfo-2.4.51-28.el7jbcs.x86_64.rpm
jbcs-httpd24-httpd-devel-2.4.51-28.el7jbcs.x86_64.rpm
jbcs-httpd24-httpd-selinux-2.4.51-28.el7jbcs.x86_64.rpm
jbcs-httpd24-httpd-tools-2.4.51-28.el7jbcs.x86_64.rpm
jbcs-httpd24-jansson-2.14-1.el7jbcs.x86_64.rpm
jbcs-httpd24-jansson-debuginfo-2.14-1.el7jbcs.x86_64.rpm
jbcs-httpd24-jansson-devel-2.14-1.el7jbcs.x86_64.rpm
jbcs-httpd24-libcurl-7.83.1-6.el7jbcs.x86_64.rpm
jbcs-httpd24-libcurl-devel-7.83.1-6.el7jbcs.x86_64.rpm
jbcs-httpd24-mod_http2-1.15.19-17.el7jbcs.x86_64.rpm
jbcs-httpd24-mod_http2-debuginfo-1.15.19-17.el7jbcs.x86_64.rpm
jbcs-httpd24-mod_jk-ap24-1.2.48-41.redhat_1.el7jbcs.x86_64.rpm
jbcs-httpd24-mod_jk-debuginfo-1.2.48-41.redhat_1.el7jbcs.x86_64.rpm
jbcs-httpd24-mod_ldap-2.4.51-28.el7jbcs.x86_64.rpm
jbcs-httpd24-mod_md-2.4.0-15.el7jbcs.x86_64.rpm
jbcs-httpd24-mod_md-debuginfo-2.4.0-15.el7jbcs.x86_64.rpm
jbcs-httpd24-mod_proxy_cluster-1.3.17-9.el7jbcs.x86_64.rpm
jbcs-httpd24-mod_proxy_cluster-debuginfo-1.3.17-9.el7jbcs.x86_64.rpm
jbcs-httpd24-mod_proxy_html-2.4.51-28.el7jbcs.x86_64.rpm
jbcs-httpd24-mod_security-2.9.3-19.el7jbcs.x86_64.rpm
jbcs-httpd24-mod_security-debuginfo-2.9.3-19.el7jbcs.x86_64.rpm
jbcs-httpd24-mod_session-2.4.51-28.el7jbcs.x86_64.rpm
jbcs-httpd24-mod_ssl-2.4.51-28.el7jbcs.x86_64.rpm
jbcs-httpd24-nghttp2-1.43.0-10.el7jbcs.x86_64.rpm
jbcs-httpd24-nghttp2-debuginfo-1.43.0-10.el7jbcs.x86_64.rpm
jbcs-httpd24-nghttp2-devel-1.43.0-10.el7jbcs.x86_64.rpm
jbcs-httpd24-openssl-1.1.1k-12.el7jbcs.x86_64.rpm
jbcs-httpd24-openssl-chil-1.0.0-16.el7jbcs.x86_64.rpm
jbcs-httpd24-openssl-chil-debuginfo-1.0.0-16.el7jbcs.x86_64.rpm
jbcs-httpd24-openssl-debuginfo-1.1.1k-12.el7jbcs.x86_64.rpm
jbcs-httpd24-openssl-devel-1.1.1k-12.el7jbcs.x86_64.rpm
jbcs-httpd24-openssl-libs-1.1.1k-12.el7jbcs.x86_64.rpm
jbcs-httpd24-openssl-perl-1.1.1k-12.el7jbcs.x86_64.rpm
jbcs-httpd24-openssl-pkcs11-0.4.10-31.el7jbcs.x86_64.rpm
jbcs-httpd24-openssl-pkcs11-debuginfo-0.4.10-31.el7jbcs.x86_64.rpm
jbcs-httpd24-openssl-static-1.1.1k-12.el7jbcs.x86_64.rpm
Red Hat JBoss Core Services on RHEL 8:
Source:
jbcs-httpd24-apr-1.7.0-6.el8jbcs.src.rpm
jbcs-httpd24-apr-util-1.6.1-98.el8jbcs.src.rpm
jbcs-httpd24-brotli-1.0.9-2.el8jbcs.src.rpm
jbcs-httpd24-curl-7.83.1-6.el8jbcs.src.rpm
jbcs-httpd24-httpd-2.4.51-28.el8jbcs.src.rpm
jbcs-httpd24-jansson-2.14-1.el8jbcs.src.rpm
jbcs-httpd24-mod_http2-1.15.19-17.el8jbcs.src.rpm
jbcs-httpd24-mod_jk-1.2.48-41.redhat_1.el8jbcs.src.rpm
jbcs-httpd24-mod_md-2.4.0-15.el8jbcs.src.rpm
jbcs-httpd24-mod_proxy_cluster-1.3.17-9.el8jbcs.src.rpm
jbcs-httpd24-mod_security-2.9.3-19.el8jbcs.src.rpm
jbcs-httpd24-nghttp2-1.43.0-10.el8jbcs.src.rpm
jbcs-httpd24-openssl-1.1.1k-12.el8jbcs.src.rpm
jbcs-httpd24-openssl-chil-1.0.0-16.el8jbcs.src.rpm
jbcs-httpd24-openssl-pkcs11-0.4.10-31.el8jbcs.src.rpm
noarch:
jbcs-httpd24-httpd-manual-2.4.51-28.el8jbcs.noarch.rpm
x86_64:
jbcs-httpd24-apr-1.7.0-6.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-debuginfo-1.7.0-6.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-devel-1.7.0-6.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-debuginfo-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-devel-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-ldap-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-ldap-debuginfo-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-mysql-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-mysql-debuginfo-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-nss-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-nss-debuginfo-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-odbc-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-odbc-debuginfo-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-openssl-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-openssl-debuginfo-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-pgsql-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-pgsql-debuginfo-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-sqlite-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-apr-util-sqlite-debuginfo-1.6.1-98.el8jbcs.x86_64.rpm
jbcs-httpd24-brotli-1.0.9-2.el8jbcs.x86_64.rpm
jbcs-httpd24-brotli-debuginfo-1.0.9-2.el8jbcs.x86_64.rpm
jbcs-httpd24-brotli-devel-1.0.9-2.el8jbcs.x86_64.rpm
jbcs-httpd24-curl-7.83.1-6.el8jbcs.x86_64.rpm
jbcs-httpd24-curl-debuginfo-7.83.1-6.el8jbcs.x86_64.rpm
jbcs-httpd24-httpd-2.4.51-28.el8jbcs.x86_64.rpm
jbcs-httpd24-httpd-debuginfo-2.4.51-28.el8jbcs.x86_64.rpm
jbcs-httpd24-httpd-devel-2.4.51-28.el8jbcs.x86_64.rpm
jbcs-httpd24-httpd-selinux-2.4.51-28.el8jbcs.x86_64.rpm
jbcs-httpd24-httpd-tools-2.4.51-28.el8jbcs.x86_64.rpm
jbcs-httpd24-httpd-tools-debuginfo-2.4.51-28.el8jbcs.x86_64.rpm
jbcs-httpd24-jansson-2.14-1.el8jbcs.x86_64.rpm
jbcs-httpd24-jansson-debuginfo-2.14-1.el8jbcs.x86_64.rpm
jbcs-httpd24-jansson-devel-2.14-1.el8jbcs.x86_64.rpm
jbcs-httpd24-libcurl-7.83.1-6.el8jbcs.x86_64.rpm
jbcs-httpd24-libcurl-debuginfo-7.83.1-6.el8jbcs.x86_64.rpm
jbcs-httpd24-libcurl-devel-7.83.1-6.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_http2-1.15.19-17.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_http2-debuginfo-1.15.19-17.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_jk-ap24-1.2.48-41.redhat_1.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_jk-ap24-debuginfo-1.2.48-41.redhat_1.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_ldap-2.4.51-28.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_ldap-debuginfo-2.4.51-28.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_md-2.4.0-15.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_md-debuginfo-2.4.0-15.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_proxy_cluster-1.3.17-9.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_proxy_cluster-debuginfo-1.3.17-9.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_proxy_html-2.4.51-28.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_proxy_html-debuginfo-2.4.51-28.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_security-2.9.3-19.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_security-debuginfo-2.9.3-19.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_session-2.4.51-28.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_session-debuginfo-2.4.51-28.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_ssl-2.4.51-28.el8jbcs.x86_64.rpm
jbcs-httpd24-mod_ssl-debuginfo-2.4.51-28.el8jbcs.x86_64.rpm
jbcs-httpd24-nghttp2-1.43.0-10.el8jbcs.x86_64.rpm
jbcs-httpd24-nghttp2-debuginfo-1.43.0-10.el8jbcs.x86_64.rpm
jbcs-httpd24-nghttp2-devel-1.43.0-10.el8jbcs.x86_64.rpm
jbcs-httpd24-openssl-1.1.1k-12.el8jbcs.x86_64.rpm
jbcs-httpd24-openssl-chil-1.0.0-16.el8jbcs.x86_64.rpm
jbcs-httpd24-openssl-chil-debuginfo-1.0.0-16.el8jbcs.x86_64.rpm
jbcs-httpd24-openssl-debuginfo-1.1.1k-12.el8jbcs.x86_64.rpm
jbcs-httpd24-openssl-devel-1.1.1k-12.el8jbcs.x86_64.rpm
jbcs-httpd24-openssl-libs-1.1.1k-12.el8jbcs.x86_64.rpm
jbcs-httpd24-openssl-libs-debuginfo-1.1.1k-12.el8jbcs.x86_64.rpm
jbcs-httpd24-openssl-perl-1.1.1k-12.el8jbcs.x86_64.rpm
jbcs-httpd24-openssl-pkcs11-0.4.10-31.el8jbcs.x86_64.rpm
jbcs-httpd24-openssl-pkcs11-debuginfo-0.4.10-31.el8jbcs.x86_64.rpm
jbcs-httpd24-openssl-static-1.1.1k-12.el8jbcs.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-33193
https://access.redhat.com/security/cve/CVE-2021-36160
https://access.redhat.com/security/cve/CVE-2021-39275
https://access.redhat.com/security/cve/CVE-2021-41524
https://access.redhat.com/security/cve/CVE-2021-44224
https://access.redhat.com/security/cve/CVE-2021-45960
https://access.redhat.com/security/cve/CVE-2021-46143
https://access.redhat.com/security/cve/CVE-2022-22822
https://access.redhat.com/security/cve/CVE-2022-22823
https://access.redhat.com/security/cve/CVE-2022-22824
https://access.redhat.com/security/cve/CVE-2022-22825
https://access.redhat.com/security/cve/CVE-2022-22826
https://access.redhat.com/security/cve/CVE-2022-22827
https://access.redhat.com/security/cve/CVE-2022-23852
https://access.redhat.com/security/cve/CVE-2022-23990
https://access.redhat.com/security/cve/CVE-2022-25235
https://access.redhat.com/security/cve/CVE-2022-25236
https://access.redhat.com/security/cve/CVE-2022-25313
https://access.redhat.com/security/cve/CVE-2022-25314
https://access.redhat.com/security/cve/CVE-2022-25315
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIVAwUBY1nOZtzjgjWX9erEAQjuIxAApYL8vG/A+EEcbUqbTvVWogX49KtpAbJR
V1Gv6llWWogAKT9HEE9AGansLscDYD8cyh6TNShY7lDkX7iYchzJLCs6IYDhBzls
j7jSdQEgpEVUCPLdKA17rFMO5FvZSlp0pgvFjSH3r+Q1+IVhsxKSXagTbFaTqGgP
JVqYMrbot+wzwkC1oHda0/Wh4UwqraveivOT/56FOXw6T0uxF0G51RuT+GSusUFe
p7hwNNbE/xWONnQu29QNqMdB9IYFTEjpDV1Tn2i2wPMl1IhQVFhQUqgpjfL29KLc
M+bOg6nE2NP4a6+YcYQevKwWTmq+VMLwwwCaNKsqFtK9KrDc/cy3nEDvBwQNx6gM
+OjpDGXbUBvKe6qkXIXMbBuJA1hDug+wdlGlDsC6n1MR6EKFPLs3oDdmsVMyAeXv
uA9lgkdwIeMpJ96JyDwQ5pCQ94NdLUPy84PlNPH3TJYshpp1di9tFe9MQ9j5lOds
RMsc1OJLl06aavpMuyFLoV71+xFksTCeNZVEBlSr31kaf1wxr0hG3oCMjlFw/QcY
FmY8nMirBSnrhGcOzg9zx4gfdvdf84mLmoRIAX/r1O5/RtiV13RQRp8/vo0h+4ou
Btep5k5CnSag4tBSWvSzX5oaEcrCvaCU9CI/2vhmocTl5O1nsJVvWIHrbu7ygorx
m+Yms1hf0io=Dgle
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
| VAR-202110-1090 | CVE-2021-38456 | Moxa MXview Network Management Vulnerability related to use of hardcoded credentials in software |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to gain access through accounts using default passwords. (DoS) It may be in a state
| VAR-202110-0574 | CVE-2021-38458 | Moxa MXview Network Management Injection vulnerabilities in software |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries. Moxa MXview Network Management The software has an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202110-0575 | CVE-2021-38460 | Moxa MXview Network Management Inadequate protection of credentials in software vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries. Moxa MXview Network Management The software contains vulnerabilities in inadequate protection of credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202110-1869 | CVE-2021-39978 | HarmonyOS In SQL Injection vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Telephony application has a SQL Injection vulnerability.Successful exploitation of this vulnerability may cause privacy and security issues. HarmonyOS for, SQL There is an injection vulnerability.Information may be obtained
| VAR-202110-1868 | CVE-2021-39975 | HarmonyOS Vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Hilinksvc has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause denial of service attacks. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state