VARIoT IoT vulnerabilities database
| VAR-202107-1762 | No CVE | NM3000 network element management system has logic flaws and loopholes |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Dingdian Video Technology Co., Ltd. (abbreviated as Dingdian Video) is a wholly-owned subsidiary of Digital Video Group, focusing on the research and development, production, marketing and service of coaxial broadband access technology and optical communication technology.
The NM3000 network element management system has a logic flaw vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202107-1764 | No CVE | Panasonic Electric (China) Co., Ltd. WV-SW395 has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Matsushita Electric (China) Co., Ltd. is mainly responsible for the sales and after-sales service activities of home appliances, systems, environment, components and other commodities.
Matsushita Electric (China) Co., Ltd. WV-SW395 has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202107-1866 | No CVE | Unauthorized access vulnerability exists in various printers of Epson (China) Co., Ltd. (CNVD-2021-44375) |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Epson (China) Co., Ltd. is responsible for the overall management of Epson's investment and business development in China. Its business scope mainly includes printers, scanners, projectors and other information-related products business, electronic components business, and industrial automation equipment business.
Many printers of Epson (China) Co., Ltd. have unauthorized access vulnerabilities, which can be exploited by attackers to obtain sensitive information.
| VAR-202107-1868 | No CVE | HP Officejet 5740 e-All-in-One Printer series has unauthorized access vulnerability (CNVD-2021-44366) |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
HP Officejet 5740 e-All-in-One Printer series is an all-in-one printer from HP Trading (Shanghai) Co., Ltd.
The HP Officejet 5740 e-All-in-One Printer series has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202107-1869 | No CVE | OPPO A92s has an information disclosure vulnerability (CNVD-2021-44382) |
CVSS V2: 1.9 CVSS V3: - Severity: LOW |
OPPO A92s is a 5G mobile phone owned by OPPO.
OPPO A92s has an information disclosure vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202107-1904 | No CVE | Seiko Cloud MES has SQL injection vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Seiko Cloud MES is mainly aimed at on-site management of small and medium-sized manufacturing workshops. Based on the industrial Internet, microservices, cloud computing, Internet of Things, and big data technology architecture, it provides low-cost, fast deployment, and easy-to-operate SAAS applications.
Seiko Cloud MES has a SQL injection vulnerability. Attackers can use vulnerabilities to obtain sensitive information in the database.
| VAR-202107-1905 | No CVE | Seiko Cloud MES has SQL injection vulnerability (CNVD-2021-43583) |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Seiko Cloud MES is mainly aimed at on-site management of small and medium-sized manufacturing workshops. Based on the industrial Internet, microservices, cloud computing, Internet of Things, and big data technology architecture, it provides low-cost, fast deployment, and easy-to-operate SAAS applications.
Seiko Cloud MES has a SQL injection vulnerability. Attackers can use vulnerabilities to obtain sensitive information in the database.
| VAR-202107-1909 | No CVE | Unauthorized access vulnerabilities in multiple Konica Minolta products |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
bizhub C364e, bizhub 227, bizhub 554e, bizhub 363, bizhub 283, bizhub C224e, bizhub C284e and bizhub C258 are printer products of Konica Minolta Group.
Many Konica Minolta products have unauthorized access vulnerabilities. Attackers can use this vulnerability to obtain sensitive information.
| VAR-202107-0865 | CVE-2021-33032 | eQ-3 HomeMatic CCU2 Firmware and CCU3 In firmware OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 10.0 Severity: CRITICAL |
A Remote Code Execution (RCE) vulnerability in the WebUI component of the eQ-3 HomeMatic CCU2 firmware up to and including version 2.57.5 and CCU3 firmware up to and including version 3.57.5 allows remote unauthenticated attackers to execute system commands as root via a simple HTTP request. eQ-3 HomeMatic CCU2 Firmware and CCU3 For firmware, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202107-0412 | CVE-2020-5316 | Dell SupportAssist for Business PCs and Dell SupportAssist for Home PCs Vulnerability regarding uncontrolled search path elements in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Dell SupportAssist for Business PCs versions 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3 and Dell SupportAssist for Home PCs version 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3, 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, 3.2.1, 3.2.2, 3.3, 3.3.1, 3.3.2, 3.3.3, 3.4 contain an uncontrolled search path vulnerability. A locally authenticated low privileged user could exploit this vulnerability to cause the loading of arbitrary DLLs by the SupportAssist binaries, resulting in the privileged execution of arbitrary code. (DoS) It may be in a state. The program provides automated, proactive and predictive techniques for troubleshooting and more. The program provides automated, proactive and predictive techniques for troubleshooting and more
| VAR-202107-0408 | CVE-2020-5370 | Dell EMC OpenManage Enterprise Past traversal vulnerability in |
CVSS V2: 6.0 CVSS V3: 6.8 Severity: MEDIUM |
Dell EMC OpenManage Enterprise (OME) versions prior to 3.4 contain an arbitrary file overwrite vulnerability. A remote authenticated malicious user with high privileges could potentially exploit this vulnerability to overwrite arbitrary files via directory traversal sequences using a crafted tar file to inject malicious RPMs which may cause a denial of service or perform unauthorized actions. Dell EMC OpenManage Enterprise (OME) Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202107-0029 | CVE-2019-20467 | Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 Vulnerabilities in devices |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices. The device by default has a TELNET interface available (which is not advertised or functionally used, but is nevertheless available). Two backdoor accounts (root and default) exist that can be used on this interface. The usernames and passwords of the backdoor accounts are the same on all devices. Attackers can use these backdoor accounts to obtain access and execute code as root within the device. (DoS) It may be in a state.
------------------------------------------
[Vulnerability Type]
Incorrect Access Control
------------------------------------------
[Vendor of Product]
Sannce
------------------------------------------
[Affected Product Code Base]
Sannce Smart HD Wifi Security Camera - EAN nr: 2 950004 595317
------------------------------------------
[Affected Component]
Telnet daemon
------------------------------------------
[Attack Type]
Local
------------------------------------------
[Impact Code execution]
true
------------------------------------------
[Attack Vectors]
Anyone with network access to the device can trigger this vulnerability.
------------------------------------------
[Has vendor confirmed or acknowledged the vulnerability?]
true
------------------------------------------
[Discoverer]
Willem Westerhof, Jasper Nota, Martijn Baalman from Qbit cyber security in cooperation with the Dutch Consumer organisation.
------------------------------------------
[Reference]
https://www.sannce.com
Use CVE-2019-20467
| VAR-202107-1761 | No CVE | Unauthorized access vulnerability exists in the video convergence gateway of Jiangsu Huaiye Information Technology Co., Ltd. |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Jiangsu Huaiye Huaiye is an original manufacturer with two independent core technologies: video cloud switching and wireless broadband private network communication.
The video fusion gateway of Jiangsu Huaiye Information Technology Co., Ltd. has an unauthorized access vulnerability. Attackers can use this vulnerability to obtain sensitive information.
| VAR-202107-1763 | No CVE | Freelander routing has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Changsha Tongxun Computer Technology Co., Ltd. is a company dedicated to the research and development of China's Internet network acceleration solutions, providing industry-leading Internet cache acceleration and routing products and services for ISPs, education, enterprises and other customers.
Freelander routing has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202107-0307 | CVE-2021-22770 | Easergy T300 Information leakage vulnerability in firmware |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A CWE-200: Information Exposure vulnerability exists in Easergy T300 with firmware V2.7.1 and older that exposes sensitive information to an actor not explicitly authorized to have access to that information. Easergy T300 There is an information leakage vulnerability in the firmware.Information may be obtained
| VAR-202107-0308 | CVE-2021-22771 | Schneider Electric Easergy T300 Security hole |
CVSS V2: 6.0 CVSS V3: 7.3 Severity: HIGH |
A CWE-1236: Improper Neutralization of Formula Elements in a CSV File vulnerability exists in Easergy T300 with firmware V2.7.1 and older that would allow arbitrary command execution
| VAR-202107-0092 | CVE-2020-20262 | Mikrotik RouterOs Reachable Assertiveness Vulnerability in |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Mikrotik RouterOs before 6.47 (stable tree) suffers from an assertion failure vulnerability in the /ram/pckg/security/nova/bin/ipsec process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet. Mikrotik RouterOs Exists in a reachable assertiveness vulnerability.Service operation interruption (DoS) It may be in a state. Re: Two vulnerabilities found in MikroTik's RouterOS
| VAR-202107-0084 | CVE-2020-20221 | Mikrotik RouterOs Resource exhaustion vulnerability in |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: MEDIUM |
Mikrotik RouterOs before 6.44.6 (long-term tree) suffers from an uncontrolled resource consumption vulnerability in the /nova/bin/cerm process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU. Mikrotik RouterOs Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. Re: Two vulnerabilities found in MikroTik's RouterOS
| VAR-202107-0083 | CVE-2020-20219 | Mikrotik RouterOs Out-of-bounds write vulnerability in |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/igmp-proxy process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference). Mikrotik RouterOs Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. Re: Two vulnerabilities found in MikroTik's RouterOS
| VAR-202108-2222 | CVE-2021-22924 | cURL Incorrectly resolved name and reference usage vulnerabilities in |
CVSS V2: 4.3 CVSS V3: 3.7 Severity: LOW |
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate. cURL There is a vulnerability in the use of incorrectly resolved names and references.Information may be obtained. A security issue has been found in curl before version 7.78.0. The comparison also didn't include the 'issuer cert' which a transfer can set to qualify how to verify the server certificate. Description:
Red Hat Advanced Cluster Management for Kubernetes 2.3.3 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with
security policy built in.
Security fixes:
* nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a
pointer to a root domain name (CVE-2021-23017)
* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)
* redis: Integer overflow issue with Streams (CVE-2021-32627)
* redis: Integer overflow bug in the ziplist data structure
(CVE-2021-32628)
* redis: Integer overflow issue with intsets (CVE-2021-32687)
* redis: Integer overflow issue with strings (CVE-2021-41099)
* redis: Out of bounds read in lua debugger protocol parser
(CVE-2021-32672)
* redis: Denial of service via Redis Standard Protocol (RESP) request
(CVE-2021-32675)
* helm: information disclosure vulnerability (CVE-2021-32690)
Bug fixes:
* KUBE-API: Support move agent to different cluster in the same namespace
(BZ# 1977358)
* Add columns to the Agent CRD list (BZ# 1977398)
* ClusterDeployment controller watches all Secrets from all namespaces (BZ#
1986081)
* RHACM 2.3.3 images (BZ# 1999365)
* Workaround for Network Manager not supporting nmconnections priority (BZ#
2001294)
* create cluster page empty in Safary Browser (BZ# 2002280)
* Compliance state doesn't get updated after fixing the issue causing
initially the policy not being able to update the managed object (BZ#
2002667)
* Overview page displays VMware based managed cluster as other (BZ#
2004188)
3. Bugs fixed (https://bugzilla.redhat.com/):
1963121 - CVE-2021-23017 nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
1977358 - [4.8.0] KUBE-API: Support move agent to different cluster in the same namespace
1977398 - [4.8.0] [master] Add columns to the Agent CRD list
1978144 - CVE-2021-32690 helm: information disclosure vulnerability
1986081 - [4.8.0] ClusterDeployment controller watches all Secrets from all namespaces
1999365 - RHACM 2.3.3 images
2001294 - [4.8.0] Workaround for Network Manager not supporting nmconnections priority
2002280 - create cluster page empty in Safary Browser
2002667 - Compliance state doesn't get updated after fixing the issue causing initially the policy not being able to update the managed object
2004188 - Overview page displays VMware based managed cluster as other
2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets
2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request
2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser
2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure
2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams
2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack
2011020 - CVE-2021-41099 redis: Integer overflow issue with strings
5. Description:
Red Hat 3scale API Management delivers centralized API management features
through a distributed, cloud-hosted layer. It includes built-in features to
help in building a more successful API program, including access control,
rate limits, payment gateway integration, and developer experience tools.
This advisory is intended to use with Container Images, for Red Hat 3scale
API Management 2.11.0. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):
1869800 - CVE-2020-8911 aws/aws-sdk-go: CBC padding oracle issue in AWS S3 Crypto SDK for golang
1869801 - CVE-2020-8912 aws-sdk-go: In-band key negotiation issue in AWS S3 Crypto SDK for golang
1930083 - CVE-2021-3442 PT RHOAM: XSS in 3scale at various places
5. These flaws may allow remote attackers to obtain sensitive
information, leak authentication or cookie header data or facilitate a
denial of service attack.
For the stable distribution (bullseye), these problems have been fixed in
version 7.74.0-1.3+deb11u2.
We recommend that you upgrade your curl packages.
For the detailed security status of curl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/curl
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=3E71
-----END PGP SIGNATURE-----
. ==========================================================================
Ubuntu Security Notice USN-5021-1
July 22, 2021
curl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.04
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in curl.
Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries
Details:
Harry Sintonen and Tomas Hoger discovered that curl incorrectly handled
TELNET connections when the -t option was used on the command line.
Uninitialized data possibly containing sensitive information could be sent
to the remote server, contrary to expectations. (CVE-2021-22898,
CVE-2021-22925)
Harry Sintonen discovered that curl incorrectly reused connections in the
connection pool. This could result in curl reusing the wrong connections.
(CVE-2021-22924)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 21.04:
curl 7.74.0-1ubuntu2.1
libcurl3-gnutls 7.74.0-1ubuntu2.1
libcurl3-nss 7.74.0-1ubuntu2.1
libcurl4 7.74.0-1ubuntu2.1
Ubuntu 20.04 LTS:
curl 7.68.0-1ubuntu2.6
libcurl3-gnutls 7.68.0-1ubuntu2.6
libcurl3-nss 7.68.0-1ubuntu2.6
libcurl4 7.68.0-1ubuntu2.6
Ubuntu 18.04 LTS:
curl 7.58.0-2ubuntu3.14
libcurl3-gnutls 7.58.0-2ubuntu3.14
libcurl3-nss 7.58.0-2ubuntu3.14
libcurl4 7.58.0-2ubuntu3.14
In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: curl security update
Advisory ID: RHSA-2021:3582-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3582
Issue date: 2021-09-21
CVE Names: CVE-2021-22922 CVE-2021-22923 CVE-2021-22924
=====================================================================
1. Summary:
An update for curl is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64
3. Description:
The curl packages provide the libcurl library and the curl utility for
downloading files from servers using various protocols, including HTTP,
FTP, and LDAP.
Security Fix(es):
* curl: Content not matching hash in Metalink is not being discarded
(CVE-2021-22922)
* curl: Metalink download sends credentials (CVE-2021-22923)
* curl: Bad connection reuse due to flawed path name checks
(CVE-2021-22924)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1981435 - CVE-2021-22922 curl: Content not matching hash in Metalink is not being discarded
1981438 - CVE-2021-22923 curl: Metalink download sends credentials
1981460 - CVE-2021-22924 curl: Bad connection reuse due to flawed path name checks
6. Package List:
Red Hat Enterprise Linux BaseOS (v. 8):
Source:
curl-7.61.1-18.el8_4.1.src.rpm
aarch64:
curl-7.61.1-18.el8_4.1.aarch64.rpm
curl-debuginfo-7.61.1-18.el8_4.1.aarch64.rpm
curl-debugsource-7.61.1-18.el8_4.1.aarch64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.1.aarch64.rpm
libcurl-7.61.1-18.el8_4.1.aarch64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.1.aarch64.rpm
libcurl-devel-7.61.1-18.el8_4.1.aarch64.rpm
libcurl-minimal-7.61.1-18.el8_4.1.aarch64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.1.aarch64.rpm
ppc64le:
curl-7.61.1-18.el8_4.1.ppc64le.rpm
curl-debuginfo-7.61.1-18.el8_4.1.ppc64le.rpm
curl-debugsource-7.61.1-18.el8_4.1.ppc64le.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.1.ppc64le.rpm
libcurl-7.61.1-18.el8_4.1.ppc64le.rpm
libcurl-debuginfo-7.61.1-18.el8_4.1.ppc64le.rpm
libcurl-devel-7.61.1-18.el8_4.1.ppc64le.rpm
libcurl-minimal-7.61.1-18.el8_4.1.ppc64le.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.1.ppc64le.rpm
s390x:
curl-7.61.1-18.el8_4.1.s390x.rpm
curl-debuginfo-7.61.1-18.el8_4.1.s390x.rpm
curl-debugsource-7.61.1-18.el8_4.1.s390x.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.1.s390x.rpm
libcurl-7.61.1-18.el8_4.1.s390x.rpm
libcurl-debuginfo-7.61.1-18.el8_4.1.s390x.rpm
libcurl-devel-7.61.1-18.el8_4.1.s390x.rpm
libcurl-minimal-7.61.1-18.el8_4.1.s390x.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.1.s390x.rpm
x86_64:
curl-7.61.1-18.el8_4.1.x86_64.rpm
curl-debuginfo-7.61.1-18.el8_4.1.i686.rpm
curl-debuginfo-7.61.1-18.el8_4.1.x86_64.rpm
curl-debugsource-7.61.1-18.el8_4.1.i686.rpm
curl-debugsource-7.61.1-18.el8_4.1.x86_64.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.1.i686.rpm
curl-minimal-debuginfo-7.61.1-18.el8_4.1.x86_64.rpm
libcurl-7.61.1-18.el8_4.1.i686.rpm
libcurl-7.61.1-18.el8_4.1.x86_64.rpm
libcurl-debuginfo-7.61.1-18.el8_4.1.i686.rpm
libcurl-debuginfo-7.61.1-18.el8_4.1.x86_64.rpm
libcurl-devel-7.61.1-18.el8_4.1.i686.rpm
libcurl-devel-7.61.1-18.el8_4.1.x86_64.rpm
libcurl-minimal-7.61.1-18.el8_4.1.i686.rpm
libcurl-minimal-7.61.1-18.el8_4.1.x86_64.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.1.i686.rpm
libcurl-minimal-debuginfo-7.61.1-18.el8_4.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-22922
https://access.redhat.com/security/cve/CVE-2021-22923
https://access.redhat.com/security/cve/CVE-2021-22924
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=DwWr
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
. Summary:
The Migration Toolkit for Containers (MTC) 1.6.0 is now available. Description:
The Migration Toolkit for Containers (MTC) enables you to migrate
Kubernetes resources, persistent volume data, and internal container images
between OpenShift Container Platform clusters, using the MTC web console or
the Kubernetes API. Bugs fixed (https://bugzilla.redhat.com/):
1878824 - Web console is not accessible when deployed on OpenShift cluster on IBM Cloud
1887526 - "Stage" pods fail when migrating from classic OpenShift source cluster on IBM Cloud with block storage
1899562 - MigMigration custom resource does not display an error message when a migration fails because of volume mount error
1936886 - Service account token of existing remote cluster cannot be updated by using the web console
1936894 - "Ready" status of MigHook and MigPlan custom resources is not synchronized automatically
1949117 - "Migration plan resources" page displays a permanent error message when a migration plan is deleted from the backend
1951869 - MigPlan custom resource does not detect invalid source cluster reference
1968621 - Paused deployment config causes a migration to hang
1970338 - Parallel migrations fail because the initial backup is missing
1974737 - Migration plan name length in the "Migration plan" wizard is not validated
1975369 - "Debug view" link text on "Migration plans" page can be improved
1975372 - Destination namespace in MigPlan custom resource is not validated
1976895 - Namespace mapping cannot be changed using the Migration Plan wizard
1981810 - "Excluded" resources are not excluded from the migration
1982026 - Direct image migration fails if the source URI contains a double slash ("//")
1994985 - Web console crashes when a MigPlan custom resource is created with an empty namespaces list
1996169 - When "None" is selected as the target storage class in the web console, the setting is ignored and the default storage class is used
1996627 - MigPlan custom resource displays a "PvUsageAnalysisFailed" warning after a successful PVC migration
1996784 - "Migration resources" tree on the "Migration details" page is not displayed
1996902 - "Select all" checkbox on the "Namespaces" page of the "Migration plan" wizard remains selected after a namespace is unselected
1996904 - "Migration" dialogs on the "Migration plans" page display inconsistent capitalization
1996906 - "Migration details" page link is displayed for a migration plan with no associated migrations
1996938 - Search function on "Migration plans" page displays no results
1997051 - Indirect migration from MTC 1.5.1 to 1.6.0 fails during "StageBackup" phase
1997127 - Direct volume migration "retry" feature does not work correctly after a network failure
1997173 - Migration of custom resource definitions to OpenShift Container Platform 4.9 fails because of API version incompatibility
1997180 - "migration-log-reader" pod does not log invalid Rsync options
1997665 - Selected PVCs in the "State migration" dialog are reset because of background polling
1997694 - "Update operator" link on the "Clusters" page is incorrect
1997827 - "Migration plan" wizard displays PVC names incorrectly formatted after running state migration
1998062 - Rsync pod uses upstream image
1998283 - "Migration step details" link on the "Migrations" page does not work
1998550 - "Migration plan" wizard does not support certain screen resolutions
1998581 - "Migration details" link on "Migration plans" page displays "latestIsFailed" error
1999113 - "oc describe" and "oc log" commands on "Migration resources" tree cannot be copied after failed migration
1999381 - MigPlan custom resource displays "Stage completed with warnings" status after successful migration
1999528 - Position of the "Add migration plan" button is different from the other "Add" buttons
1999765 - "Migrate" button on "State migration" dialog is enabled when no PVCs are selected
1999784 - CVE-2021-3749 nodejs-axios: Regular expression denial of service in trim function
2000205 - "Options" menu on the "Migration details" page displays incorrect items
2000218 - Validation incorrectly blocks namespace mapping if a source cluster namespace is the same as the destination namespace
2000243 - "Migration plan" wizard does not allow a migration within the same cluster
2000644 - Invalid migration plan causes "controller" pod to crash
2000875 - State migration status on "Migrations" page displays "Stage succeeded" message
2000979 - "clusterIPs" parameter of "service" object can cause Velero errors
2001089 - Direct volume migration fails because of missing CA path configuration
2001173 - Migration plan requires two clusters
2001786 - Migration fails during "Stage Backup" step because volume path on host not found
2001829 - Migration does not complete when the namespace contains a cron job with a PVC
2001941 - Fixing PVC conflicts in state migration plan using the web console causes the migration to run twice
2002420 - "Stage" pod not created for completed application pod, causing the "mig-controller" to stall
2002608 - Migration of unmounted PVC fails during "StageBackup" phase
2002897 - Rollback migration does not complete when the namespace contains a cron job
2003603 - "View logs" dialog displays the "--selector" option, which does not print all logs
2004601 - Migration plan status on "Migration plans" page is "Ready" after migration completed with warnings
2004923 - Web console displays "New operator version available" notification for incorrect operator
2005143 - Combining Rsync and Stunnel in a single pod can degrade performance
2006316 - Web console cannot create migration plan in a proxy environment
2007175 - Web console cannot be launched in a proxy environment
5. JIRA issues fixed (https://issues.jboss.org/):
MIG-785 - Search for "Crane" in the Operator Hub should display the Migration Toolkit for Containers
6. Description:
Quay 3.6.0 release
Security Fix(es):
* nodejs-url-parse: incorrect hostname in url parsing (CVE-2018-3774)
* python-pillow: insufficent fix for CVE-2020-35654 due to incorrect error
checking in TiffDecode.c (CVE-2021-25289)
* nodejs-urijs: mishandling certain uses of backslash may lead to
confidentiality compromise (CVE-2021-27516)
* nodejs-debug: Regular expression Denial of Service (CVE-2017-16137)
* nodejs-mime: Regular expression Denial of Service (CVE-2017-16138)
* nodejs-is-my-json-valid: ReDoS when validating JSON fields with email
format (CVE-2018-1107)
* nodejs-extend: Prototype pollution can allow attackers to modify object
properties (CVE-2018-16492)
* nodejs-stringstream: out-of-bounds read leading to uninitialized memory
exposure (CVE-2018-21270)
* nodejs-handlebars: lookup helper fails to properly validate templates
allowing for arbitrary JavaScript execution (CVE-2019-20920)
* nodejs-handlebars: an endless loop while processing specially-crafted
templates leads to DoS (CVE-2019-20922)
* nodejs-lodash: prototype pollution in zipObjectDeep function
(CVE-2020-8203)
* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate
function (CVE-2020-15366)
* nodejs-highlight-js: prototype pollution via a crafted HTML code block
(CVE-2020-26237)
* urijs: Hostname spoofing via backslashes in URL (CVE-2020-26291)
* python-pillow: decoding crafted YCbCr files could result in heap-based
buffer overflow (CVE-2020-35654)
* browserslist: parsing of invalid queries could result in Regular
Expression Denial of Service (ReDoS) (CVE-2021-23364)
* nodejs-postcss: Regular expression denial of service during source map
parsing (CVE-2021-23368)
* nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in
lib/previous-map.js (CVE-2021-23382)
* python-pillow: negative-offset memcpy with an invalid size in
TiffDecode.c (CVE-2021-25290)
* python-pillow: out-of-bounds read in TiffReadRGBATile in TiffDecode.c
(CVE-2021-25291)
* python-pillow: backtracking regex in PDF parser could be used as a DOS
attack (CVE-2021-25292)
* python-pillow: out-of-bounds read in SGIRleDecode.c (CVE-2021-25293)
* nodejs-url-parse: mishandling certain uses of backslash may lead to
confidentiality compromise (CVE-2021-27515)
* python-pillow: reported size of a contained image is not properly checked
for a BLP container (CVE-2021-27921)
* python-pillow: reported size of a contained image is not properly checked
for an ICNS container (CVE-2021-27922)
* python-pillow: reported size of a contained image is not properly checked
for an ICO container (CVE-2021-27923)
* python-pillow: buffer overflow in Convert.c because it allow an attacker
to pass controlled parameters directly into a convert function
(CVE-2021-34552)
* nodejs-braces: Regular Expression Denial of Service (ReDoS) in
lib/parsers.js (CVE-2018-1109)
* lodash: Prototype pollution in utilities function (CVE-2018-3721)
* hoek: Prototype pollution in utilities function (CVE-2018-3728)
* lodash: uncontrolled resource consumption in Data handler causing denial
of service (CVE-2019-1010266)
* nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608)
* python-pillow: decoding a crafted PCX file could result in buffer
over-read (CVE-2020-35653)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/):
1500700 - CVE-2017-16138 nodejs-mime: Regular expression Denial of Service
1500705 - CVE-2017-16137 nodejs-debug: Regular expression Denial of Service
1545884 - CVE-2018-3721 lodash: Prototype pollution in utilities function
1545893 - CVE-2018-3728 hoek: Prototype pollution in utilities function
1546357 - CVE-2018-1107 nodejs-is-my-json-valid: ReDoS when validating JSON fields with email format
1547272 - CVE-2018-1109 nodejs-braces: Regular Expression Denial of Service (ReDoS) in lib/parsers.js
1608140 - CVE-2018-16492 nodejs-extend: Prototype pollution can allow attackers to modify object properties
1743096 - CVE-2019-1010266 lodash: uncontrolled resource consumption in Data handler causing denial of service
1840004 - CVE-2020-7608 nodejs-yargs-parser: prototype pollution vulnerability
1857412 - CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function
1857977 - CVE-2020-15366 nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function
1882256 - CVE-2019-20922 nodejs-handlebars: an endless loop while processing specially-crafted templates leads to DoS
1882260 - CVE-2019-20920 nodejs-handlebars: lookup helper fails to properly validate templates allowing for arbitrary JavaScript execution
1901662 - CVE-2020-26237 nodejs-highlight-js: prototype pollution via a crafted HTML code block
1915257 - CVE-2020-26291 urijs: Hostname spoofing via backslashes in URL
1915420 - CVE-2020-35653 python-pillow: decoding a crafted PCX file could result in buffer over-read
1915424 - CVE-2020-35654 python-pillow: decoding crafted YCbCr files could result in heap-based buffer overflow
1927293 - CVE-2018-21270 nodejs-stringstream: out-of-bounds read leading to uninitialized memory exposure
1934470 - CVE-2021-27516 nodejs-urijs: mishandling certain uses of backslash may lead to confidentiality compromise
1934474 - CVE-2021-27515 nodejs-url-parse: mishandling certain uses of backslash may lead to confidentiality compromise
1934680 - CVE-2021-25289 python-pillow: insufficent fix for CVE-2020-35654 due to incorrect error checking in TiffDecode.c
1934685 - CVE-2021-25290 python-pillow: negative-offset memcpy with an invalid size in TiffDecode.c
1934692 - CVE-2021-25291 python-pillow: out-of-bounds read in TiffReadRGBATile in TiffDecode.c
1934699 - CVE-2021-25292 python-pillow: backtracking regex in PDF parser could be used as a DOS attack
1934705 - CVE-2021-25293 python-pillow: out-of-bounds read in SGIRleDecode.c
1935384 - CVE-2021-27921 python-pillow: reported size of a contained image is not properly checked for a BLP container
1935396 - CVE-2021-27922 python-pillow: reported size of a contained image is not properly checked for an ICNS container
1935401 - CVE-2021-27923 python-pillow: reported size of a contained image is not properly checked for an ICO container
1940759 - CVE-2018-3774 nodejs-url-parse: incorrect hostname in url parsing
1948763 - CVE-2021-23368 nodejs-postcss: Regular expression denial of service during source map parsing
1954150 - CVE-2021-23382 nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js
1955619 - CVE-2021-23364 browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS)
1982378 - CVE-2021-34552 python-pillow: buffer overflow in Convert.c because it allow an attacker to pass controlled parameters directly into a convert function
5. JIRA issues fixed (https://issues.jboss.org/):
PROJQUAY-1417 - zstd compressed layers
PROJQUAY-1449 - As a Quay admin I want to rely on the Operator to auto-scale all stateless parts of Quay
PROJQUAY-1535 - As a user I can create and use nested repository name structures
PROJQUAY-1583 - add "disconnected" annotation to operators
PROJQUAY-1609 - Operator communicates status per managed component
PROJQUAY-1610 - Operator does not make Quay deployment wait on Clair deployment
PROJQUAY-1791 - v1beta CRD EOL
PROJQUAY-1883 - Support OCP Re-encrypt routes
PROJQUAY-1887 - allow either sha or tag in related images
PROJQUAY-1926 - As an admin, I want an API to create first user, so I can automate deployment.
PROJQUAY-1998 - note database deprecations in 3.6 Config Tool
PROJQUAY-2050 - Support OCP Edge-Termination
PROJQUAY-2100 - A customer can update the Operator from 3.3 to 3.6 directly
PROJQUAY-2102 - add clair-4.2 enrichment data to quay UI
PROJQUAY-672 - MutatingAdmissionWebhook Created Automatically for QBO During Install
6