VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202105-0414 CVE-2021-22736 homeLYnk  and  spaceLYnk  Traversal Vulnerability in Japan CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause a denial of service when an unauthorized file is uploaded. homeLYnk (Wiser For KNX) and spaceLYnk Contains a path traversal vulnerability.Denial of service (DoS) It may be put into a state
VAR-202105-0413 CVE-2021-22735 homeLYnk  and  spaceLYnk  Digital Signature Verification Vulnerability in CVSS V2: 6.5
CVSS V3: 7.2
Severity: HIGH
Improper Verification of Cryptographic Signature vulnerability exists inhomeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could allow remote code execution when unauthorized code is copied to the device. homeLYnk (Wiser For KNX) and spaceLYnk Exists in a digital signature validation vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202105-0412 CVE-2021-22734 homeLYnk  and  spaceLYnk  Digital Signature Verification Vulnerability in CVSS V2: 6.5
CVSS V3: 7.2
Severity: High
Improper Verification of Cryptographic Signature vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause remote code execution when an attacker loads unauthorized code. homeLYnk (Wiser For KNX) and spaceLYnk Exists in a digital signature validation vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202105-0411 CVE-2021-22733 homeLYnk  and  spaceLYnk  Vulnerability in privilege management CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Improper Privilege Management vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause shell access when unauthorized code is loaded into the system folder. homeLYnk (Wiser For KNX) and spaceLYnk Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202105-0410 CVE-2021-22732 homeLYnk  and  spaceLYnk  Vulnerability in privilege management CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Improper Privilege Management vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause a code execution issue when an attacker loads unauthorized code on the web server. homeLYnk (Wiser For KNX) and spaceLYnk Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202105-0417 CVE-2021-22739 homeLYnk  and  spaceLYnk  Information Disclosure Vulnerability CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
Information Exposure vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause a device to be compromised when it is first configured. homeLYnk (Wiser For KNX) and spaceLYnk Contains an information disclosure vulnerability.Information may be obtained
VAR-202105-0418 CVE-2021-22740 homeLYnk  and  spaceLYnk  Information Disclosure Vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Information Exposure vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause information to be exposed when an unauthorized file is uploaded. homeLYnk (Wiser For KNX) and spaceLYnk Contains an information disclosure vulnerability.Information may be obtained
VAR-202105-0419 CVE-2021-22741 plural  Schneider Electric  Vulnerability in the use of inadequately strong password hashes in products CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Use of Password Hash with Insufficient Computational Effort vulnerability exists in ClearSCADA (all versions), EcoStruxure Geo SCADA Expert 2019 (all versions), and EcoStruxure Geo SCADA Expert 2020 (V83.7742.1 and prior), which could cause the revealing of account credentials when server database files are available. Exposure of these files to an attacker can make the system vulnerable to password decryption attacks. Note that “.sde” configuration export files do not contain user account password hashes. Schneider Electric EcoStruxure Geo SCADA Expert (ClearSCADA) is a set of data acquisition and monitoring software (SCADA) of French Schneider Electric (Schneider Electric)
VAR-202105-0408 CVE-2021-22705 Vijeo Designer  and  EcoStruxure Machine Expert  Buffer Error Vulnerability CVSS V2: 4.6
CVSS V3: 7.8
Severity: High
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists that could cause denial of service or unauthorized access to system information when interacting directly with a driver installed by Vijeo Designer or EcoStruxure Machine Expert
VAR-202105-0416 CVE-2021-22738 homeLYnk  and  spaceLYnk  Vulnerability in using cryptographic algorithms in CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
Use of a Broken or Risky Cryptographic Algorithm vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior that could cause unauthorized access when credentials are discovered after a brute force attack. homeLYnk (Wiser For KNX) and spaceLYnk Is vulnerable to the use of cryptographic algorithms.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202105-0415 CVE-2021-22737 homeLYnk  and  spaceLYnk  Vulnerability regarding inadequate protection of credentials in CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
Insufficiently Protected Credentials vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior that could cause unauthorized access of when credentials are discovered after a brute force attack. homeLYnk (Wiser For KNX) and spaceLYnk Exists in an inadequate protection of credentials.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202105-0407 CVE-2021-22699 Modicon M241  and  M251  Input verification vulnerability in logic controller firmware CVSS V2: 7.8
CVSS V3: 7.5
Severity: High
Improper Input Validation vulnerability exists in Modicon M241/M251 logic controllers firmware prior to V5.1.9.1 that could cause denial of service when specific crafted requests are sent to the controller over HTTP
VAR-202105-1451 CVE-2021-22543 Red Hat Security Advisory 2021-3943-01 CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. Arch Linux is an application system of Arch open source. A lightweight and flexible Linux® distribution that tries to keep it simple. (BZ#2010171) 4. 7) - noarch, x86_64 3. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Bug Fix(es): * Rebase package(s) to version: 1.2.23 Highlights, important fixes, or notable enhancements: * imgbase should not copy the selinux binary policy file (BZ# 1979624) (BZ#1989397) * RHV-H has been rebased on Red Hat Enterprise Linux 8.4 Batch #2. (BZ#1975177) 4. Description: The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Security fixes: * golang: net: lookup functions may return invalid host names (CVE-2021-33195) * golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196) * golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197) * golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198) * golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/): 1965503 - CVE-2021-33196 golang: archive/zip: malformed archive may cause panic or memory exhaustion 1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic 1989564 - CVE-2021-33195 golang: net: lookup functions may return invalid host names 1989570 - CVE-2021-33197 golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty 1989575 - CVE-2021-33198 golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents 1996125 - When "None" is selected as the target storage class in the web console, the setting is ignored and the default storage class is used 5. 8.2) - x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Bug Fix(es): * kernel-rt: update RT source tree to the latest RHEL-8.2.z11 Batch source tree (BZ#1984586) 4. 6 ELS) - i386, s390x, x86_64 3. 8.1) - ppc64le, x86_64 3. Description: This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Description: Red Hat Advanced Cluster Management for Kubernetes 2.1.12 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.1/html/release_notes/ Security fixes: * redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626) * redis: Integer overflow issue with Streams (CVE-2021-32627) * redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628) * redis: Integer overflow issue with intsets (CVE-2021-32687) * redis: Integer overflow issue with strings (CVE-2021-41099) * redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675) * redis: Out of bounds read in lua debugger protocol parser (CVE-2021-32672) For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Container updates: * RHACM 2.1.12 images (BZ# 2007489) 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To apply this upgrade, you must upgrade your OpenShift Container Platform version to 4.6, or later. Bugs fixed (https://bugzilla.redhat.com/): 2007489 - RHACM 2.1.12 images 2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets 2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request 2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser 2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure 2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams 2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack 2011020 - CVE-2021-41099 redis: Integer overflow issue with strings 5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2021:3363-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:3363 Issue date: 2021-08-31 CVE Names: CVE-2021-3609 CVE-2021-22543 CVE-2021-22555 CVE-2021-32399 ==================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder EUS (v. 8.2) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux BaseOS EUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609) * kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543) * kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555) * kernel: race condition for removal of the HCI controller (CVE-2021-32399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930169) * Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967100) * s390/uv: Fix handling of length extensions (BZ#1975657) * RHEL 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in LUN from Target_id's over 8 (BZ#1976265) * Backport "tick/nohz: Conditionally restart tick on idle exit" to RHEL 8.5 (BZ#1978711) * rhel8.3: phase 2 netfilter backports from upstream (BZ#1980323) * xfrm: backports from upstream (BZ#1981841) Enhancement(s): * [8.2.z] Incorrect parsing of ACPI HMAT table reports incorrect kernel WARNING taint (BZ#1943702) * Only selected patches from [IBM 8.4 FEAT] ibmvnic: Backport FW950 and assorted bug fixes (BZ#1980795) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1965461 - CVE-2021-22543 kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks 1970807 - CVE-2021-32399 kernel: race condition for removal of the HCI controller 1971651 - CVE-2021-3609 kernel: race condition in net/can/bcm.c leads to local privilege escalation 1980101 - CVE-2021-22555 kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c 6. Package List: Red Hat Enterprise Linux BaseOS EUS (v. 8.2): Source: kernel-4.18.0-193.64.1.el8_2.src.rpm aarch64: bpftool-4.18.0-193.64.1.el8_2.aarch64.rpm bpftool-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-core-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-cross-headers-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debug-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debug-core-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debug-devel-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debug-modules-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debug-modules-extra-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-devel-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-headers-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-modules-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-modules-extra-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-tools-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-tools-libs-4.18.0-193.64.1.el8_2.aarch64.rpm perf-4.18.0-193.64.1.el8_2.aarch64.rpm perf-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm python3-perf-4.18.0-193.64.1.el8_2.aarch64.rpm python3-perf-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm noarch: kernel-abi-whitelists-4.18.0-193.64.1.el8_2.noarch.rpm kernel-doc-4.18.0-193.64.1.el8_2.noarch.rpm ppc64le: bpftool-4.18.0-193.64.1.el8_2.ppc64le.rpm bpftool-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-core-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-cross-headers-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debug-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debug-core-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debug-devel-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debug-modules-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debug-modules-extra-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-devel-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-headers-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-modules-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-modules-extra-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-tools-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-tools-libs-4.18.0-193.64.1.el8_2.ppc64le.rpm perf-4.18.0-193.64.1.el8_2.ppc64le.rpm perf-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm python3-perf-4.18.0-193.64.1.el8_2.ppc64le.rpm python3-perf-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm s390x: bpftool-4.18.0-193.64.1.el8_2.s390x.rpm bpftool-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm kernel-4.18.0-193.64.1.el8_2.s390x.rpm kernel-core-4.18.0-193.64.1.el8_2.s390x.rpm kernel-cross-headers-4.18.0-193.64.1.el8_2.s390x.rpm kernel-debug-4.18.0-193.64.1.el8_2.s390x.rpm kernel-debug-core-4.18.0-193.64.1.el8_2.s390x.rpm kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm kernel-debug-devel-4.18.0-193.64.1.el8_2.s390x.rpm kernel-debug-modules-4.18.0-193.64.1.el8_2.s390x.rpm kernel-debug-modules-extra-4.18.0-193.64.1.el8_2.s390x.rpm kernel-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-193.64.1.el8_2.s390x.rpm kernel-devel-4.18.0-193.64.1.el8_2.s390x.rpm kernel-headers-4.18.0-193.64.1.el8_2.s390x.rpm kernel-modules-4.18.0-193.64.1.el8_2.s390x.rpm kernel-modules-extra-4.18.0-193.64.1.el8_2.s390x.rpm kernel-tools-4.18.0-193.64.1.el8_2.s390x.rpm kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm kernel-zfcpdump-4.18.0-193.64.1.el8_2.s390x.rpm kernel-zfcpdump-core-4.18.0-193.64.1.el8_2.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm kernel-zfcpdump-devel-4.18.0-193.64.1.el8_2.s390x.rpm kernel-zfcpdump-modules-4.18.0-193.64.1.el8_2.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-193.64.1.el8_2.s390x.rpm perf-4.18.0-193.64.1.el8_2.s390x.rpm perf-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm python3-perf-4.18.0-193.64.1.el8_2.s390x.rpm python3-perf-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm x86_64: bpftool-4.18.0-193.64.1.el8_2.x86_64.rpm bpftool-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-core-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-cross-headers-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debug-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debug-core-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debug-devel-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debug-modules-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debug-modules-extra-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-devel-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-headers-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-modules-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-modules-extra-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-tools-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-tools-libs-4.18.0-193.64.1.el8_2.x86_64.rpm perf-4.18.0-193.64.1.el8_2.x86_64.rpm perf-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm python3-perf-4.18.0-193.64.1.el8_2.x86_64.rpm python3-perf-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm Red Hat CodeReady Linux Builder EUS (v. 8.2): aarch64: bpftool-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm kernel-tools-libs-devel-4.18.0-193.64.1.el8_2.aarch64.rpm perf-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm python3-perf-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm ppc64le: bpftool-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm kernel-tools-libs-devel-4.18.0-193.64.1.el8_2.ppc64le.rpm perf-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm python3-perf-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm x86_64: bpftool-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm kernel-tools-libs-devel-4.18.0-193.64.1.el8_2.x86_64.rpm perf-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm python3-perf-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-3609 https://access.redhat.com/security/cve/CVE-2021-22543 https://access.redhat.com/security/cve/CVE-2021-22555 https://access.redhat.com/security/cve/CVE-2021-32399 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYS31B9zjgjWX9erEAQgW+g/+J99Y+Y7e8ycInntMh7wHvU3/48D0LHEh HZo1cy4MY9GvBX5ijfFZKvQR2TLGZR0fa5driCzQ/4WW2RwUjRExpIdOLPEKqKwd iaYXAM7LJctQX3V3lW3f+fwLxz04lxOCzXdmbBgQIsVVX4nflCEF6htIIINW5Kp8 49i1h7ca0dMRwAh9OTPw59Z0WrVB7C+jkr9kUr+rYuJz389PCPvfpzkksRHZ3wEf veunhvMhPSbambyqnFbBfpxQ5523qx0nXaHQ24WYg3DkRaWhw/1jwSqUxIQPaxJR sYv9jQ1hwW8JNg4TxuCrEK4PPgRaMK2NXMmqAXY7dHQudTOIwxy4zzxH7ptYkylL I/NJ+sD3WbN1LmnT+fU/zy/etPyRtHIucdvpnzYIV7NUgg7h9E10e+yg5d4MIe1/ FN/oyEiScNHMxqlHrWeVIq9LXabf8IhZFwYJyJLagCIYAMIlN6LFfAwUFoK+0Fjj azg7GWirLC31paNlLmEJPiVYT13TqINkntt7oXcvJeV0KPT+w6MtCkUQuiPW/ZNP RWMQd2vvqYGLjL4Osw74uzdP1potEZFupUoxMUJpmc1gXMxAPr4HwdgpUbwsggaX p+COJJlj0rXgKbRyBpjpJ5px+s92zYQ/6yOGOQO7Q4txXgYQb3TO7fzzoVAs7JfX SscZLhxIDUg=PDEr -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce
VAR-202105-1325 CVE-2021-25217 Red Hat Security Advisory 2021-3016-01 CVSS V2: 3.3
CVSS V3: 7.4
Severity: HIGH
In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been officially tested for the vulnerability), The outcome of encountering the defect while reading a lease that will trigger it varies, according to: the component being affected (i.e., dhclient or dhcpd) whether the package was built as a 32-bit or 64-bit binary whether the compiler flag -fstack-protection-strong was used when compiling In dhclient, ISC has not successfully reproduced the error on a 64-bit system. However, on a 32-bit system it is possible to cause dhclient to crash when reading an improper lease, which could cause network connectivity problems for an affected system due to the absence of a running DHCP client process. In dhcpd, when run in DHCPv4 or DHCPv6 mode: if the dhcpd server binary was built for a 32-bit architecture AND the -fstack-protection-strong flag was specified to the compiler, dhcpd may exit while parsing a lease file containing an objectionable lease, resulting in lack of service to clients. Additionally, the offending lease and the lease immediately following it in the lease database may be improperly deleted. if the dhcpd server binary was built for a 64-bit architecture OR if the -fstack-protection-strong compiler flag was NOT specified, the crash will not occur, but it is possible for the offending lease and the lease which immediately followed it to be improperly deleted. There is a discrepancy between the code that handles encapsulated option information in leases transmitted "on the wire" and the code which reads and parses lease information after it has been written to disk storage. The highest threat from this vulnerability is to data confidentiality and integrity as well as service availability. (CVE-2021-25217). Description: Red Hat Advanced Cluster Management for Kubernetes 2.3.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.3/html/release_notes/ Security: * fastify-reply-from: crafted URL allows prefix scape of the proxied backend service (CVE-2021-21321) * fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service (CVE-2021-21322) * nodejs-netmask: improper input validation of octal input data (CVE-2021-28918) * redis: Integer overflow via STRALGO LCS command (CVE-2021-29477) * redis: Integer overflow via COPY command for large intsets (CVE-2021-29478) * nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469) * nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions (CVE-2020-28500) * golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing - -u- extension (CVE-2020-28851) * golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852) * nodejs-ansi_up: XSS due to insufficient URL sanitization (CVE-2021-3377) * oras: zip-slip vulnerability via oras-pull (CVE-2021-21272) * redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms (CVE-2021-21309) * nodejs-lodash: command injection via template (CVE-2021-23337) * nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362) * browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS) (CVE-2021-23364) * nodejs-postcss: Regular expression denial of service during source map parsing (CVE-2021-23368) * nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option (CVE-2021-23369) * nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js (CVE-2021-23382) * nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option (CVE-2021-23383) * openssl: integer overflow in CipherUpdate (CVE-2021-23840) * openssl: NULL pointer dereference in X509_issuer_and_serial_hash() (CVE-2021-23841) * nodejs-ua-parser-js: ReDoS via malicious User-Agent header (CVE-2021-27292) * grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call (CVE-2021-27358) * nodejs-is-svg: ReDoS via malicious string (CVE-2021-28092) * nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character (CVE-2021-29418) * ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482) * normalize-url: ReDoS for data URLs (CVE-2021-33502) * nodejs-trim-newlines: ReDoS in .end() method (CVE-2021-33623) * nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343) * html-parse-stringify: Regular Expression DoS (CVE-2021-23346) * openssl: incorrect SSLv2 rollback protection (CVE-2021-23839) For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section. Bugs: * RFE Make the source code for the endpoint-metrics-operator public (BZ# 1913444) * cluster became offline after apiserver health check (BZ# 1942589) 3. Bugs fixed (https://bugzilla.redhat.com/): 1913333 - CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension 1913338 - CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag 1913444 - RFE Make the source code for the endpoint-metrics-operator public 1921286 - CVE-2021-21272 oras: zip-slip vulnerability via oras-pull 1927520 - RHACM 2.3.0 images 1928937 - CVE-2021-23337 nodejs-lodash: command injection via template 1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions 1930294 - CVE-2021-23839 openssl: incorrect SSLv2 rollback protection 1930310 - CVE-2021-23841 openssl: NULL pointer dereference in X509_issuer_and_serial_hash() 1930324 - CVE-2021-23840 openssl: integer overflow in CipherUpdate 1932634 - CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms 1936427 - CVE-2021-3377 nodejs-ansi_up: XSS due to insufficient URL sanitization 1939103 - CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string 1940196 - View Resource YAML option shows 404 error when reviewing a Subscription for an application 1940613 - CVE-2021-27292 nodejs-ua-parser-js: ReDoS via malicious User-Agent header 1941024 - CVE-2021-27358 grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call 1941675 - CVE-2021-23346 html-parse-stringify: Regular Expression DoS 1942178 - CVE-2021-21321 fastify-reply-from: crafted URL allows prefix scape of the proxied backend service 1942182 - CVE-2021-21322 fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service 1942589 - cluster became offline after apiserver health check 1943208 - CVE-2021-23362 nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() 1944822 - CVE-2021-29418 nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character 1944827 - CVE-2021-28918 nodejs-netmask: improper input validation of octal input data 1945459 - CVE-2020-28469 nodejs-glob-parent: Regular expression denial of service 1948761 - CVE-2021-23369 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option 1948763 - CVE-2021-23368 nodejs-postcss: Regular expression denial of service during source map parsing 1954150 - CVE-2021-23382 nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js 1954368 - CVE-2021-29482 ulikunitz/xz: Infinite loop in readUvarint allows for denial of service 1955619 - CVE-2021-23364 browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS) 1956688 - CVE-2021-23383 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option 1956818 - CVE-2021-23343 nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe 1957410 - CVE-2021-29477 redis: Integer overflow via STRALGO LCS command 1957414 - CVE-2021-29478 redis: Integer overflow via COPY command for large intsets 1964461 - CVE-2021-33502 normalize-url: ReDoS for data URLs 1966615 - CVE-2021-33623 nodejs-trim-newlines: ReDoS in .end() method 1968122 - clusterdeployment fails because hiveadmission sc does not have correct permissions 1972703 - Subctl fails to join cluster, since it cannot auto-generate a valid cluster id 1983131 - Defragmenting an etcd member doesn't reduce the DB size (7.5GB) on a setup with ~1000 spoke clusters 5. 6 ELS) - i386, s390x, x86_64 3. These packages include redhat-release-virtualization-host. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. All OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor 4. Solution: For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -cli.html 5. ========================================================================= Ubuntu Security Notice USN-4969-2 May 27, 2021 isc-dhcp vulnerability ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: DHCP could be made to crash if it received specially crafted network traffic. Software Description: - isc-dhcp: DHCP server and client Details: USN-4969-1 fixed a vulnerability in DHCP. This update provides the corresponding update for Ubuntu 14.04 ESM and 16.04 ESM. Original advisory details: Jon Franklin and Pawel Wieczorkiewicz discovered that DHCP incorrectly handled lease file parsing. A remote attacker could possibly use this issue to cause DHCP to crash, resulting in a denial of service. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: isc-dhcp-client 4.3.3-5ubuntu12.10+esm1 isc-dhcp-server 4.3.3-5ubuntu12.10+esm1 Ubuntu 14.04 ESM: isc-dhcp-client 4.2.4-7ubuntu12.13+esm1 isc-dhcp-server 4.2.4-7ubuntu12.13+esm1 In general, a standard system update will make all the necessary changes. 7.7) - ppc64, ppc64le, s390x, x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: dhcp security update Advisory ID: RHSA-2021:2414-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2414 Issue date: 2021-06-14 CVE Names: CVE-2021-25217 ===================================================================== 1. Summary: An update for dhcp is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.4) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.4) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.4) - x86_64 3. Description: The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es): * dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient (CVE-2021-25217) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1963258 - CVE-2021-25217 dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient 6. Package List: Red Hat Enterprise Linux Server AUS (v. 7.4): Source: dhcp-4.2.5-58.el7_4.5.src.rpm x86_64: dhclient-4.2.5-58.el7_4.5.x86_64.rpm dhcp-4.2.5-58.el7_4.5.x86_64.rpm dhcp-common-4.2.5-58.el7_4.5.x86_64.rpm dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm dhcp-libs-4.2.5-58.el7_4.5.i686.rpm dhcp-libs-4.2.5-58.el7_4.5.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.4): Source: dhcp-4.2.5-58.el7_4.5.src.rpm ppc64le: dhclient-4.2.5-58.el7_4.5.ppc64le.rpm dhcp-4.2.5-58.el7_4.5.ppc64le.rpm dhcp-common-4.2.5-58.el7_4.5.ppc64le.rpm dhcp-debuginfo-4.2.5-58.el7_4.5.ppc64le.rpm dhcp-libs-4.2.5-58.el7_4.5.ppc64le.rpm x86_64: dhclient-4.2.5-58.el7_4.5.x86_64.rpm dhcp-4.2.5-58.el7_4.5.x86_64.rpm dhcp-common-4.2.5-58.el7_4.5.x86_64.rpm dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm dhcp-libs-4.2.5-58.el7_4.5.i686.rpm dhcp-libs-4.2.5-58.el7_4.5.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 7.4): Source: dhcp-4.2.5-58.el7_4.5.src.rpm x86_64: dhclient-4.2.5-58.el7_4.5.x86_64.rpm dhcp-4.2.5-58.el7_4.5.x86_64.rpm dhcp-common-4.2.5-58.el7_4.5.x86_64.rpm dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm dhcp-libs-4.2.5-58.el7_4.5.i686.rpm dhcp-libs-4.2.5-58.el7_4.5.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 7.4): x86_64: dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm dhcp-devel-4.2.5-58.el7_4.5.i686.rpm dhcp-devel-4.2.5-58.el7_4.5.x86_64.rpm Red Hat Enterprise Linux Server Optional E4S (v. 7.4): ppc64le: dhcp-debuginfo-4.2.5-58.el7_4.5.ppc64le.rpm dhcp-devel-4.2.5-58.el7_4.5.ppc64le.rpm x86_64: dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm dhcp-devel-4.2.5-58.el7_4.5.i686.rpm dhcp-devel-4.2.5-58.el7_4.5.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 7.4): x86_64: dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm dhcp-devel-4.2.5-58.el7_4.5.i686.rpm dhcp-devel-4.2.5-58.el7_4.5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-25217 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYMezctzjgjWX9erEAQg/cxAAph3Cp36Ed68IjSJH1glCDVVbNvKokeg/ Q3JxA6BIqimNoVv14IhjDS4wt7ZGCtp7rluumCjE7cMNvLcfRhUxoU9jvxAR4BK9 2N1H9/TCFgnqULCs8KqWs8rm2qtfSuSxs9hlgOUGVnUD4AXOFsynTZkYqS9JS3kM yP+Uo+s+Dwz/Sq5oWU2vWrXx/yjce35UQU9WCOfk2Nat4T/GeCuoscp9cFlbgLFB FFwyCr+Kv6rdfsn37TvOxLFqttz+2atJUPp0KrUNKosPIqp7KS8QfOALff8hqswc TPlgmk55+I7v24zBzAiNidWqbpDVZnzOFH/R7yVtOA/N1Aq4pl9Wsh4tDnSxv+rc NdA9GLhdk89OOvLbpJ1rc6hxa91qrf/jcUK1EoLUhgk+Z80o6h5HghboRgSrblS/ d3FA8xlk11AgUU8Y0upb2D0DyIol4jM53+P3dulBJ8IvBV4rREwBvxHyQwT+sG43 30Jz+UWiS6BKotLdiVNMMGUNdcBTtXnF31RXF2iY0fUq57IrEb4rl8h/5gQA0UVb WWxqdbnKwVvxAu6nbp8XqZR4vl5LCuOohqZtPiUgVIo5Um8pYTxjUkV2+20Cm1+d xJVCc/K3mzBkeaN66esB5vB5Okc3MzqqH4/WeI171cnFLArGddejORH21L6nAcP6 csJckOYTtLQ= =NFTY -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . 8.1) - aarch64, noarch, ppc64le, s390x, x86_64 3. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202305-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: ISC DHCP: Multiple Vulnerabilities Date: May 03, 2023 Bugs: #875521, #792324 ID: 202305-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been discovered in ISC DHCP, the worst of which could result in denial of service. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/dhcp < 4.4.3_p1 >= 4.4.3_p1 Description =========== Multiple vulnerabilities have been discovered in ISC DHCP. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All ISC DHCP users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/dhcp-4.4.3_p1" References ========== [ 1 ] CVE-2021-25217 https://nvd.nist.gov/vuln/detail/CVE-2021-25217 [ 2 ] CVE-2022-2928 https://nvd.nist.gov/vuln/detail/CVE-2022-2928 [ 3 ] CVE-2022-2929 https://nvd.nist.gov/vuln/detail/CVE-2022-2929 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202305-22 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5
VAR-202105-1625 No CVE Many Huawei products have weak password vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Huawei Technologies Co., Ltd. is a provider of ICT (Information and Communication) infrastructure and smart terminals. Many Huawei products have weak password vulnerabilities. The attacker uses a weak password to log in to the background to obtain sensitive information.
VAR-202105-1629 No CVE Unauthorized access vulnerability exists in HP Officejet Pro printer management page CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Hewlett-Packard Trading (Shanghai) Co., Ltd. was registered and established in the Free Trade Zone Market Supervision Administration on February 8, 1999. The company's business scope includes computer equipment, printing equipment, imaging equipment, electronic products and related parts and components of the above products. An unauthorized access vulnerability exists in the HP Officejet Pro printer management page. Attackers can use the vulnerability to access the printer console interface to operate without logging in
VAR-202105-1630 No CVE Samsung WLAN AP has weak password vulnerability (CNVD-2021-30051) CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of the end of 2008, 20 of Samsung's more than 30 companies have invested in China, including Samsung Electronics, Samsung SDI, Samsung SDS, and Samsung Electro-Mechanics. Samsung WLAN AP has a command execution vulnerability. The attacker uses a weak password to log in to the background to obtain sensitive information.
VAR-202105-1632 No CVE Samsung WLAN AP has a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of the end of 2008, 20 of Samsung's more than 30 companies have invested in China, including Samsung Electronics, Samsung SDI, Samsung SDS, and Samsung Electro-Mechanics. Samsung WLAN AP has a command execution vulnerability. An attacker can use this vulnerability to gain server permissions.
VAR-202105-0855 CVE-2021-30195 CODESYS V2 runtime  system   Out-of-bounds read vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
CODESYS V2 runtime system before 2.4.7.55 has Improper Input Validation. CODESYS V2 runtime system Is vulnerable to an out-of-bounds read.Denial of service (DoS) It may be put into a state
VAR-202105-0848 CVE-2021-30188 CODESYS V2 runtime  system  SP  Out-of-bounds Vulnerability in Microsoft CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
CODESYS V2 runtime system SP before 2.4.7.55 has a Stack-based Buffer Overflow. CODESYS V2 runtime system SP Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state