VARIoT IoT vulnerabilities database
| VAR-202105-0414 | CVE-2021-22736 | homeLYnk and spaceLYnk Traversal Vulnerability in Japan |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause a denial of service when an unauthorized file is uploaded. homeLYnk (Wiser For KNX) and spaceLYnk Contains a path traversal vulnerability.Denial of service (DoS) It may be put into a state
| VAR-202105-0413 | CVE-2021-22735 | homeLYnk and spaceLYnk Digital Signature Verification Vulnerability in |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: HIGH |
Improper Verification of Cryptographic Signature vulnerability exists inhomeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could allow remote code execution when unauthorized code is copied to the device. homeLYnk (Wiser For KNX) and spaceLYnk Exists in a digital signature validation vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202105-0412 | CVE-2021-22734 | homeLYnk and spaceLYnk Digital Signature Verification Vulnerability in |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: High |
Improper Verification of Cryptographic Signature vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause remote code execution when an attacker loads unauthorized code. homeLYnk (Wiser For KNX) and spaceLYnk Exists in a digital signature validation vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202105-0411 | CVE-2021-22733 | homeLYnk and spaceLYnk Vulnerability in privilege management |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper Privilege Management vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause shell access when unauthorized code is loaded into the system folder. homeLYnk (Wiser For KNX) and spaceLYnk Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202105-0410 | CVE-2021-22732 | homeLYnk and spaceLYnk Vulnerability in privilege management |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper Privilege Management vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause a code execution issue when an attacker loads unauthorized code on the web server. homeLYnk (Wiser For KNX) and spaceLYnk Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202105-0417 | CVE-2021-22739 | homeLYnk and spaceLYnk Information Disclosure Vulnerability |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
Information Exposure vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause a device to be compromised when it is first configured. homeLYnk (Wiser For KNX) and spaceLYnk Contains an information disclosure vulnerability.Information may be obtained
| VAR-202105-0418 | CVE-2021-22740 | homeLYnk and spaceLYnk Information Disclosure Vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Information Exposure vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause information to be exposed when an unauthorized file is uploaded. homeLYnk (Wiser For KNX) and spaceLYnk Contains an information disclosure vulnerability.Information may be obtained
| VAR-202105-0419 | CVE-2021-22741 | plural Schneider Electric Vulnerability in the use of inadequately strong password hashes in products |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Use of Password Hash with Insufficient Computational Effort vulnerability exists in ClearSCADA (all versions), EcoStruxure Geo SCADA Expert 2019 (all versions), and EcoStruxure Geo SCADA Expert 2020 (V83.7742.1 and prior), which could cause the revealing of account credentials when server database files are available. Exposure of these files to an attacker can make the system vulnerable to password decryption attacks. Note that “.sde” configuration export files do not contain user account password hashes. Schneider Electric EcoStruxure Geo SCADA Expert (ClearSCADA) is a set of data acquisition and monitoring software (SCADA) of French Schneider Electric (Schneider Electric)
| VAR-202105-0408 | CVE-2021-22705 | Vijeo Designer and EcoStruxure Machine Expert Buffer Error Vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: High |
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists that could cause denial of service or unauthorized access to system information when interacting directly with a driver installed by Vijeo Designer or EcoStruxure Machine Expert
| VAR-202105-0416 | CVE-2021-22738 | homeLYnk and spaceLYnk Vulnerability in using cryptographic algorithms in |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
Use of a Broken or Risky Cryptographic Algorithm vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior that could cause unauthorized access when credentials are discovered after a brute force attack. homeLYnk (Wiser For KNX) and spaceLYnk Is vulnerable to the use of cryptographic algorithms.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202105-0415 | CVE-2021-22737 | homeLYnk and spaceLYnk Vulnerability regarding inadequate protection of credentials in |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
Insufficiently Protected Credentials vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior that could cause unauthorized access of when credentials are discovered after a brute force attack. homeLYnk (Wiser For KNX) and spaceLYnk Exists in an inadequate protection of credentials.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202105-0407 | CVE-2021-22699 | Modicon M241 and M251 Input verification vulnerability in logic controller firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: High |
Improper Input Validation vulnerability exists in Modicon M241/M251 logic controllers firmware prior to V5.1.9.1 that could cause denial of service when specific crafted requests are sent to the controller over HTTP
| VAR-202105-1451 | CVE-2021-22543 | Red Hat Security Advisory 2021-3943-01 |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. Arch Linux is an application system of Arch open source. A lightweight and flexible Linux® distribution that tries to keep it simple. (BZ#2010171)
4. 7) - noarch, x86_64
3.
These packages include redhat-release-virtualization-host, ovirt-node, and
rhev-hypervisor. RHVH features a Cockpit user interface for
monitoring the host's resources and performing administrative tasks.
Bug Fix(es):
* Rebase package(s) to version: 1.2.23
Highlights, important fixes, or notable enhancements:
* imgbase should not copy the selinux binary policy file (BZ# 1979624)
(BZ#1989397)
* RHV-H has been rebased on Red Hat Enterprise Linux 8.4 Batch #2.
(BZ#1975177)
4. Description:
The Migration Toolkit for Containers (MTC) enables you to migrate
Kubernetes resources, persistent volume data, and internal container images
between OpenShift Container Platform clusters, using the MTC web console or
the Kubernetes API.
Security fixes:
* golang: net: lookup functions may return invalid host names
(CVE-2021-33195)
* golang: archive/zip: malformed archive may cause panic or memory
exhaustion (CVE-2021-33196)
* golang: net/http/httputil: ReverseProxy forwards connection headers if
first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error
if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to
panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/):
1965503 - CVE-2021-33196 golang: archive/zip: malformed archive may cause panic or memory exhaustion
1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic
1989564 - CVE-2021-33195 golang: net: lookup functions may return invalid host names
1989570 - CVE-2021-33197 golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty
1989575 - CVE-2021-33198 golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents
1996125 - When "None" is selected as the target storage class in the web console, the setting is ignored and the default storage class is used
5. 8.2) - x86_64
3. Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables
fine-tuning for systems with extremely high determinism requirements.
Bug Fix(es):
* kernel-rt: update RT source tree to the latest RHEL-8.2.z11 Batch source
tree (BZ#1984586)
4. 6 ELS) - i386, s390x, x86_64
3. 8.1) - ppc64le, x86_64
3. Description:
This is a kernel live patch module which is automatically loaded by the RPM
post-install script to modify the code of a running kernel. Description:
Red Hat Advanced Cluster Management for Kubernetes 2.1.12 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in. See the following Release Notes
documentation, which will be updated shortly for this release, for
additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.1/html/release_notes/
Security fixes:
* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)
* redis: Integer overflow issue with Streams (CVE-2021-32627)
* redis: Integer overflow bug in the ziplist data structure
(CVE-2021-32628)
* redis: Integer overflow issue with intsets (CVE-2021-32687)
* redis: Integer overflow issue with strings (CVE-2021-41099)
* redis: Denial of service via Redis Standard Protocol (RESP) request
(CVE-2021-32675)
* redis: Out of bounds read in lua debugger protocol parser
(CVE-2021-32672)
For more details about the security issues, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Container updates:
* RHACM 2.1.12 images (BZ# 2007489)
3. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied. To apply this upgrade,
you
must upgrade your OpenShift Container Platform version to 4.6, or later. Bugs fixed (https://bugzilla.redhat.com/):
2007489 - RHACM 2.1.12 images
2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets
2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request
2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser
2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure
2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams
2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack
2011020 - CVE-2021-41099 redis: Integer overflow issue with strings
5. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security, bug fix, and enhancement update
Advisory ID: RHSA-2021:3363-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3363
Issue date: 2021-08-31
CVE Names: CVE-2021-3609 CVE-2021-22543 CVE-2021-22555
CVE-2021-32399
====================================================================
1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 8.2
Extended Update Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat CodeReady Linux Builder EUS (v. 8.2) - aarch64, ppc64le, x86_64
Red Hat Enterprise Linux BaseOS EUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64
3. Description:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security Fix(es):
* kernel: race condition in net/can/bcm.c leads to local privilege
escalation (CVE-2021-3609)
* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO
checks (CVE-2021-22543)
* kernel: out-of-bounds write in xt_compat_target_from_user() in
net/netfilter/x_tables.c (CVE-2021-22555)
* kernel: race condition for removal of the HCI controller (CVE-2021-32399)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to
add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930169)
* Every server is displaying the same power levels for all of our i40e 25G
interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0
(BZ#1967100)
* s390/uv: Fix handling of length extensions (BZ#1975657)
* RHEL 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in
LUN from Target_id's over 8 (BZ#1976265)
* Backport "tick/nohz: Conditionally restart tick on idle exit" to RHEL 8.5
(BZ#1978711)
* rhel8.3: phase 2 netfilter backports from upstream (BZ#1980323)
* xfrm: backports from upstream (BZ#1981841)
Enhancement(s):
* [8.2.z] Incorrect parsing of ACPI HMAT table reports incorrect kernel
WARNING taint (BZ#1943702)
* Only selected patches from [IBM 8.4 FEAT] ibmvnic: Backport FW950 and
assorted bug fixes (BZ#1980795)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1965461 - CVE-2021-22543 kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks
1970807 - CVE-2021-32399 kernel: race condition for removal of the HCI controller
1971651 - CVE-2021-3609 kernel: race condition in net/can/bcm.c leads to local privilege escalation
1980101 - CVE-2021-22555 kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c
6. Package List:
Red Hat Enterprise Linux BaseOS EUS (v. 8.2):
Source:
kernel-4.18.0-193.64.1.el8_2.src.rpm
aarch64:
bpftool-4.18.0-193.64.1.el8_2.aarch64.rpm
bpftool-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-core-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-cross-headers-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-debug-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-debug-core-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-debug-devel-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-debug-modules-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-debug-modules-extra-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-devel-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-headers-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-modules-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-modules-extra-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-tools-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-tools-libs-4.18.0-193.64.1.el8_2.aarch64.rpm
perf-4.18.0-193.64.1.el8_2.aarch64.rpm
perf-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm
python3-perf-4.18.0-193.64.1.el8_2.aarch64.rpm
python3-perf-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm
noarch:
kernel-abi-whitelists-4.18.0-193.64.1.el8_2.noarch.rpm
kernel-doc-4.18.0-193.64.1.el8_2.noarch.rpm
ppc64le:
bpftool-4.18.0-193.64.1.el8_2.ppc64le.rpm
bpftool-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-core-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-cross-headers-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-debug-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-debug-core-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-debug-devel-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-debug-modules-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-devel-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-headers-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-modules-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-modules-extra-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-tools-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-tools-libs-4.18.0-193.64.1.el8_2.ppc64le.rpm
perf-4.18.0-193.64.1.el8_2.ppc64le.rpm
perf-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm
python3-perf-4.18.0-193.64.1.el8_2.ppc64le.rpm
python3-perf-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm
s390x:
bpftool-4.18.0-193.64.1.el8_2.s390x.rpm
bpftool-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-core-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-cross-headers-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-debug-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-debug-core-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-debug-devel-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-debug-modules-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-debug-modules-extra-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-debuginfo-common-s390x-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-devel-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-headers-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-modules-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-modules-extra-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-tools-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-zfcpdump-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-zfcpdump-core-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-zfcpdump-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-zfcpdump-devel-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-zfcpdump-modules-4.18.0-193.64.1.el8_2.s390x.rpm
kernel-zfcpdump-modules-extra-4.18.0-193.64.1.el8_2.s390x.rpm
perf-4.18.0-193.64.1.el8_2.s390x.rpm
perf-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm
python3-perf-4.18.0-193.64.1.el8_2.s390x.rpm
python3-perf-debuginfo-4.18.0-193.64.1.el8_2.s390x.rpm
x86_64:
bpftool-4.18.0-193.64.1.el8_2.x86_64.rpm
bpftool-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-core-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-cross-headers-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-debug-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-debug-core-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-debug-devel-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-debug-modules-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-debug-modules-extra-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-devel-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-headers-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-modules-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-modules-extra-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-tools-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-tools-libs-4.18.0-193.64.1.el8_2.x86_64.rpm
perf-4.18.0-193.64.1.el8_2.x86_64.rpm
perf-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm
python3-perf-4.18.0-193.64.1.el8_2.x86_64.rpm
python3-perf-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm
Red Hat CodeReady Linux Builder EUS (v. 8.2):
aarch64:
bpftool-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm
kernel-tools-libs-devel-4.18.0-193.64.1.el8_2.aarch64.rpm
perf-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm
python3-perf-debuginfo-4.18.0-193.64.1.el8_2.aarch64.rpm
ppc64le:
bpftool-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm
kernel-tools-libs-devel-4.18.0-193.64.1.el8_2.ppc64le.rpm
perf-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm
python3-perf-debuginfo-4.18.0-193.64.1.el8_2.ppc64le.rpm
x86_64:
bpftool-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-debug-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-tools-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm
kernel-tools-libs-devel-4.18.0-193.64.1.el8_2.x86_64.rpm
perf-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm
python3-perf-debuginfo-4.18.0-193.64.1.el8_2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-3609
https://access.redhat.com/security/cve/CVE-2021-22543
https://access.redhat.com/security/cve/CVE-2021-22555
https://access.redhat.com/security/cve/CVE-2021-32399
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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PDEr
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
| VAR-202105-1325 | CVE-2021-25217 | Red Hat Security Advisory 2021-3016-01 |
CVSS V2: 3.3 CVSS V3: 7.4 Severity: HIGH |
In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been officially tested for the vulnerability), The outcome of encountering the defect while reading a lease that will trigger it varies, according to: the component being affected (i.e., dhclient or dhcpd) whether the package was built as a 32-bit or 64-bit binary whether the compiler flag -fstack-protection-strong was used when compiling In dhclient, ISC has not successfully reproduced the error on a 64-bit system. However, on a 32-bit system it is possible to cause dhclient to crash when reading an improper lease, which could cause network connectivity problems for an affected system due to the absence of a running DHCP client process. In dhcpd, when run in DHCPv4 or DHCPv6 mode: if the dhcpd server binary was built for a 32-bit architecture AND the -fstack-protection-strong flag was specified to the compiler, dhcpd may exit while parsing a lease file containing an objectionable lease, resulting in lack of service to clients. Additionally, the offending lease and the lease immediately following it in the lease database may be improperly deleted. if the dhcpd server binary was built for a 64-bit architecture OR if the -fstack-protection-strong compiler flag was NOT specified, the crash will not occur, but it is possible for the offending lease and the lease which immediately followed it to be improperly deleted. There is a discrepancy between the code that handles encapsulated option information in leases transmitted "on the wire" and the code which reads and parses lease information after it has been written to disk storage. The highest threat from this vulnerability is to data confidentiality and integrity as well as service availability. (CVE-2021-25217). Description:
Red Hat Advanced Cluster Management for Kubernetes 2.3.0 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in. See
the following Release Notes documentation, which will be updated shortly
for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.3/html/release_notes/
Security:
* fastify-reply-from: crafted URL allows prefix scape of the proxied
backend service (CVE-2021-21321)
* fastify-http-proxy: crafted URL allows prefix scape of the proxied
backend service (CVE-2021-21322)
* nodejs-netmask: improper input validation of octal input data
(CVE-2021-28918)
* redis: Integer overflow via STRALGO LCS command (CVE-2021-29477)
* redis: Integer overflow via COPY command for large intsets
(CVE-2021-29478)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions
(CVE-2020-28500)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing
- -u- extension (CVE-2020-28851)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing
bcp47 tag (CVE-2020-28852)
* nodejs-ansi_up: XSS due to insufficient URL sanitization (CVE-2021-3377)
* oras: zip-slip vulnerability via oras-pull (CVE-2021-21272)
* redis: integer overflow when configurable limit for maximum supported
bulk input size is too big on 32-bit platforms (CVE-2021-21309)
* nodejs-lodash: command injection via template (CVE-2021-23337)
* nodejs-hosted-git-info: Regular Expression denial of service via
shortcutMatch in fromUrl() (CVE-2021-23362)
* browserslist: parsing of invalid queries could result in Regular
Expression Denial of Service (ReDoS) (CVE-2021-23364)
* nodejs-postcss: Regular expression denial of service during source map
parsing (CVE-2021-23368)
* nodejs-handlebars: Remote code execution when compiling untrusted compile
templates with strict:true option (CVE-2021-23369)
* nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in
lib/previous-map.js (CVE-2021-23382)
* nodejs-handlebars: Remote code execution when compiling untrusted compile
templates with compat:true option (CVE-2021-23383)
* openssl: integer overflow in CipherUpdate (CVE-2021-23840)
* openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
(CVE-2021-23841)
* nodejs-ua-parser-js: ReDoS via malicious User-Agent header
(CVE-2021-27292)
* grafana: snapshot feature allow an unauthenticated remote attacker to
trigger a DoS via a remote API call (CVE-2021-27358)
* nodejs-is-svg: ReDoS via malicious string (CVE-2021-28092)
* nodejs-netmask: incorrectly parses an IP address that has octal integer
with invalid character (CVE-2021-29418)
* ulikunitz/xz: Infinite loop in readUvarint allows for denial of service
(CVE-2021-29482)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* nodejs-trim-newlines: ReDoS in .end() method (CVE-2021-33623)
* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe
(CVE-2021-23343)
* html-parse-stringify: Regular Expression DoS (CVE-2021-23346)
* openssl: incorrect SSLv2 rollback protection (CVE-2021-23839)
For more details about the security issues, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
pages listed in the References section.
Bugs:
* RFE Make the source code for the endpoint-metrics-operator public (BZ#
1913444)
* cluster became offline after apiserver health check (BZ# 1942589)
3. Bugs fixed (https://bugzilla.redhat.com/):
1913333 - CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension
1913338 - CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag
1913444 - RFE Make the source code for the endpoint-metrics-operator public
1921286 - CVE-2021-21272 oras: zip-slip vulnerability via oras-pull
1927520 - RHACM 2.3.0 images
1928937 - CVE-2021-23337 nodejs-lodash: command injection via template
1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions
1930294 - CVE-2021-23839 openssl: incorrect SSLv2 rollback protection
1930310 - CVE-2021-23841 openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
1930324 - CVE-2021-23840 openssl: integer overflow in CipherUpdate
1932634 - CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms
1936427 - CVE-2021-3377 nodejs-ansi_up: XSS due to insufficient URL sanitization
1939103 - CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string
1940196 - View Resource YAML option shows 404 error when reviewing a Subscription for an application
1940613 - CVE-2021-27292 nodejs-ua-parser-js: ReDoS via malicious User-Agent header
1941024 - CVE-2021-27358 grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call
1941675 - CVE-2021-23346 html-parse-stringify: Regular Expression DoS
1942178 - CVE-2021-21321 fastify-reply-from: crafted URL allows prefix scape of the proxied backend service
1942182 - CVE-2021-21322 fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service
1942589 - cluster became offline after apiserver health check
1943208 - CVE-2021-23362 nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl()
1944822 - CVE-2021-29418 nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character
1944827 - CVE-2021-28918 nodejs-netmask: improper input validation of octal input data
1945459 - CVE-2020-28469 nodejs-glob-parent: Regular expression denial of service
1948761 - CVE-2021-23369 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option
1948763 - CVE-2021-23368 nodejs-postcss: Regular expression denial of service during source map parsing
1954150 - CVE-2021-23382 nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js
1954368 - CVE-2021-29482 ulikunitz/xz: Infinite loop in readUvarint allows for denial of service
1955619 - CVE-2021-23364 browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS)
1956688 - CVE-2021-23383 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option
1956818 - CVE-2021-23343 nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe
1957410 - CVE-2021-29477 redis: Integer overflow via STRALGO LCS command
1957414 - CVE-2021-29478 redis: Integer overflow via COPY command for large intsets
1964461 - CVE-2021-33502 normalize-url: ReDoS for data URLs
1966615 - CVE-2021-33623 nodejs-trim-newlines: ReDoS in .end() method
1968122 - clusterdeployment fails because hiveadmission sc does not have correct permissions
1972703 - Subctl fails to join cluster, since it cannot auto-generate a valid cluster id
1983131 - Defragmenting an etcd member doesn't reduce the DB size (7.5GB) on a setup with ~1000 spoke clusters
5. 6 ELS) - i386, s390x, x86_64
3.
These packages include redhat-release-virtualization-host.
RHVH features a Cockpit user interface for monitoring the host's resources
and
performing administrative tasks. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied. Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
All OpenShift Container Platform 4.7 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster
- -between-minor.html#understanding-upgrade-channels_updating-cluster-between
- -minor
4. Solution:
For OpenShift Container Platform 4.7 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel
ease-notes.html
Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster
- -cli.html
5. =========================================================================
Ubuntu Security Notice USN-4969-2
May 27, 2021
isc-dhcp vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM
Summary:
DHCP could be made to crash if it received specially crafted network
traffic.
Software Description:
- isc-dhcp: DHCP server and client
Details:
USN-4969-1 fixed a vulnerability in DHCP. This update provides
the corresponding update for Ubuntu 14.04 ESM and 16.04 ESM.
Original advisory details:
Jon Franklin and Pawel Wieczorkiewicz discovered that DHCP incorrectly
handled lease file parsing. A remote attacker could possibly use this issue
to cause DHCP to crash, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 ESM:
isc-dhcp-client 4.3.3-5ubuntu12.10+esm1
isc-dhcp-server 4.3.3-5ubuntu12.10+esm1
Ubuntu 14.04 ESM:
isc-dhcp-client 4.2.4-7ubuntu12.13+esm1
isc-dhcp-server 4.2.4-7ubuntu12.13+esm1
In general, a standard system update will make all the necessary changes. 7.7) - ppc64, ppc64le, s390x, x86_64
3. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: dhcp security update
Advisory ID: RHSA-2021:2414-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2414
Issue date: 2021-06-14
CVE Names: CVE-2021-25217
=====================================================================
1. Summary:
An update for dhcp is now available for Red Hat Enterprise Linux 7.4
Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update
Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP
Solutions.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Server AUS (v. 7.4) - x86_64
Red Hat Enterprise Linux Server E4S (v. 7.4) - ppc64le, x86_64
Red Hat Enterprise Linux Server Optional AUS (v. 7.4) - x86_64
Red Hat Enterprise Linux Server Optional E4S (v. 7.4) - ppc64le, x86_64
Red Hat Enterprise Linux Server Optional TUS (v. 7.4) - x86_64
Red Hat Enterprise Linux Server TUS (v. 7.4) - x86_64
3. Description:
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows
individual devices on an IP network to get their own network configuration
information, including an IP address, a subnet mask, and a broadcast
address. The dhcp packages provide a relay agent and ISC DHCP service
required to enable and administer DHCP on a network.
Security Fix(es):
* dhcp: stack-based buffer overflow when parsing statements with
colon-separated hex digits in config or lease files in dhcpd and dhclient
(CVE-2021-25217)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1963258 - CVE-2021-25217 dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
6. Package List:
Red Hat Enterprise Linux Server AUS (v. 7.4):
Source:
dhcp-4.2.5-58.el7_4.5.src.rpm
x86_64:
dhclient-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-common-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-libs-4.2.5-58.el7_4.5.i686.rpm
dhcp-libs-4.2.5-58.el7_4.5.x86_64.rpm
Red Hat Enterprise Linux Server E4S (v. 7.4):
Source:
dhcp-4.2.5-58.el7_4.5.src.rpm
ppc64le:
dhclient-4.2.5-58.el7_4.5.ppc64le.rpm
dhcp-4.2.5-58.el7_4.5.ppc64le.rpm
dhcp-common-4.2.5-58.el7_4.5.ppc64le.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.ppc64le.rpm
dhcp-libs-4.2.5-58.el7_4.5.ppc64le.rpm
x86_64:
dhclient-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-common-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-libs-4.2.5-58.el7_4.5.i686.rpm
dhcp-libs-4.2.5-58.el7_4.5.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 7.4):
Source:
dhcp-4.2.5-58.el7_4.5.src.rpm
x86_64:
dhclient-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-common-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-libs-4.2.5-58.el7_4.5.i686.rpm
dhcp-libs-4.2.5-58.el7_4.5.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 7.4):
x86_64:
dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-devel-4.2.5-58.el7_4.5.i686.rpm
dhcp-devel-4.2.5-58.el7_4.5.x86_64.rpm
Red Hat Enterprise Linux Server Optional E4S (v. 7.4):
ppc64le:
dhcp-debuginfo-4.2.5-58.el7_4.5.ppc64le.rpm
dhcp-devel-4.2.5-58.el7_4.5.ppc64le.rpm
x86_64:
dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-devel-4.2.5-58.el7_4.5.i686.rpm
dhcp-devel-4.2.5-58.el7_4.5.x86_64.rpm
Red Hat Enterprise Linux Server Optional TUS (v. 7.4):
x86_64:
dhcp-debuginfo-4.2.5-58.el7_4.5.i686.rpm
dhcp-debuginfo-4.2.5-58.el7_4.5.x86_64.rpm
dhcp-devel-4.2.5-58.el7_4.5.i686.rpm
dhcp-devel-4.2.5-58.el7_4.5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-25217
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIVAwUBYMezctzjgjWX9erEAQg/cxAAph3Cp36Ed68IjSJH1glCDVVbNvKokeg/
Q3JxA6BIqimNoVv14IhjDS4wt7ZGCtp7rluumCjE7cMNvLcfRhUxoU9jvxAR4BK9
2N1H9/TCFgnqULCs8KqWs8rm2qtfSuSxs9hlgOUGVnUD4AXOFsynTZkYqS9JS3kM
yP+Uo+s+Dwz/Sq5oWU2vWrXx/yjce35UQU9WCOfk2Nat4T/GeCuoscp9cFlbgLFB
FFwyCr+Kv6rdfsn37TvOxLFqttz+2atJUPp0KrUNKosPIqp7KS8QfOALff8hqswc
TPlgmk55+I7v24zBzAiNidWqbpDVZnzOFH/R7yVtOA/N1Aq4pl9Wsh4tDnSxv+rc
NdA9GLhdk89OOvLbpJ1rc6hxa91qrf/jcUK1EoLUhgk+Z80o6h5HghboRgSrblS/
d3FA8xlk11AgUU8Y0upb2D0DyIol4jM53+P3dulBJ8IvBV4rREwBvxHyQwT+sG43
30Jz+UWiS6BKotLdiVNMMGUNdcBTtXnF31RXF2iY0fUq57IrEb4rl8h/5gQA0UVb
WWxqdbnKwVvxAu6nbp8XqZR4vl5LCuOohqZtPiUgVIo5Um8pYTxjUkV2+20Cm1+d
xJVCc/K3mzBkeaN66esB5vB5Okc3MzqqH4/WeI171cnFLArGddejORH21L6nAcP6
csJckOYTtLQ=
=NFTY
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
. 8.1) - aarch64, noarch, ppc64le, s390x, x86_64
3. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202305-22
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: ISC DHCP: Multiple Vulnerabilities
Date: May 03, 2023
Bugs: #875521, #792324
ID: 202305-22
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been discovered in ISC DHCP, the worst of
which could result in denial of service.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/dhcp < 4.4.3_p1 >= 4.4.3_p1
Description
===========
Multiple vulnerabilities have been discovered in ISC DHCP. Please review
the CVE identifiers referenced below for details.
Impact
======
Please review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All ISC DHCP users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/dhcp-4.4.3_p1"
References
==========
[ 1 ] CVE-2021-25217
https://nvd.nist.gov/vuln/detail/CVE-2021-25217
[ 2 ] CVE-2022-2928
https://nvd.nist.gov/vuln/detail/CVE-2022-2928
[ 3 ] CVE-2022-2929
https://nvd.nist.gov/vuln/detail/CVE-2022-2929
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202305-22
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2023 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
| VAR-202105-1625 | No CVE | Many Huawei products have weak password vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Huawei Technologies Co., Ltd. is a provider of ICT (Information and Communication) infrastructure and smart terminals.
Many Huawei products have weak password vulnerabilities. The attacker uses a weak password to log in to the background to obtain sensitive information.
| VAR-202105-1629 | No CVE | Unauthorized access vulnerability exists in HP Officejet Pro printer management page |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Hewlett-Packard Trading (Shanghai) Co., Ltd. was registered and established in the Free Trade Zone Market Supervision Administration on February 8, 1999. The company's business scope includes computer equipment, printing equipment, imaging equipment, electronic products and related parts and components of the above products.
An unauthorized access vulnerability exists in the HP Officejet Pro printer management page. Attackers can use the vulnerability to access the printer console interface to operate without logging in
| VAR-202105-1630 | No CVE | Samsung WLAN AP has weak password vulnerability (CNVD-2021-30051) |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of the end of 2008, 20 of Samsung's more than 30 companies have invested in China, including Samsung Electronics, Samsung SDI, Samsung SDS, and Samsung Electro-Mechanics.
Samsung WLAN AP has a command execution vulnerability. The attacker uses a weak password to log in to the background to obtain sensitive information.
| VAR-202105-1632 | No CVE | Samsung WLAN AP has a command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of the end of 2008, 20 of Samsung's more than 30 companies have invested in China, including Samsung Electronics, Samsung SDI, Samsung SDS, and Samsung Electro-Mechanics.
Samsung WLAN AP has a command execution vulnerability. An attacker can use this vulnerability to gain server permissions.
| VAR-202105-0855 | CVE-2021-30195 | CODESYS V2 runtime system Out-of-bounds read vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
CODESYS V2 runtime system before 2.4.7.55 has Improper Input Validation. CODESYS V2 runtime system Is vulnerable to an out-of-bounds read.Denial of service (DoS) It may be put into a state
| VAR-202105-0848 | CVE-2021-30188 | CODESYS V2 runtime system SP Out-of-bounds Vulnerability in Microsoft |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
CODESYS V2 runtime system SP before 2.4.7.55 has a Stack-based Buffer Overflow. CODESYS V2 runtime system SP Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state