VARIoT IoT vulnerabilities database
| VAR-202103-1777 | No CVE | China Mobile GM620 has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
GM620 is an optical cat device of China Mobile.
China Mobile GM620 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service attack.
| VAR-202103-1747 | No CVE | An unauthorized access vulnerability exists in the energy information management system of Chongqing Jutai Internet of Things Group Co., Ltd. (CNVD-2021-10512) |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Chongqing Jutai Internet of Things Group Co., Ltd. is a company engaged in the R&D, production, sales and computer system integration of the software and hardware of Internet of Things products.
An unauthorized access vulnerability exists in the energy information management system of Chongqing Jutai Internet of Things Group Co., Ltd. Attackers can use vulnerabilities to obtain sensitive information.
| VAR-202103-1748 | No CVE | An SQL injection vulnerability exists in the energy information management system of Chongqing Jutai Internet of Things Group Co., Ltd. (CNVD-2021-10513) |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Chongqing Jutai Internet of Things Group Co., Ltd. is a company engaged in the R&D, production, sales and computer system integration of the software and hardware of Internet of Things products.
An SQL injection vulnerability exists in the energy information management system of Chongqing Jutai Internet of Things Group Co., Ltd. Attackers can use vulnerabilities to obtain sensitive information in the database.
| VAR-202103-1675 | No CVE | FAX1800R Gigabit Edition has a denial of service vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
FAX1800R Gigabit Edition is a Wi-Fi 6 wireless router.
FAX1800R Gigabit Edition has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service attack.
| VAR-202103-1676 | No CVE | Skyworth home gateway smart terminal DT741-csg has a denial of service vulnerability (CNVD-2021-10397) |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Skyworth Digital Co., Ltd. (hereinafter referred to as "Skyworth Digital") is a national high-tech enterprise focusing on providing comprehensive and systematic digital home solutions and services for global users.
Skyworth home gateway smart terminal DT741-csg has a denial of service vulnerability. Attackers can use this vulnerability to cause a denial of service attack.
| VAR-202103-1677 | No CVE | Skyworth home gateway smart terminal DT541-csg has a denial of service vulnerability (CNVD-2021-10398) |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Skyworth Digital Co., Ltd. (hereinafter referred to as "Skyworth Digital") is a national high-tech enterprise focusing on providing comprehensive and systematic digital home solutions and services for global users.
Skyworth home gateway smart terminal DT541-csg has a denial of service vulnerability. Attackers can use this vulnerability to cause a denial of service attack.
| VAR-202103-1678 | No CVE | Skyworth home gateway smart terminal DT541 has a denial of service vulnerability (CNVD-2021-10399) |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Skyworth Digital Co., Ltd. (hereinafter referred to as "Skyworth Digital") is a national high-tech enterprise focusing on providing comprehensive and systematic digital home solutions and services for global users.
Skyworth home gateway smart terminal DT541 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service attack.
| VAR-202103-1679 | No CVE | Skyworth home gateway smart terminal DT521 has a denial of service vulnerability (CNVD-2021-10400) |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Skyworth Digital Co., Ltd. (hereinafter referred to as "Skyworth Digital") is a national high-tech enterprise focusing on providing comprehensive and systematic digital home solutions and services for global users.
Skyworth home gateway smart terminal DT521 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service attack.
| VAR-202103-1680 | No CVE | Skyworth home gateway smart terminal DT720-cs has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Skyworth Digital Co., Ltd. (hereinafter referred to as "Skyworth Digital") is a national high-tech enterprise focusing on providing comprehensive and systematic digital home solutions and services for global users.
Skyworth home gateway smart terminal DT720-cs has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service attack.
| VAR-202103-1681 | No CVE | Huawei HG8346M FTTH has a denial of service vulnerability |
CVSS V2: 3.3 CVSS V3: - Severity: LOW |
HG8346M is a Huawei router.
Huawei HG8346M FTTH has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service attack.
| VAR-202103-1682 | No CVE | MERCURY MR108GP-AC V2.0 has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
MR108GP-AC is an enterprise-level router of Shenzhen Meikexing Communication Technology Co., Ltd.
MERCURY MR108GP-AC V2.0 has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service attack.
| VAR-202103-1683 | No CVE | MERCURY MR100GP-AC V2.0 has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
MR100GP-AC is an enterprise-level router of Shenzhen Meikexing Communication Technology Co., Ltd.
MERCURY MR100GP-AC V2.0 has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service attack.
| VAR-202103-1686 | No CVE | MERCURY X188G has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
X188G is a router.
MERCURY X188G has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service attack.
| VAR-202103-1688 | No CVE | TP-Link TL-R479G has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
TL-R479G is an enterprise VPN router of Prolink Technology Co., Ltd.
TP-Link TL-R479G has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service attack.
| VAR-202103-1689 | No CVE | TP-Link TL-XDR5430 has a denial of service vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
TL-XDR5430 is a router of TP-Link.
TP-Link TL-XDR5430 has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service attack.
| VAR-202103-0226 | CVE-2020-28466 | nats-server Vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
This affects all versions of package github.com/nats-io/nats-server/server. Untrusted accounts are able to crash the server using configs that represent a service export/import cycles. Disclaimer from the maintainers: Running a NATS service which is exposed to untrusted users presents a heightened risk. Any remote execution flaw or equivalent seriousness, or denial-of-service by unauthenticated users, will lead to prompt releases by the NATS maintainers. Fixes for denial of service issues with no threat of remote execution, when limited to account holders, are likely to just be committed to the main development branch with no special attention. Those who are running such services are encouraged to build regularly from git. nats-server Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state
| VAR-202103-0661 | CVE-2020-5014 | IBM DataPower Gateway Server-side request forgery vulnerability in |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
IBM DataPower Gateway V10 and V2018 could allow a local attacker with administrative privileges to execute arbitrary code on the system using a server-side requesr forgery attack. IBM X-Force ID: 193247. IBM DataPower Gateway Contains a server-side request forgery vulnerability. Vendor exploits this vulnerability IBM X-Force ID: 193247 It is published as.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. IBM DataPower Gateway is a security and integration platform specially designed for mobile, cloud, application programming interface (API), network, service-oriented architecture (SOA), B2B and cloud workloads. The platform secures, integrates and optimizes access across channels with a dedicated gateway platform
| VAR-202103-0920 | CVE-2021-27363 | Linux Kernel Vulnerability in |
CVSS V2: 3.6 CVSS V3: 4.4 Severity: MEDIUM |
An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables. Linux Kernel Contains an unspecified vulnerability.Information is obtained and denial of service (DoS) It may be put into a state. Description:
Red Hat Advanced Cluster Management for Kubernetes 2.2.2 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in. See
the following Release Notes documentation, which will be updated shortly
for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.2/html/release_notes/
Security Fix(es):
* fastify-reply-from: crafted URL allows prefix scape of the proxied
backend service (CVE-2021-21321)
* fastify-http-proxy: crafted URL allows prefix scape of the proxied
backend service (CVE-2021-21322)
* golang.org/x/text: possibility to trigger an infinite loop in
encoding/unicode could lead to crash (CVE-2020-14040)
* nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions
(CVE-2020-28500)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing
- -u- extension (CVE-2020-28851)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing
bcp47 tag (CVE-2020-28852)
* go-slug: partial protection against zip slip attacks (CVE-2020-29529)
* nodejs-lodash: command injection via template (CVE-2021-23337)
* openssl: integer overflow in CipherUpdate (CVE-2021-23840)
* openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
(CVE-2021-23841)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* Documentation is referencing deprecated API for Service Export -
Submariner (BZ#1936528)
* Importing of cluster fails due to error/typo in generated command
(BZ#1936642)
* RHACM 2.2.2 images (BZ#1938215)
* 2.2 clusterlifecycle fails to allow provision `fips: true` clusters on
aws, vsphere (BZ#1941778)
3. Bugs fixed (https://bugzilla.redhat.com/):
1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
1913333 - CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension
1913338 - CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag
1914238 - CVE-2020-29529 go-slug: partial protection against zip slip attacks
1928937 - CVE-2021-23337 nodejs-lodash: command injection via template
1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions
1930310 - CVE-2021-23841 openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
1930324 - CVE-2021-23840 openssl: integer overflow in CipherUpdate
1936528 - Documentation is referencing deprecated API for Service Export - Submariner
1936642 - Importing of cluster fails due to error/typo in generated command
1938215 - RHACM 2.2.2 images
1941778 - 2.2 clusterlifecycle fails to allow provision `fips: true` clusters on aws, vsphere
1942178 - CVE-2021-21321 fastify-reply-from: crafted URL allows prefix scape of the proxied backend service
1942182 - CVE-2021-21322 fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service
5. Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables
fine-tuning for systems with extremely high determinism requirements.
Bug Fix(es):
* kernel-rt: update RT source tree to the latest RHEL-8.2.z8 Batch source
tree (BZ#1916765)
4. 7.6) - ppc64, ppc64le, x86_64
3.
Bug Fix(es):
* [infiniband] Backport Request to fix Multicast Sendonly joins
(BZ#1937820)
4. =========================================================================
Ubuntu Security Notice USN-4901-1
April 06, 2021
linux-lts-trusty vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-27365)
It was discovered that the LIO SCSI target implementation in the Linux
kernel performed insufficient identifier checking in certain XCOPY
requests. An attacker with access to at least one LUN in a multiple
backstore environment could use this to expose sensitive information or
modify data. (CVE-2020-28374)
Adam Nichols discovered that the iSCSI subsystem in the Linux kernel did
not properly restrict access to iSCSI transport handles. A local attacker
could use this to cause a denial of service or expose sensitive information
(kernel pointer addresses). A local attacker could use this to cause a
denial of service (system crash) or expose sensitive information (kernel
memory). (CVE-2021-27364)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
linux-image-3.13.0-185-generic 3.13.0-185.236~12.04.1
linux-image-generic-lts-trusty 3.13.0.185.170
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2021:1071-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:1071
Issue date: 2021-04-06
CVE Names: CVE-2021-27363 CVE-2021-27364 CVE-2021-27365
====================================================================
1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3.
Security Fix(es):
* kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)
* kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)
* kernel: iscsi: unrestricted access to sessions and handles
(CVE-2021-27363)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* Customer testing eMMC sees and intermittent boot problem on 7.8+, was not
seen on 7.3 (BZ#1918916)
* tcm loopback driver causes double-start of scsi command when work is
delayed (BZ#1925652)
* [Azure][RHEL-7]Mellanox Patches To Prevent Kernel Hang In MLX4
(BZ#1925691)
* A patch from upstream c365c292d059 causes us to end up leaving
rt_nr_boosted in an inconsistent state, which causes a hard lockup.
(BZ#1928082)
* [RHEL7.9.z] Add fix to update snd_wl1 in bulk receiver fast path
(BZ#1929804)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1930078 - CVE-2021-27365 kernel: heap buffer overflow in the iSCSI subsystem
1930079 - CVE-2021-27363 kernel: iscsi: unrestricted access to sessions and handles
1930080 - CVE-2021-27364 kernel: out-of-bounds read in libiscsi module
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
kernel-3.10.0-1160.24.1.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-1160.24.1.el7.noarch.rpm
kernel-doc-3.10.0-1160.24.1.el7.noarch.rpm
x86_64:
bpftool-3.10.0-1160.24.1.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debug-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-devel-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-headers-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.24.1.el7.x86_64.rpm
perf-3.10.0-1160.24.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
python-perf-3.10.0-1160.24.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
bpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.24.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
kernel-3.10.0-1160.24.1.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-1160.24.1.el7.noarch.rpm
kernel-doc-3.10.0-1160.24.1.el7.noarch.rpm
x86_64:
bpftool-3.10.0-1160.24.1.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debug-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-devel-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-headers-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.24.1.el7.x86_64.rpm
perf-3.10.0-1160.24.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
python-perf-3.10.0-1160.24.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
bpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.24.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
kernel-3.10.0-1160.24.1.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-1160.24.1.el7.noarch.rpm
kernel-doc-3.10.0-1160.24.1.el7.noarch.rpm
ppc64:
bpftool-3.10.0-1160.24.1.el7.ppc64.rpm
bpftool-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-bootwrapper-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-debug-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-debug-devel-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-devel-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-headers-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-tools-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-tools-libs-3.10.0-1160.24.1.el7.ppc64.rpm
perf-3.10.0-1160.24.1.el7.ppc64.rpm
perf-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm
python-perf-3.10.0-1160.24.1.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm
ppc64le:
bpftool-3.10.0-1160.24.1.el7.ppc64le.rpm
bpftool-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-bootwrapper-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-debug-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-devel-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-headers-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-tools-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-tools-libs-3.10.0-1160.24.1.el7.ppc64le.rpm
perf-3.10.0-1160.24.1.el7.ppc64le.rpm
perf-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm
python-perf-3.10.0-1160.24.1.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm
s390x:
bpftool-3.10.0-1160.24.1.el7.s390x.rpm
bpftool-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm
kernel-3.10.0-1160.24.1.el7.s390x.rpm
kernel-debug-3.10.0-1160.24.1.el7.s390x.rpm
kernel-debug-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm
kernel-debug-devel-3.10.0-1160.24.1.el7.s390x.rpm
kernel-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm
kernel-debuginfo-common-s390x-3.10.0-1160.24.1.el7.s390x.rpm
kernel-devel-3.10.0-1160.24.1.el7.s390x.rpm
kernel-headers-3.10.0-1160.24.1.el7.s390x.rpm
kernel-kdump-3.10.0-1160.24.1.el7.s390x.rpm
kernel-kdump-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm
kernel-kdump-devel-3.10.0-1160.24.1.el7.s390x.rpm
perf-3.10.0-1160.24.1.el7.s390x.rpm
perf-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm
python-perf-3.10.0-1160.24.1.el7.s390x.rpm
python-perf-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm
x86_64:
bpftool-3.10.0-1160.24.1.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debug-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-devel-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-headers-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.24.1.el7.x86_64.rpm
perf-3.10.0-1160.24.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
python-perf-3.10.0-1160.24.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
bpftool-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm
kernel-tools-libs-devel-3.10.0-1160.24.1.el7.ppc64.rpm
perf-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm
ppc64le:
bpftool-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-debug-devel-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm
kernel-tools-libs-devel-3.10.0-1160.24.1.el7.ppc64le.rpm
perf-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm
x86_64:
bpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.24.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
kernel-3.10.0-1160.24.1.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-1160.24.1.el7.noarch.rpm
kernel-doc-3.10.0-1160.24.1.el7.noarch.rpm
x86_64:
bpftool-3.10.0-1160.24.1.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debug-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-devel-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-headers-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.24.1.el7.x86_64.rpm
perf-3.10.0-1160.24.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
python-perf-3.10.0-1160.24.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
bpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.24.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-27363
https://access.redhat.com/security/cve/CVE-2021-27364
https://access.redhat.com/security/cve/CVE-2021-27365
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIVAwUBYGwp7tzjgjWX9erEAQgQXQ//b1YLCLj3RXDop9pRP30zQj7xj3xDYBK5
7FLTR7K6HVYynrzKBJ87TyJkuhaPpTi8452HYHjLaYt6VYa+j1Jr+PVQr+ZaO+Rz
iSRl3Sr5NYynAt9g2vNp6tfeeYPddVSpDpxkUr84EDRZ9Jg8tYtLkanRT9cH02gs
+TYPCUZn/2Ii6YQjksIZmv6VVUZepMaO/kDDEi89ivGCffaMvS70Z86498XawgeM
eJttBvztEv5K6wvaRtnJegmeonYKxouP1FYDyXh+WAG6zjQDcUEWUKgwdGGn+mXb
k4T6F/ktCAx7wSKgt4kMvVmvzOc5jScJ2V0aK3rvm5LnqHoNin5syGOIHm6BM5Jp
KTO6MGa9ex7xQdz/pNU/4aqxtKK0G4ceL8xjEGpei5U0gIEXuK4KFySa1bDQa2Xd
eN2VtwzajY2tvCe7FrKuwKGb6HyIQK39C8hUHsD2x+JwLCxb12DWBY0ulJzh2C2l
LPwWFWMhJqH2GG2wIKh6msCQOMJOGO3zwLtkGMj5dXrmDBHhkkT1FZnL0DdDxL3m
JGija+Tr50EFGBFZvS1brChBEqwHqklkUQ3nWVXDj8ipRXJMOOGHbssw9FqnX01B
qF414rmDTU1tBHc7bPo8/q5zMXKV5vOixRplzs0sw0hlBJKjvlpVpDMiseo3crlj
ghAOW9EzFXk=pxZs
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
| VAR-202103-1684 | No CVE | Huawei-China Telecom GPON/EPON routers have arbitrary file download vulnerabilities |
CVSS V2: 1.4 CVSS V3: - Severity: LOW |
Founded in 1987, Huawei is a provider of ICT (information and communications) infrastructure and smart terminals.
The Huawei-China Telecom GPON/EPON router integrated machine has arbitrary file download vulnerabilities. Attackers can use vulnerabilities to obtain sensitive information.
| VAR-202103-1685 | No CVE | Multiple LB-LINK routers have logic vulnerabilities |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
BL-X22, BL-X16 and BL-X12 are all wireless routers of Shenzhen Bilian Electronics Co., Ltd.
Many LB-LINK routers have logic loopholes. Attackers can use vulnerabilities to modify user passwords, wifi passwords and other information.