VARIoT IoT vulnerabilities database
| VAR-202102-0682 | CVE-2021-1412 | Cisco Identity Services Engine Inappropriate permission setting vulnerability in |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Multiple vulnerabilities in the Admin portal of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information. These vulnerabilities are due to improper enforcement of administrator privilege levels for sensitive data. An attacker with read-only administrator access to the Admin portal could exploit these vulnerabilities by browsing to one of the pages that contains sensitive data. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system. For more information about these vulnerabilities, see the Details section of this advisory. The platform monitors the network by collecting real-time information on the network, users and devices, and formulating and implementing corresponding policies
| VAR-202102-0578 | CVE-2021-1351 | Cisco Webex Meetings Cross-site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of the affected service. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected service. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco Webex Meetings Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. There is a security vulnerability in Cisco Webex Meetings. Currently there is no information about this vulnerability. Please keep an eye on CNNVD or vendor announcements
| VAR-202102-0548 | CVE-2021-1372 | Cisco Webex Meetings Desktop Application and Windows for Webex Productivity Tools Vulnerability in leaking important information from data queries in |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
A vulnerability in Cisco Webex Meetings Desktop App and Webex Productivity Tools for Windows could allow an authenticated, local attacker to gain access to sensitive information on an affected system. This vulnerability is due to the unsafe usage of shared memory by the affected software. An attacker with permissions to view system memory could exploit this vulnerability by running an application on the local system that is designed to read shared memory. A successful exploit could allow the attacker to retrieve sensitive information from the shared memory, including usernames, meeting information, or authentication tokens. Note: To exploit this vulnerability, an attacker must have valid credentials on a Microsoft Windows end-user system and must log in after another user has already authenticated with Webex on the same end-user system. There is no information about this vulnerability at present. Please keep an eye on CNNVD or vendor announcements
| VAR-202102-0544 | CVE-2021-1366 | Windows for Cisco AnyConnect Secure Mobility Client Digital Signature Verification Vulnerability in |
CVSS V2: 6.9 CVSS V3: 7.8 Severity: HIGH |
A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the VPN Posture (HostScan) Module is installed on the AnyConnect client. This vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. To exploit this vulnerability, the attacker needs valid credentials on the Windows system. Windows for Cisco AnyConnect Secure Mobility Client Exists in a digital signature validation vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. There is a security vulnerability in Cisco AnyConnect Secure Mobility Client. There is no information about this vulnerability at present. Please keep an eye on CNNVD or vendor announcements
| VAR-202102-0264 | CVE-2020-24462 | Intel(R) Graphics Driver Out-of-bounds Vulnerability in Microsoft |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Out of bounds write in the Intel(R) Graphics Driver before version 15.33.53.5161, 15.36.40.5162, 15.40.47.5166, 15.45.33.5164 and 27.20.100.8336 may allow an authenticated user to potentially enable an escalation of privilege via local access. Intel(R) Graphics Driver Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. There is a security vulnerability in the Intel Graphics Driver. There is no information about this vulnerability at present. Please keep an eye on CNNVD or the manufacturer's announcement
| VAR-202102-0068 | CVE-2020-12362 | Windows and Linux for Intel(R) Graphics Drivers Integer overflow vulnerability in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access. There is a security vulnerability in Intel Graphics Drivers. There is no information about this vulnerability at present. Please pay attention to CNNVD or manufacturer announcements at any time. Description:
OpenShift Virtualization is Red Hat's virtualization solution designed for
Red Hat OpenShift Container Platform. Bugs fixed (https://bugzilla.redhat.com/):
1918750 - CVE-2021-3114 golang: crypto/elliptic: incorrect operations on the P-224 curve
1945703 - "Guest OS Info" availability in VMI describe is flaky
1958816 - [2.6.z] KubeMacPool fails to start due to OOM likely caused by a high number of Pods running in the cluster
1963275 - migration controller null pointer dereference
1965099 - Live Migration double handoff to virt-handler causes connection failures
1965181 - CDI importer doesn't report AwaitingVDDK like it used to
1967086 - Cloning DataVolumes between namespaces fails while creating cdi-upload pod
1967887 - [2.6.6] nmstate is not progressing on a node and not configuring vlan filtering that causes an outage for VMs
1969756 - Windows VMs fail to start on air-gapped environments
1970372 - Virt-handler fails to verify container-disk
1973227 - segfault in virt-controller during pdb deletion
1974084 - 2.6.6 containers
1975212 - No Virtual Machine Templates Found [EDIT - all templates are marked as depracted]
1975727 - [Regression][VMIO][Warm] The third precopy does not end in warm migration
1977756 - [2.6.z] PVC keeps in pending when using hostpath-provisioner
1982760 - [v2v] no kind VirtualMachine is registered for version \"kubevirt.io/v1\" i...
1986989 - OpenShift Virtualization 2.6.z cannot be upgraded to 4.8.0 initially deployed starting with <= 4.8
5. 8.1) - aarch64, noarch, ppc64le, s390x, x86_64
3.
Bug Fix(es):
* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to
add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930170)
* RHEL8.3 - Include patch: powerpc/pci: Remove LSI mappings on device
teardown (xive/pci) (BZ#1931926)
* [HPEMC 8.1 REGRESSION] skx_uncore: probe of 0008:80:08.0 failed with
error -22 (BZ#1947115)
* [Azure][RHEL-8]Mellanox Patches To Prevent Kernel Hang In MLX4
(BZ#1952072)
* [HPEMC 8.4 REGRESSION]: perf/x86/intel/uncore kernel panic vulnerability
on Haswell and Broadwell servers (BZ#1956686)
4. 6 ELS) - i386, s390x, x86_64
3. Summary:
Openshift Logging Bug Fix Release (5.0.4)
This release includes a security update. Solution:
For OpenShift Container Platform 4.7 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this errata update:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel
ease-notes.html
For Red Hat OpenShift Logging 5.0, see the following instructions to apply
this update:
https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-u
pgrading.html
4. Bugs fixed (https://bugzilla.redhat.com/):
1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
5. JIRA issues fixed (https://issues.jboss.org/):
LOG-1328 - Port fix to 5.0.z for BZ-1945168
6. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2021:2314-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2314
Issue date: 2021-06-08
CVE Names: CVE-2020-8648 CVE-2020-12362 CVE-2020-12363
CVE-2020-12364 CVE-2020-27170 CVE-2021-3347
=====================================================================
1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security Fix(es):
* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)
* kernel: Use after free via PI futex state (CVE-2021-3347)
* kernel: use-after-free in n_tty_receive_buf_common function in
drivers/tty/n_tty.c (CVE-2020-8648)
* kernel: Improper input validation in some Intel(R) Graphics Drivers
(CVE-2020-12363)
* kernel: Null pointer dereference in some Intel(R) Graphics Drivers
(CVE-2020-12364)
* kernel: Speculation on pointer arithmetic against bpf_context pointer
(CVE-2020-27170)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* kernel crash when call the timer function
(sctp_generate_proto_unreach_event) of sctp module (BZ#1707184)
* SCSI error handling process on HP P440ar controller gets stuck
indefinitely in device reset operation (BZ#1830268)
* netfilter: reproducible deadlock on nft_log module autoload (BZ#1858329)
* netfilter: NULL pointer dereference in nf_tables_set_lookup()
(BZ#1873171)
* [DELL EMC 7.9 Bug]: No acpi_pad threads on top command for "power cap
policy equal to 0 watts" (BZ#1883174)
* A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e
driver causes a use after free condition of the kmalloc-4096 slab cache.
(BZ#1886003)
* netxen driver performs poorly with RT kernel (BZ#1894274)
* gendisk->disk_part_tbl->last_lookup retains pointer after partition
deletion (BZ#1898596)
* Kernel experiences panic in update_group_power() due to division error
even with Bug 1701115 fix (BZ#1910763)
* RHEL7.9 - zfcp: fix handling of FCP_RESID_OVER bit in fcp ingress path
(BZ#1917839)
* RHEL7.9 - mm/THP: do not access vma->vm_mm after calling handle_userfault
(BZ#1917840)
* raid: wrong raid io account (BZ#1927106)
* qla2x00_status_cont_entry() missing upstream patch that prevents
unnecessary ABRT/warnings (BZ#1933784)
* RHEL 7.9.z - System hang caused by workqueue stall in qla2xxx driver
(BZ#1937945)
* selinux: setsebool can trigger a deadlock (BZ#1939091)
* [Hyper-V][RHEL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on
Hyper-V (BZ#1941841)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1802559 - CVE-2020-8648 kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c
1922249 - CVE-2021-3347 kernel: Use after free via PI futex state
1930246 - CVE-2020-12362 kernel: Integer overflow in Intel(R) Graphics Drivers
1930249 - CVE-2020-12363 kernel: Improper input validation in some Intel(R) Graphics Drivers
1930251 - CVE-2020-12364 kernel: Null pointer dereference in some Intel(R) Graphics Drivers
1940627 - CVE-2020-27170 kernel: Speculation on pointer arithmetic against bpf_context pointer
1941841 - [Hyper-V][RHEL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on Hyper-V
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
kernel-3.10.0-1160.31.1.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm
kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm
x86_64:
bpftool-3.10.0-1160.31.1.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm
perf-3.10.0-1160.31.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
python-perf-3.10.0-1160.31.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
kernel-3.10.0-1160.31.1.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm
kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm
x86_64:
bpftool-3.10.0-1160.31.1.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm
perf-3.10.0-1160.31.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
python-perf-3.10.0-1160.31.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
kernel-3.10.0-1160.31.1.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm
kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm
ppc64:
bpftool-3.10.0-1160.31.1.el7.ppc64.rpm
bpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-bootwrapper-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-debug-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-debug-devel-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-devel-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-headers-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-tools-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-tools-libs-3.10.0-1160.31.1.el7.ppc64.rpm
perf-3.10.0-1160.31.1.el7.ppc64.rpm
perf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm
python-perf-3.10.0-1160.31.1.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm
ppc64le:
bpftool-3.10.0-1160.31.1.el7.ppc64le.rpm
bpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-bootwrapper-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-debug-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-devel-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-headers-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-tools-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-tools-libs-3.10.0-1160.31.1.el7.ppc64le.rpm
perf-3.10.0-1160.31.1.el7.ppc64le.rpm
perf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm
python-perf-3.10.0-1160.31.1.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm
s390x:
bpftool-3.10.0-1160.31.1.el7.s390x.rpm
bpftool-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm
kernel-3.10.0-1160.31.1.el7.s390x.rpm
kernel-debug-3.10.0-1160.31.1.el7.s390x.rpm
kernel-debug-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm
kernel-debug-devel-3.10.0-1160.31.1.el7.s390x.rpm
kernel-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm
kernel-debuginfo-common-s390x-3.10.0-1160.31.1.el7.s390x.rpm
kernel-devel-3.10.0-1160.31.1.el7.s390x.rpm
kernel-headers-3.10.0-1160.31.1.el7.s390x.rpm
kernel-kdump-3.10.0-1160.31.1.el7.s390x.rpm
kernel-kdump-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm
kernel-kdump-devel-3.10.0-1160.31.1.el7.s390x.rpm
perf-3.10.0-1160.31.1.el7.s390x.rpm
perf-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm
python-perf-3.10.0-1160.31.1.el7.s390x.rpm
python-perf-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm
x86_64:
bpftool-3.10.0-1160.31.1.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm
perf-3.10.0-1160.31.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
python-perf-3.10.0-1160.31.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
bpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm
kernel-tools-libs-devel-3.10.0-1160.31.1.el7.ppc64.rpm
perf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm
ppc64le:
bpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-debug-devel-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm
kernel-tools-libs-devel-3.10.0-1160.31.1.el7.ppc64le.rpm
perf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm
x86_64:
bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
kernel-3.10.0-1160.31.1.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm
kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm
x86_64:
bpftool-3.10.0-1160.31.1.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm
perf-3.10.0-1160.31.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
python-perf-3.10.0-1160.31.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-8648
https://access.redhat.com/security/cve/CVE-2020-12362
https://access.redhat.com/security/cve/CVE-2020-12363
https://access.redhat.com/security/cve/CVE-2020-12364
https://access.redhat.com/security/cve/CVE-2020-27170
https://access.redhat.com/security/cve/CVE-2021-3347
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIVAwUBYL/x1NzjgjWX9erEAQijGA//bxt7JJkdkIO3eT3vTQ6mYtMErGKBVx8A
sI+zjh/mYmaocA6UrE88bV1ixfJ2xknb9HfFBjQywPAiqTiRXHUyiL24IyGe5Lit
WkPjLRDHCb/q56rl1EGkyr3noikZCNuNF9HOf8PHukJmLqD6iLWWws8J0knY9QyR
/8scePwyCR4wqr2ru5etg5TKx+pkOY+Dfnwhgy6U2thQI58/Flvn7GyOBvSG69M8
6gewtkav1Fnw7WlLT386OjrAajBw6Pd9xee+S7T9qFv/BfC5k0HA26qbnMaAfzle
YKXmjoIV7ExiszvspqZgdlsg0835BUALUIikbpnTvh7Kl2MY2BhBIqJvKOWeT3Mp
VIpkMs4HVALkHoDqzYDZx8WKEy0hrDAjczT+aWtvXJmHEBmsHEx5Ny8tvYk1w3t/
cNVvfj+EqFaSY1GSNY1MG2ZDzIDYWrx+rGKA7tgqtwSlCdYEbORlXCDu+W8+c7Xg
g1vE8kfpkbxyLpvlJ0iOWoLiOCCrZ04fiXXhgSn9O1/zmOwkijFHk5x/aFDEoyBE
O/s2rawA1cADPiLTxGWU9/MITpQuS+FuAc235HT8VRSXvsV3ZHB36N1z4JZcPB5P
FN8hH+ibnEOlpKC7YOE9K4eQ/jG1etWhVWctf7HcP2nbQSpiiZQoQGPznvt+6OKQ
XAOam1B//x4=
=HTlr
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
. 7) - noarch, x86_64
3. Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables
fine-tuning for systems with extremely high determinism requirements.
Bug Fix(es):
* kernel-rt: update RT source tree to the latest RHEL-8.2.z9 Batch source
tree (BZ#1949685)
4
| VAR-202102-0680 | CVE-2020-7848 | EFM ipTIME C200 IP Camera Command injection vulnerability |
CVSS V2: 7.7 CVSS V3: 8.0 Severity: HIGH |
The EFM ipTIME C200 IP Camera is affected by a Command Injection vulnerability in /login.cgi?logout=1 script. To exploit this vulnerability, an attacker can send a GET request that executes arbitrary OS commands via cookie value
| VAR-202102-0496 | CVE-2021-20655 | FileZen OS command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
FileZen (V3.0.0 to V4.2.7 and V5.0.0 to V5.0.2) allows a remote attacker with administrator rights to execute arbitrary OS commands via unspecified vectors. FileZen is a device for secure file transfer and sharing via email or web interface.
FileZen 3.0.0-4.2.7, 5.0.0-5.0.2 have OS command injection vulnerabilities
| VAR-202102-0020 | CVE-2020-13550 | Advantech WebAccess/SCADA Traversal Vulnerability in Japan |
CVSS V2: 4.0 CVSS V3: 7.7 Severity: HIGH |
A local file inclusion vulnerability exists in the installation functionality of Advantech WebAccess/SCADA 9.0.1. A specially crafted application can lead to information disclosure. An attacker can send an authenticated HTTP request to trigger this vulnerability. Advantech WebAccess/SCADA Contains a path traversal vulnerability.Information may be obtained. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment. There is a path traversal vulnerability in Advantech WebAccess/SCADA, which originates from the failure of network systems or products to properly filter resources or special elements in file paths. An attacker could exploit this vulnerability to access locations outside of restricted directories
| VAR-202102-0021 | CVE-2020-13551 | Advantech WebAccess/SCADA Vulnerability in privilege management |
CVSS V2: 7.2 CVSS V3: 8.8 Severity: HIGH |
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In privilege escalation via PostgreSQL executable, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment
| VAR-202102-0904 | CVE-2021-20071 | Racom's MIDGE Firmware Cross-site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows attackers to conduct cross-site scriptings attacks via the sms.php dialogs. RACOM M!DGE is a cellular router designed for mission-critical applications such as SCADA and telemetry, and is very suitable for many different wireless applications. Attackers can use this vulnerability to execute javascript code through sms.php
| VAR-202102-0908 | CVE-2021-20075 | Racom's MIDGE Firmware Vulnerability in privilege management |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows for privilege escalation via configd. Racom's MIDGE Firmware Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. RACOM M!DGE is a cellular router designed for mission-critical applications such as SCADA and telemetry, and is very suitable for many different wireless applications. Attackers can use this vulnerability to elevate permissions through configd
| VAR-202102-0906 | CVE-2021-20073 | Racom MIDGE Cross-site request forgery vulnerability in firmware |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows for cross-site request forgeries. Racom MIDGE A cross-site request forgery vulnerability exists in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. RACOM M!DGE is a cellular router designed for mission-critical applications such as SCADA and telemetry, and is very suitable for many different wireless applications. No detailed vulnerability details are currently provided
| VAR-202102-0907 | CVE-2021-20074 | Racom MIDGE In firmware OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows users to escape the provided command line interface and execute arbitrary OS commands. Racom MIDGE For firmware, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. RACOM M!DGE is a cellular router designed for mission-critical applications such as SCADA and telemetry, and is very suitable for many different wireless applications. Attackers can use this vulnerability to execute arbitrary OS commands
| VAR-202102-0905 | CVE-2021-20072 | Racom MIDGE Privilege management vulnerabilities in firmware |
CVSS V2: 8.7 CVSS V3: 7.2 Severity: HIGH |
Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows attackers to arbitrarily access and delete files via an authenticated directory traveral. Racom MIDGE There is a permission management vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. RACOM M!DGE is a cellular router designed for mission-critical applications such as SCADA and telemetry, and is very suitable for many different wireless applications.
RACOM M!DGE version 4.4.40.105 firmware has a directory traversal vulnerability
| VAR-202102-0901 | CVE-2021-20068 | Racom's MIDGE Firmware Cross-site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows attackers to conduct cross-site scripting attacks via the error handling functionality of web pages. RACOM M!DGE is a cellular router designed for mission-critical applications such as SCADA and telemetry, and is very suitable for many different wireless applications
| VAR-202102-0902 | CVE-2021-20069 | Racom's MIDGE Firmware Cross-site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows attackers to conduct cross-site scripting attacks via the regionalSettings.php dialogs. RACOM M!DGE is a cellular router designed for mission-critical applications such as SCADA and telemetry, and is very suitable for many different wireless applications. Attackers can use this vulnerability to execute JavaScript code through regionalSettings.php
| VAR-202102-0023 | CVE-2020-13553 | Advantech WebAccess/SCADA Vulnerability in privilege management |
CVSS V2: 7.2 CVSS V3: 8.8 Severity: HIGH |
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment
| VAR-202102-0022 | CVE-2020-13552 | Advantech WebAccess/SCADA Vulnerability in privilege management |
CVSS V2: 7.2 CVSS V3: 8.8 Severity: HIGH |
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In privilege escalation via multiple service executables in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment
| VAR-202102-0024 | CVE-2020-13555 | Advantech WebAccess/SCADA Vulnerability in privilege management |
CVSS V2: 7.2 CVSS V3: 8.8 Severity: HIGH |
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In COM Server Application Privilege Escalation, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege. Advantech WebAccess/SCADA Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Advantech. The software supports dynamic graphic display and real-time data control, and provides functions for remote control and management of automation equipment