VARIoT IoT vulnerabilities database

VAR-202011-0207 | CVE-2020-11155 | plural Qualcomm Classic buffer overflow vulnerability in the product |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
u'Buffer overflow while processing PDU packet in bluetooth due to lack of check of buffer length before copying into it.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8053, QCA6390, QCN7605, QCN7606, SA415M, SA515M, SA6155P, SA8155P, SC8180X, SDX55. plural Qualcomm The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202011-0206 | CVE-2020-11154 | plural Qualcomm Classic buffer overflow vulnerability in the product |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
u'Buffer overflow while processing a crafted PDU data packet in bluetooth due to lack of check of buffer size before copying' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8053, QCA6390, QCN7605, QCN7606, SA415M, SA515M, SA6155P, SA8155P, SC8180X, SDX55. plural Qualcomm The product contains a classic buffer overflow vulnerability.Information is obtained and denial of service (DoS) It may be put into a state
VAR-202011-0060 | CVE-2020-11141 | plural Qualcomm Product input verification vulnerabilities |
CVSS V2: 4.8 CVSS V3: 8.1 Severity: HIGH |
u'Buffer over-read issue in Bluetooth estack due to lack of check for invalid length of L2cap configuration request received from peer device.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8053, QCA6390, QCN7605, SA415M, SA515M, SC8180X, SDX55, SM8250. plural Qualcomm The product contains an input verification vulnerability.Information is obtained and denial of service (DoS) It may be put into a state
VAR-202010-1455 | CVE-2020-4528 | IBM DataPower Gateway Information Disclosure Vulnerability |
CVSS V2: 1.9 CVSS V3: 5.5 Severity: MEDIUM |
IBM MQ Appliance (IBM DataPower Gateway 10.0.0.0 and 2018.4.1.0 through 2018.4.1.12) could allow a local user, under special conditions, to obtain highly sensitive information from log files. IBM X-Force ID: 182658. IBM DataPower Gateway Contains an information disclosure vulnerability. Vendor is responsible for this vulnerability IBM X-Force ID: 182658 Is published as.Information may be obtained. IBM MQ (IBM WebSphere MQ) and others are products of IBM Corporation in the United States. IBM MQ is a messaging middleware product. IBM DataPower Gateway is a secure and integrated platform designed for mobile, cloud, application programming interface (API), web, service-oriented architecture (SOA), B2B and cloud workloads. IBM MQ Appliance is an all-in-one device for rapid deployment of enterprise-level message middleware. This vulnerability number has been assigned, and the vulnerability details will be updated soon
VAR-202010-1618 | No CVE | Advantech (China) Co., Ltd. EKI-1521 has a command execution vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
EKI-1521 is a serial device networking server supporting RS-232/422/485.
Advantech (China) Co., Ltd. EKI-1521 has a command execution vulnerability. Attackers can use the vulnerability to remotely execute system commands.
VAR-202010-1619 | No CVE | P-660HW-T1 of Zhongqin Communication Equipment Trading (Shanghai) Co., Ltd. has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
P-660HW-T1 is a wireless router product of Zhongqin Communication Equipment Trading (Shanghai) Co., Ltd.
Zhongqin Communication Equipment Trading (Shanghai) Co., Ltd. P-660HW-T1 has a weak password vulnerability. Attackers can use the vulnerability to pass
Connect to P-660HW-T1 (v3) and perform any operation under root authority to obtain sensitive information.
VAR-202010-1659 | No CVE | Shanghai ZLAN Information Technology Co., Ltd. ZLAN5102-3/ZLAN5102/ZLAN5103 common single serial server has a denial of service vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Shanghai ZLAN Information Technology Co., Ltd. is a high-tech enterprise that provides industrial Internet of Things solutions. Founded in 2008, its products include: serial server, Internet of Things chips, serial to Ethernet, etc.
Shanghai ZLAN Information Technology Co., Ltd. ZLAN5102-3/ZLAN5102/ZLAN5103 common single serial port server has a denial of service vulnerability. Attackers can use this vulnerability to cause the program to crash.
VAR-202010-1623 | No CVE | Fiberhome FR2600 series routers have logic flaws and vulnerabilities |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Fengine FR2600 series integrated service access router (hereinafter referred to as FR2600) is a new generation of switching access router platform created by Fiberhome using the industry's new hardware design architecture. FR2600 has powerful processing capabilities and expansion capabilities, rich software functions and hardware modules, and has a wide range of applications in electric power, enterprises, governments, finance, the military, and operators.
Fiberhome FR2600 series routers have logic flaws, which can be exploited by remote attackers to obtain sensitive information.
VAR-202010-0453 | CVE-2020-24627 | HPE KVM IP Console Switches cross-site scripting vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
A remote stored xss vulnerability was discovered in HPE KVM IP Console Switches version(s): G2 4x1Ex32 Prior to 2.8.3. When malicious data is viewed, they can obtain sensitive information or hijack user sessions
VAR-202010-0467 | CVE-2020-24628 | HPE KVM IP Code injection vulnerability in console switch |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
A remote code injection vulnerability was discovered in HPE KVM IP Console Switches version(s): G2 4x1Ex32 Prior to 2.8.3
VAR-202010-1567 | CVE-2020-11979 | Apache Ant Vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process. Apache Ant Contains an unspecified vulnerability.Information may be tampered with. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Apache Ant is a set of automation tools for Java software development developed by the Apache Software Foundation. This tool is mainly used for software compilation, testing and deployment. The vulnerability stems from the fact that the network system or product lacks correct verification of user input data during the operation process of user input to construct commands, data structures, or records, and does not filter or correctly filter out special elements in it, resulting in parsing or failure of the system or product. Wrong way of interpreting.
Linux Security Advisory GLSA 202011-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Apache Ant: Insecure temporary file
Date: November 16, 2020
Bugs: #745768
ID: 202011-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Apache Ant uses various insecure temporary files possibly allowing
local code execution.
Background
==========
Ant is a Java-based build tool similar to ‘make’ that uses XML
configuration files.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-java/ant < 1.10.9 >= 1.10.9
Description
===========
A previous fix for a security vulnerability involving insecure
temporary files has been found to be incomplete.
Impact
======
A local attacker could perform symlink attacks to overwrite arbitrary
files with the privileges of the user running the application.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Apache Ant users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-java/ant-1.10.9"
References
==========
[ 1 ] CVE-2020-11979
https://nvd.nist.gov/vuln/detail/CVE-2020-11979
[ 2 ] GLSA-202007-34
https://security.gentoo.org/glsa/202007-34
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202011-18
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2020 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. Bugs fixed (https://bugzilla.redhat.com/):
1837444 - CVE-2020-1945 ant: insecure temporary file vulnerability
1903702 - CVE-2020-11979 ant: insecure temporary file
1921322 - CVE-2021-21615 jenkins: Filesystem traversal by privileged users
1925140 - CVE-2021-21608 jenkins: Stored XSS vulnerability in button labels
1925141 - CVE-2021-21609 jenkins: Missing permission check for paths with specific prefix
1925143 - CVE-2021-21605 jenkins: Path traversal vulnerability in agent names
1925145 - CVE-2021-21611 jenkins: Stored XSS vulnerability on new item page
1925151 - CVE-2021-21610 jenkins: Reflected XSS vulnerability in markup formatter preview
1925156 - CVE-2021-21607 jenkins: Excessive memory allocation in graph URLs leads to denial of service
1925157 - CVE-2021-21604 jenkins: Improper handling of REST API XML deserialization errors
1925159 - CVE-2021-21606 jenkins: Arbitrary file existence check in file fingerprints
1925160 - CVE-2021-21603 jenkins: XSS vulnerability in notification bar
1925161 - CVE-2021-21602 jenkins: Arbitrary file read vulnerability in workspace browsers
1925674 - Placeholder bug for OCP 4.6.0 rpm release
6. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: OpenShift Container Platform 3.11.394 bug fix and security update
Advisory ID: RHSA-2021:0637-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2021:0637
Issue date: 2021-03-03
CVE Names: CVE-2020-1945 CVE-2020-2304 CVE-2020-2305
CVE-2020-2306 CVE-2020-2307 CVE-2020-2308
CVE-2020-2309 CVE-2020-11979 CVE-2020-25658
====================================================================
1. Summary:
Red Hat OpenShift Container Platform release 3.11.394 is now available with
updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat OpenShift Container Platform 3.11 - noarch, ppc64le, x86_64
3. Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* jenkins-2-plugins/subversion: XML parser is not preventing XML external
entity (XXE) attacks (CVE-2020-2304)
* jenkins-2-plugins/mercurial: XML parser is not preventing XML external
entity (XXE) attacks (CVE-2020-2305)
* ant: Insecure temporary file vulnerability (CVE-2020-1945)
* jenkins-2-plugins/mercurial: Missing permission check in an HTTP endpoint
could result in information disclosure (CVE-2020-2306)
* jenkins-2-plugins/kubernetes: Jenkins controller environment variables
are accessible in Kubernetes plug-in (CVE-2020-2307)
* jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes
Plugin allows listing pod templates (CVE-2020-2308)
* jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes
plug-in allows enumerating credentials IDs (CVE-2020-2309)
* ant: Insecure temporary file (CVE-2020-11979)
* python-rsa: Bleichenbacher timing oracle attack against RSA decryption
(CVE-2020-25658)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 3.11.394. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHBA-2021:0638
Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_r
elease_notes.html
This update fixes the following bugs among others:
* Previously, the restart-cluster playbook did not evaluate the defined
cluster size for ops clusters. This was causing come clusters to never
complete their restart. This bug fix passes the logging ops cluster size,
allowing restarts of ops clusters to complete successfully. (BZ#1879407)
* Previously, the `openshift_named_certificates` role checked the contents
of the `ca-bundle.crt` file during cluster installation. This caused the
check to fail during initial installation because the `ca-bundle.crt` file
is not yet created in that scenario. This bug fix allows the cluster to
skip checking the `ca-bundle.crt` file if it does not exist, resulting in
initial installations succeeding. (BZ#1920567)
* Previously, if the `openshift_release` attribute was not set in the
Ansible inventory file, the nodes of the cluster would fail during an
upgrade. This was caused by the `cluster_facts.yml` file being gathered
before the `openshift_release` attribute was defined by the upgrade
playbook. Now the `cluster_facts.yml` file is gathered after the
`openshift_version` role runs and the `openshift_release` attribute is set,
allowing for successful node upgrades. (BZ#1921353)
All OpenShift Container Platform 3.11 users are advised to upgrade to these
updated packages and images.
4. Solution:
Before applying this update, ensure all previously released errata relevant
to your system is applied.
See the following documentation, which will be updated shortly for release
3.11.394, for important instructions on how to upgrade your cluster and
fully
apply this asynchronous errata update:
https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_r
elease_notes.html
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258.
5. Bugs fixed (https://bugzilla.redhat.com/):
1837444 - CVE-2020-1945 ant: insecure temporary file vulnerability
1849003 - fact dicts returned are of type string rather than dict
1873346 - In-place upgrade of OCP 3.11 does not upgrade Kuryr components
1879407 - The restart-cluster playbook doesn't take into account that openshift_logging_es_ops_cluster_size could be different from openshift_logging_es_cluster_size
1889972 - CVE-2020-25658 python-rsa: bleichenbacher timing oracle attack against RSA decryption
1895939 - CVE-2020-2304 jenkins-2-plugins/subversion: XML parser is not preventing XML external entity (XXE) attacks
1895940 - CVE-2020-2305 jenkins-2-plugins/mercurial: XML parser is not preventing XML external entity (XXE) attacks
1895941 - CVE-2020-2306 jenkins-2-plugins/mercurial: Missing permission check in an HTTP endpoint could result in information disclosure
1895945 - CVE-2020-2307 jenkins-2-plugins/kubernetes: Jenkins controller environment variables are accessible in Kubernetes Plugin
1895946 - CVE-2020-2308 jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows listing pod templates
1895947 - CVE-2020-2309 jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows enumerating credentials IDs
1903699 - Prometheus consumes all available memory
1903702 - CVE-2020-11979 ant: insecure temporary file
1918392 - Unable to access kibana URLafter enabling HTTP2 on Haproxy router
1920567 - [release-3.11] - ca-bundle.crt(/etc/origin/master/ca-bundle.crt) is missing on the fresh installation process
1921353 - OCP 3.11.374 Upgrade fails with Either OpenShift needs to be installed or openshift_release needs to be specified
1924614 - Provide jenkins agent image for maven36
1924811 - Provide jenkins agent image for maven36
1929170 - kuryr-cni pods in crashloop after updating OCP due to RuntimeError caused by attempting to delete eth0 host interface
1929216 - KeyError: 'addresses' in kuryr-controller when Endpoints' slice only lists notReadyAddresses
6. Package List:
Red Hat OpenShift Container Platform 3.11:
Source:
atomic-enterprise-service-catalog-3.11.394-1.git.1675.fdb6e0b.el7.src.rpm
atomic-openshift-3.11.394-1.git.0.e03a88e.el7.src.rpm
atomic-openshift-cluster-autoscaler-3.11.394-1.git.0.1900c76.el7.src.rpm
atomic-openshift-descheduler-3.11.394-1.git.299.ad3a3c0.el7.src.rpm
atomic-openshift-dockerregistry-3.11.394-1.git.481.6e48246.el7.src.rpm
atomic-openshift-metrics-server-3.11.394-1.git.53.3d82586.el7.src.rpm
atomic-openshift-node-problem-detector-3.11.394-1.git.263.49acf3a.el7.src.rpm
atomic-openshift-service-idler-3.11.394-1.git.15.73f73cd.el7.src.rpm
atomic-openshift-web-console-3.11.394-1.git.667.08dd2a6.el7.src.rpm
golang-github-openshift-oauth-proxy-3.11.394-1.git.439.4c37707.el7.src.rpm
golang-github-prometheus-alertmanager-3.11.394-1.git.0.1fbb64c.el7.src.rpm
golang-github-prometheus-node_exporter-3.11.394-1.git.1062.8adc4b8.el7.src.rpm
golang-github-prometheus-prometheus-3.11.394-1.git.5026.2c9627f.el7.src.rpm
haproxy-1.8.28-1.el7.src.rpm
jenkins-2-plugins-3.11.1612862361-1.el7.src.rpm
jenkins-2.263.3.1612433584-1.el7.src.rpm
openshift-ansible-3.11.394-6.git.0.47ec25d.el7.src.rpm
openshift-enterprise-autoheal-3.11.394-1.git.218.59eb597.el7.src.rpm
openshift-enterprise-cluster-capacity-3.11.394-1.git.379.92adfdc.el7.src.rpm
openshift-kuryr-3.11.394-1.git.1490.16ed375.el7.src.rpm
python-rsa-4.5-3.el7.src.rpm
noarch:
atomic-openshift-docker-excluder-3.11.394-1.git.0.e03a88e.el7.noarch.rpm
atomic-openshift-excluder-3.11.394-1.git.0.e03a88e.el7.noarch.rpm
jenkins-2-plugins-3.11.1612862361-1.el7.noarch.rpm
jenkins-2.263.3.1612433584-1.el7.noarch.rpm
openshift-ansible-3.11.394-6.git.0.47ec25d.el7.noarch.rpm
openshift-ansible-docs-3.11.394-6.git.0.47ec25d.el7.noarch.rpm
openshift-ansible-playbooks-3.11.394-6.git.0.47ec25d.el7.noarch.rpm
openshift-ansible-roles-3.11.394-6.git.0.47ec25d.el7.noarch.rpm
openshift-ansible-test-3.11.394-6.git.0.47ec25d.el7.noarch.rpm
openshift-kuryr-cni-3.11.394-1.git.1490.16ed375.el7.noarch.rpm
openshift-kuryr-common-3.11.394-1.git.1490.16ed375.el7.noarch.rpm
openshift-kuryr-controller-3.11.394-1.git.1490.16ed375.el7.noarch.rpm
python2-kuryr-kubernetes-3.11.394-1.git.1490.16ed375.el7.noarch.rpm
python2-rsa-4.5-3.el7.noarch.rpm
ppc64le:
atomic-enterprise-service-catalog-3.11.394-1.git.1675.fdb6e0b.el7.ppc64le.rpm
atomic-enterprise-service-catalog-svcat-3.11.394-1.git.1675.fdb6e0b.el7.ppc64le.rpm
atomic-openshift-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-clients-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-cluster-autoscaler-3.11.394-1.git.0.1900c76.el7.ppc64le.rpm
atomic-openshift-descheduler-3.11.394-1.git.299.ad3a3c0.el7.ppc64le.rpm
atomic-openshift-hyperkube-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-hypershift-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-master-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-metrics-server-3.11.394-1.git.53.3d82586.el7.ppc64le.rpm
atomic-openshift-node-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-node-problem-detector-3.11.394-1.git.263.49acf3a.el7.ppc64le.rpm
atomic-openshift-pod-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-sdn-ovs-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-service-idler-3.11.394-1.git.15.73f73cd.el7.ppc64le.rpm
atomic-openshift-template-service-broker-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-tests-3.11.394-1.git.0.e03a88e.el7.ppc64le.rpm
atomic-openshift-web-console-3.11.394-1.git.667.08dd2a6.el7.ppc64le.rpm
golang-github-openshift-oauth-proxy-3.11.394-1.git.439.4c37707.el7.ppc64le.rpm
haproxy-debuginfo-1.8.28-1.el7.ppc64le.rpm
haproxy18-1.8.28-1.el7.ppc64le.rpm
openshift-enterprise-autoheal-3.11.394-1.git.218.59eb597.el7.ppc64le.rpm
openshift-enterprise-cluster-capacity-3.11.394-1.git.379.92adfdc.el7.ppc64le.rpm
prometheus-3.11.394-1.git.5026.2c9627f.el7.ppc64le.rpm
prometheus-alertmanager-3.11.394-1.git.0.1fbb64c.el7.ppc64le.rpm
prometheus-node-exporter-3.11.394-1.git.1062.8adc4b8.el7.ppc64le.rpm
x86_64:
atomic-enterprise-service-catalog-3.11.394-1.git.1675.fdb6e0b.el7.x86_64.rpm
atomic-enterprise-service-catalog-svcat-3.11.394-1.git.1675.fdb6e0b.el7.x86_64.rpm
atomic-openshift-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-clients-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-clients-redistributable-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-cluster-autoscaler-3.11.394-1.git.0.1900c76.el7.x86_64.rpm
atomic-openshift-descheduler-3.11.394-1.git.299.ad3a3c0.el7.x86_64.rpm
atomic-openshift-dockerregistry-3.11.394-1.git.481.6e48246.el7.x86_64.rpm
atomic-openshift-hyperkube-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-hypershift-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-master-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-metrics-server-3.11.394-1.git.53.3d82586.el7.x86_64.rpm
atomic-openshift-node-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-node-problem-detector-3.11.394-1.git.263.49acf3a.el7.x86_64.rpm
atomic-openshift-pod-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-sdn-ovs-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-service-idler-3.11.394-1.git.15.73f73cd.el7.x86_64.rpm
atomic-openshift-template-service-broker-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-tests-3.11.394-1.git.0.e03a88e.el7.x86_64.rpm
atomic-openshift-web-console-3.11.394-1.git.667.08dd2a6.el7.x86_64.rpm
golang-github-openshift-oauth-proxy-3.11.394-1.git.439.4c37707.el7.x86_64.rpm
haproxy-debuginfo-1.8.28-1.el7.x86_64.rpm
haproxy18-1.8.28-1.el7.x86_64.rpm
openshift-enterprise-autoheal-3.11.394-1.git.218.59eb597.el7.x86_64.rpm
openshift-enterprise-cluster-capacity-3.11.394-1.git.379.92adfdc.el7.x86_64.rpm
prometheus-3.11.394-1.git.5026.2c9627f.el7.x86_64.rpm
prometheus-alertmanager-3.11.394-1.git.0.1fbb64c.el7.x86_64.rpm
prometheus-node-exporter-3.11.394-1.git.1062.8adc4b8.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-1945
https://access.redhat.com/security/cve/CVE-2020-2304
https://access.redhat.com/security/cve/CVE-2020-2305
https://access.redhat.com/security/cve/CVE-2020-2306
https://access.redhat.com/security/cve/CVE-2020-2307
https://access.redhat.com/security/cve/CVE-2020-2308
https://access.redhat.com/security/cve/CVE-2020-2309
https://access.redhat.com/security/cve/CVE-2020-11979
https://access.redhat.com/security/cve/CVE-2020-25658
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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9NLN
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
VAR-202010-1620 | No CVE | Logic flaws and vulnerabilities existed in the enterprise-level routers of Beenet |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Chengdu Zhifeng Technology Co., Ltd. was established in October 2016. It is an emerging high-tech company integrating R&D, production and sales.
There is a logic flaw vulnerability in the enterprise-level routers of Beenet Interconnection, which can be used by attackers to obtain sensitive information.
VAR-202010-1621 | No CVE | D-Link ShareCenter DNS-320 and ShareCenter DNS-325 have command execution vulnerabilities |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
D-Link ShareCenter DNS-320 is a gigabit network storage device of Taiwan D-Link Group. D-Link ShareCenter DNS-325 is a network storage device of Taiwan D-Link Group.
D-Link ShareCenter DNS-320 and ShareCenter DNS-325 have command execution vulnerabilities. Attackers can use vulnerabilities to execute arbitrary commands.
VAR-202010-1622 | No CVE | Beijing Sifang Relay Automation Co., Ltd. CyberControl has a command execution vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
CyberControl is a flexible and customizable automated monitoring software platform that can run on a variety of operating systems. Its application areas include monitoring master stations of large industrial systems to local monitoring systems based on tablet computers.
Beijing Sifang Relay Automation Co., Ltd. CyberControl has a command execution vulnerability. Attackers can use vulnerabilities to execute arbitrary commands.
VAR-202010-1184 | CVE-2020-5387 | Dell XPS 13 9370 BIOS Vulnerability in handling exceptional conditions in |
CVSS V2: 4.9 CVSS V3: 4.4 Severity: MEDIUM |
Dell XPS 13 9370 BIOS versions prior to 1.13.1 contains an Improper Exception Handling vulnerability. A local attacker with physical access could exploit this vulnerability to prevent the system from booting until the exploited boot device is removed. Dell XPS 13 9370 is a notebook computer from Dell in the United States.
The Dell XPS 13 9370 BIOS has a security vulnerability
VAR-202009-0289 | CVE-2020-14030 | Ozeki NG SMS Gateway Untrusted Data Deserialization Vulnerability in |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: HIGH |
An issue was discovered in Ozeki NG SMS Gateway through 4.17.6. It stores SMS messages in .NET serialized format on the filesystem. By generating (and writing to the disk) malicious .NET serialized files, an attacker can trick the product into deserializing them, resulting in arbitrary code execution. Ozeki NG SMS Gateway There is a vulnerability in deserialization of untrusted data.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. The program can convert your incoming emails to SMS and send them to your mobile phone. The main functions are: (1), send and receive messages in two ways (from phone to system, from system to phone); (2), support various applications of desktop email and Webmail; (3), powerful The server supports the program and stores your SMS to send and receive these; (4), supports multiple devices, etc
VAR-202009-1719 | No CVE | Redmi Note7 has a denial of service vulnerability (CNVD-2020-53556) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability, which can be exploited by attackers to cause the device program to crash or restart.
VAR-202009-1720 | No CVE | Redmi Note7 has a denial of service vulnerability (CNVD-2020-53557) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability, which can be exploited by attackers to cause the device program to crash or restart.
VAR-202009-1721 | No CVE | Redmi Note7 has a denial of service vulnerability (CNVD-2020-53558) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability, which can be exploited by attackers to cause the device program to crash or restart.
VAR-202009-1722 | No CVE | Redmi Note7 has a denial of service vulnerability (CNVD-2020-53559) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability, which can be exploited by attackers to cause the device program to crash or restart.