VARIoT IoT vulnerabilities database
| VAR-202005-0880 | CVE-2020-5365 | Dell EMC Isilon Vulnerability regarding the use of inadequate random values in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Dell EMC Isilon versions 8.2.2 and earlier contain a remotesupport vulnerability. The pre-configured support account, remotesupport, is bundled in the Dell EMC Isilon OneFS installation. This account is used for diagnostics and other support functions. Although the default password is different for every cluster, it is predictable. Dell EMC Isilon OneFS is a scale-out storage system for unstructured data from Dell. An attacker could use the 'remotesupport' account to exploit this vulnerability to compromise the affected system
| VAR-202005-0879 | CVE-2020-5364 | Dell EMC Isilon OneFS Vulnerability regarding information leakage in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Dell EMC Isilon OneFS versions 8.2.2 and earlier contain an SNMPv2 vulnerability. The SNMPv2 services is enabled, by default, with a pre-configured community string. This community string allows read-only access to many aspects of the Isilon cluster, some of which are considered sensitive and can foster additional access. Attackers can exploit this vulnerability to read part of the Isilon cluster
| VAR-202005-0721 | CVE-2020-3344 | Endpoints Linux Connector and Endpoints Mac Connector For software Cisco AMP Classic buffer overflow vulnerability in |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
A vulnerability in Cisco AMP for Endpoints Linux Connector Software and Cisco AMP for Endpoints Mac Connector Software could allow an authenticated, local attacker to cause a buffer overflow on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted packet to an affected device. A successful exploit could allow the attacker to cause the Cisco AMP for Endpoints service to crash and restart. The program analyzes malware behavior and intent, the impact of threats, defense methods, and more. The program analyzes malware behavior and intent, the impact of threats, defense methods, and more
| VAR-202005-0720 | CVE-2020-3343 | Endpoints Linux Connector and Endpoints Mac Connector For software Cisco AMP Classic buffer overflow vulnerability in |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
A vulnerability in Cisco AMP for Endpoints Linux Connector Software and Cisco AMP for Endpoints Mac Connector Software could allow an authenticated, local attacker to cause a buffer overflow on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted packet to an affected device. A successful exploit could allow the attacker to cause the Cisco AMP for Endpoints service to crash and restart. The program analyzes malware behavior and intent, the impact of threats, defense methods, and more. The program analyzes malware behavior and intent, the impact of threats, defense methods, and more
| VAR-202005-0714 | CVE-2020-3314 | Cisco AMP for Endpoints Mac Input verification vulnerability in connector software |
CVSS V2: 5.8 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the file scan process of Cisco AMP for Endpoints Mac Connector Software could cause the scan engine to crash during the scan of local files, resulting in a restart of the AMP Connector and a denial of service (DoS) condition of the Cisco AMP for Endpoints service. The vulnerability is due to insufficient input validation of specific file attributes. An attacker could exploit this vulnerability by providing a crafted file to a user of an affected system. A successful exploit could allow the attacker to cause the Cisco AMP for Endpoints service to crash, resulting in missed detection and logging of the potentially malicious file. Continued attempts to scan the file could result in a DoS condition of the Cisco AMP for Endpoints service. The program analyzes malware behavior and intent, the impact of threats, defense methods, and more
| VAR-202005-0313 | CVE-2020-12034 | Rockwell Automation Made EDS Subsystem Multiple vulnerabilities in |
CVSS V2: 4.8 CVSS V3: 8.2 Severity: HIGH |
Products that use EDS Subsystem: Version 28.0.1 and prior (FactoryTalk Linx software (Previously called RSLinx Enterprise): Versions 6.00, 6.10, and 6.11, RSLinx Classic: Version 4.11.00 and prior, RSNetWorx software: Version 28.00.00 and prior, Studio 5000 Logix Designer software: Version 32 and prior) is vulnerable.The EDS subsystem does not provide adequate input sanitation, which may allow an attacker to craft specialized EDS files to inject SQL queries and manipulate the database storing the EDS files. This can lead to denial-of-service conditions. Rockwell Automation Provided by the company EDS Subsystem The following multiple vulnerabilities exist in. * SQL injection (CWE-89) - CVE-2020-12034 * Buffer error (CWE-199) - CVE-2020-12038The expected impact depends on each vulnerability, but it may be affected as follows. * Crafted by a third party on an adjacent network EDS Illegal by reading a file SQL Statement is executed and service operation is interrupted (DoS) Attack is triggered - CVE-2020-12034 * Crafted by a local third party EDS Memory corruption occurs by reading the file, which interferes with service operation. (DoS) Attack is triggered - CVE-2020-12038. An attacker can exploit this vulnerability with a specially crafted EDS file to cause a denial of service
| VAR-202005-0314 | CVE-2020-12038 | Rockwell Automation Made EDS Subsystem Multiple vulnerabilities in |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
Products that use EDS Subsystem: Version 28.0.1 and prior (FactoryTalk Linx software (Previously called RSLinx Enterprise): Versions 6.00, 6.10, and 6.11, RSLinx Classic: Version 4.11.00 and prior, RSNetWorx software: Version 28.00.00 and prior, Studio 5000 Logix Designer software: Version 32 and prior) is vulnerable. A memory corruption vulnerability exists in the algorithm that matches square brackets in the EDS subsystem. This may allow an attacker to craft specialized EDS files to crash the EDSParser COM object, leading to denial-of-service conditions. Rockwell Automation Provided by the company EDS Subsystem The following multiple vulnerabilities exist in. * SQL injection (CWE-89) - CVE-2020-12034 * Buffer error (CWE-199) - CVE-2020-12038The expected impact depends on each vulnerability, but it may be affected as follows. * Crafted by a third party on an adjacent network EDS Illegal by reading a file SQL Statement is executed and service operation is interrupted (DoS) Attack is triggered - CVE-2020-12034 * Crafted by a local third party EDS Memory corruption occurs by reading the file, which interferes with service operation. (DoS) Attack is triggered - CVE-2020-12038
| VAR-202005-1060 | CVE-2020-10632 | Emerson Made OpenEnterprise Multiple vulnerabilities |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Inadequate folder security permissions in Emerson OpenEnterprise versions through 3.3.4 may allow modification of important configuration files, which could cause the system to fail or behave in an unpredictable manner. OpenEnterprise teeth Emerson Industrial SCADA It's software. OpenEnterprise contains the following multiple vulnerabilities: * Improper ownership management (CWE-282) - CVE-2020-10632* Inadequate cipher strength (CWE-326) - CVE-2020-10636* Lack of authentication for critical features (CWE-306) - CVE-2020-10640The potential impact will vary for each vulnerability, but you may be affected by: * Incorrect settings of access permissions for folders in the system allow a local third party to tamper with important configuration files, resulting in system failures or unexpected behavior. - CVE-2020-10632* By a local third party OpenEnterprise The password of the user account is obtained - CVE-2020-10636* A remote third party may execute arbitrary commands with system privileges or execute arbitrary code via a specific communication path. - CVE-2020-10640. Emerson Electric OpenEnterprise is a set of data acquisition and monitoring system (SCADA) mainly used for remote oil and gas applications by Emerson Electric.
There is a security vulnerability in Emerson Electric OpenEnterprise 3.3.4 and earlier versions. The vulnerability results from the program setting unsafe permissions for folders. Attackers can use this vulnerability to modify important configuration files, causing system failures or anomalies. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided
| VAR-202005-1059 | CVE-2020-10636 | Emerson Electric OpenEnterprise encryption problem vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Inadequate encryption may allow the passwords for Emerson OpenEnterprise versions through 3.3.4 user accounts to be obtained. OpenEnterprise teeth Emerson Industrial SCADA It's software. OpenEnterprise contains the following multiple vulnerabilities: * Improper ownership management (CWE-282) - CVE-2020-10632* Inadequate cipher strength (CWE-326) - CVE-2020-10636* Lack of authentication for critical features (CWE-306) - CVE-2020-10640The potential impact will vary for each vulnerability, but you may be affected by: * Incorrect settings of access permissions for folders in the system allow a local third party to tamper with important configuration files, resulting in system failures or unexpected behavior. - CVE-2020-10632* By a local third party OpenEnterprise The password of the user account is obtained - CVE-2020-10636* A remote third party may execute arbitrary commands with system privileges or execute arbitrary code via a specific communication path. - CVE-2020-10640. Emerson Electric OpenEnterprise is a set of data acquisition and monitoring system (SCADA) mainly used for remote oil and gas applications by Emerson Electric. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided
| VAR-202005-1061 | CVE-2020-10640 | Emerson Made OpenEnterprise Multiple vulnerabilities |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Emerson OpenEnterprise versions through 3.3.4 may allow an attacker to run an arbitrary commands with system privileges or perform remote code execution via a specific communication service. OpenEnterprise teeth Emerson Industrial SCADA It's software. OpenEnterprise contains the following multiple vulnerabilities: * Improper ownership management (CWE-282) - CVE-2020-10632* Inadequate cipher strength (CWE-326) - CVE-2020-10636* Lack of authentication for critical features (CWE-306) - CVE-2020-10640The potential impact will vary for each vulnerability, but you may be affected by: * Incorrect settings of access permissions for folders in the system allow a local third party to tamper with important configuration files, resulting in system failures or unexpected behavior. - CVE-2020-10640. Emerson Electric OpenEnterprise is a set of data acquisition and monitoring system (SCADA) mainly used for remote oil and gas applications by Emerson Electric.
Emerson Electric OpenEnterprise 3.3.4 and previous versions have security vulnerabilities. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided
| VAR-202005-1028 | CVE-2020-8616 | XACK DNS Service operation interruption in (DoS) Vulnerability |
CVSS V2: 5.0 CVSS V3: 8.6 Severity: HIGH |
A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor. XACK DNS Is a corporation XACK Provides DNS Software for servers. XACK DNS In general NXNSAttack Service disruption due to a problem called (DoS) There are vulnerabilities that can be attacked. This vulnerability information is provided by the developer for the purpose of disseminating it to product users. IPA Report to JPCERT/CC Coordinated with the developer.The following service operation interruptions by a remote third party (DoS) You may be attacked. -Increases the load of the full resolver and reduces performance. ・ Abuse the full resolver as a stepping stone for reflection attacks. =========================================================================
Ubuntu Security Notice USN-4365-2
May 20, 2020
bind9 vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
- Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in Bind. This update provides
the corresponding update for Ubuntu 12.04 ESM and 14.04 ESM.
Original advisory details:
Lior Shafir, Yehuda Afek, and Anat Bremler-Barr discovered that Bind
incorrectly limited certain fetches. A remote attacker could possibly use
this issue to cause Bind to consume resources, leading to a denial of
service, or possibly use Bind to perform a reflection attack.
(CVE-2020-8616)
Tobias Klein discovered that Bind incorrectly handled checking TSIG
validity. A remote attacker could use this issue to cause Bind to crash,
resulting in a denial of service, or possibly perform other attacks.
(CVE-2020-8617)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
bind9 1:9.9.5.dfsg-3ubuntu0.19+esm2
Ubuntu 12.04 ESM:
bind9 1:9.8.1.dfsg.P1-4ubuntu0.30
In general, a standard system update will make all the necessary changes. 6.6) - x86_64
3. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: bind security update
Advisory ID: RHSA-2020:3470-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3470
Issue date: 2020-08-18
CVE Names: CVE-2020-8616 CVE-2020-8617
=====================================================================
1. Summary:
An update for bind is now available for Red Hat Enterprise Linux 7.3
Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update
Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP
Solutions.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Server AUS (v. 7.3) - noarch, x86_64
Red Hat Enterprise Linux Server E4S (v. 7.3) - noarch, ppc64le, x86_64
Red Hat Enterprise Linux Server Optional AUS (v. 7.3) - x86_64
Red Hat Enterprise Linux Server Optional E4S (v. 7.3) - ppc64le, x86_64
Red Hat Enterprise Linux Server Optional TUS (v. 7.3) - x86_64
Red Hat Enterprise Linux Server TUS (v. 7.3) - noarch, x86_64
3. Description:
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: BIND does not sufficiently limit the number of fetches performed
when processing referrals (CVE-2020-8616)
* bind: A logic error in code which checks TSIG validity can be used to
trigger an assertion failure in tsig.c (CVE-2020-8617)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, the BIND daemon (named) will be restarted
automatically.
5. Bugs fixed (https://bugzilla.redhat.com/):
1836118 - CVE-2020-8616 bind: BIND does not sufficiently limit the number of fetches performed when processing referrals
1836124 - CVE-2020-8617 bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c
6. Package List:
Red Hat Enterprise Linux Server AUS (v. 7.3):
Source:
bind-9.9.4-50.el7_3.4.src.rpm
noarch:
bind-license-9.9.4-50.el7_3.4.noarch.rpm
x86_64:
bind-9.9.4-50.el7_3.4.x86_64.rpm
bind-chroot-9.9.4-50.el7_3.4.x86_64.rpm
bind-debuginfo-9.9.4-50.el7_3.4.i686.rpm
bind-debuginfo-9.9.4-50.el7_3.4.x86_64.rpm
bind-libs-9.9.4-50.el7_3.4.i686.rpm
bind-libs-9.9.4-50.el7_3.4.x86_64.rpm
bind-libs-lite-9.9.4-50.el7_3.4.i686.rpm
bind-libs-lite-9.9.4-50.el7_3.4.x86_64.rpm
bind-pkcs11-9.9.4-50.el7_3.4.x86_64.rpm
bind-pkcs11-libs-9.9.4-50.el7_3.4.i686.rpm
bind-pkcs11-libs-9.9.4-50.el7_3.4.x86_64.rpm
bind-pkcs11-utils-9.9.4-50.el7_3.4.x86_64.rpm
bind-utils-9.9.4-50.el7_3.4.x86_64.rpm
Red Hat Enterprise Linux Server E4S (v. 7.3):
Source:
bind-9.9.4-50.el7_3.4.src.rpm
noarch:
bind-license-9.9.4-50.el7_3.4.noarch.rpm
ppc64le:
bind-9.9.4-50.el7_3.4.ppc64le.rpm
bind-chroot-9.9.4-50.el7_3.4.ppc64le.rpm
bind-debuginfo-9.9.4-50.el7_3.4.ppc64le.rpm
bind-libs-9.9.4-50.el7_3.4.ppc64le.rpm
bind-libs-lite-9.9.4-50.el7_3.4.ppc64le.rpm
bind-pkcs11-9.9.4-50.el7_3.4.ppc64le.rpm
bind-pkcs11-libs-9.9.4-50.el7_3.4.ppc64le.rpm
bind-pkcs11-utils-9.9.4-50.el7_3.4.ppc64le.rpm
bind-utils-9.9.4-50.el7_3.4.ppc64le.rpm
x86_64:
bind-9.9.4-50.el7_3.4.x86_64.rpm
bind-chroot-9.9.4-50.el7_3.4.x86_64.rpm
bind-debuginfo-9.9.4-50.el7_3.4.i686.rpm
bind-debuginfo-9.9.4-50.el7_3.4.x86_64.rpm
bind-libs-9.9.4-50.el7_3.4.i686.rpm
bind-libs-9.9.4-50.el7_3.4.x86_64.rpm
bind-libs-lite-9.9.4-50.el7_3.4.i686.rpm
bind-libs-lite-9.9.4-50.el7_3.4.x86_64.rpm
bind-pkcs11-9.9.4-50.el7_3.4.x86_64.rpm
bind-pkcs11-libs-9.9.4-50.el7_3.4.i686.rpm
bind-pkcs11-libs-9.9.4-50.el7_3.4.x86_64.rpm
bind-pkcs11-utils-9.9.4-50.el7_3.4.x86_64.rpm
bind-utils-9.9.4-50.el7_3.4.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 7.3):
Source:
bind-9.9.4-50.el7_3.4.src.rpm
noarch:
bind-license-9.9.4-50.el7_3.4.noarch.rpm
x86_64:
bind-9.9.4-50.el7_3.4.x86_64.rpm
bind-chroot-9.9.4-50.el7_3.4.x86_64.rpm
bind-debuginfo-9.9.4-50.el7_3.4.i686.rpm
bind-debuginfo-9.9.4-50.el7_3.4.x86_64.rpm
bind-libs-9.9.4-50.el7_3.4.i686.rpm
bind-libs-9.9.4-50.el7_3.4.x86_64.rpm
bind-libs-lite-9.9.4-50.el7_3.4.i686.rpm
bind-libs-lite-9.9.4-50.el7_3.4.x86_64.rpm
bind-pkcs11-9.9.4-50.el7_3.4.x86_64.rpm
bind-pkcs11-libs-9.9.4-50.el7_3.4.i686.rpm
bind-pkcs11-libs-9.9.4-50.el7_3.4.x86_64.rpm
bind-pkcs11-utils-9.9.4-50.el7_3.4.x86_64.rpm
bind-utils-9.9.4-50.el7_3.4.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 7.3):
x86_64:
bind-debuginfo-9.9.4-50.el7_3.4.i686.rpm
bind-debuginfo-9.9.4-50.el7_3.4.x86_64.rpm
bind-devel-9.9.4-50.el7_3.4.i686.rpm
bind-devel-9.9.4-50.el7_3.4.x86_64.rpm
bind-lite-devel-9.9.4-50.el7_3.4.i686.rpm
bind-lite-devel-9.9.4-50.el7_3.4.x86_64.rpm
bind-pkcs11-devel-9.9.4-50.el7_3.4.i686.rpm
bind-pkcs11-devel-9.9.4-50.el7_3.4.x86_64.rpm
bind-sdb-9.9.4-50.el7_3.4.x86_64.rpm
bind-sdb-chroot-9.9.4-50.el7_3.4.x86_64.rpm
Red Hat Enterprise Linux Server Optional E4S (v. 7.3):
ppc64le:
bind-debuginfo-9.9.4-50.el7_3.4.ppc64le.rpm
bind-devel-9.9.4-50.el7_3.4.ppc64le.rpm
bind-lite-devel-9.9.4-50.el7_3.4.ppc64le.rpm
bind-pkcs11-devel-9.9.4-50.el7_3.4.ppc64le.rpm
bind-sdb-9.9.4-50.el7_3.4.ppc64le.rpm
bind-sdb-chroot-9.9.4-50.el7_3.4.ppc64le.rpm
x86_64:
bind-debuginfo-9.9.4-50.el7_3.4.i686.rpm
bind-debuginfo-9.9.4-50.el7_3.4.x86_64.rpm
bind-devel-9.9.4-50.el7_3.4.i686.rpm
bind-devel-9.9.4-50.el7_3.4.x86_64.rpm
bind-lite-devel-9.9.4-50.el7_3.4.i686.rpm
bind-lite-devel-9.9.4-50.el7_3.4.x86_64.rpm
bind-pkcs11-devel-9.9.4-50.el7_3.4.i686.rpm
bind-pkcs11-devel-9.9.4-50.el7_3.4.x86_64.rpm
bind-sdb-9.9.4-50.el7_3.4.x86_64.rpm
bind-sdb-chroot-9.9.4-50.el7_3.4.x86_64.rpm
Red Hat Enterprise Linux Server Optional TUS (v. 7.3):
x86_64:
bind-debuginfo-9.9.4-50.el7_3.4.i686.rpm
bind-debuginfo-9.9.4-50.el7_3.4.x86_64.rpm
bind-devel-9.9.4-50.el7_3.4.i686.rpm
bind-devel-9.9.4-50.el7_3.4.x86_64.rpm
bind-lite-devel-9.9.4-50.el7_3.4.i686.rpm
bind-lite-devel-9.9.4-50.el7_3.4.x86_64.rpm
bind-pkcs11-devel-9.9.4-50.el7_3.4.i686.rpm
bind-pkcs11-devel-9.9.4-50.el7_3.4.x86_64.rpm
bind-sdb-9.9.4-50.el7_3.4.x86_64.rpm
bind-sdb-chroot-9.9.4-50.el7_3.4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-8616
https://access.redhat.com/security/cve/CVE-2020-8617
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=YXUd
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. 8) - aarch64, ppc64le, s390x, x86_64
3. Solution:
For OpenShift Container Platform 4.3 see the following documentation, which
will be updated shortly for release 4.3.25, for important instructions on
how to upgrade your cluster and fully apply this asynchronous errata
update:
https://docs.openshift.com/container-platform/4.3/release_notes/ocp-4-3-rel
ease-notes.html
Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.3/updating/updating-cluster
- -cli.html. Bugs fixed (https://bugzilla.redhat.com/):
1821583 - CVE-2020-8555 kubernetes: Server side request forgery (SSRF) in kube-controller-manager allows users to leak secret information
5. 7.7) - ppc64, ppc64le, s390x, x86_64
3. Description:
OpenShift Virtualization is Red Hat's virtualization solution designed for
Red Hat OpenShift Container Platform.
Additional Changes:
This update also fixes several bugs and adds various enhancements.
This advisory contains the following OpenShift Virtualization 2.4.0 images:
RHEL-7-CNV-2.4
==============
kubevirt-ssp-operator-container-v2.4.0-71
RHEL-8-CNV-2.4
==============
virt-cdi-controller-container-v2.4.0-29
virt-cdi-uploadproxy-container-v2.4.0-29
hostpath-provisioner-container-v2.4.0-25
virt-cdi-operator-container-v2.4.0-29
kubevirt-metrics-collector-container-v2.4.0-18
cnv-containernetworking-plugins-container-v2.4.0-36
kubevirt-kvm-info-nfd-plugin-container-v2.4.0-18
hostpath-provisioner-operator-container-v2.4.0-31
virt-cdi-uploadserver-container-v2.4.0-29
virt-cdi-apiserver-container-v2.4.0-29
virt-controller-container-v2.4.0-58
virt-cdi-cloner-container-v2.4.0-29
kubevirt-template-validator-container-v2.4.0-21
vm-import-operator-container-v2.4.0-21
kubernetes-nmstate-handler-container-v2.4.0-37
node-maintenance-operator-container-v2.4.0-27
virt-operator-container-v2.4.0-58
kubevirt-v2v-conversion-container-v2.4.0-23
cnv-must-gather-container-v2.4.0-73
virtio-win-container-v2.4.0-15
kubevirt-cpu-node-labeller-container-v2.4.0-19
ovs-cni-plugin-container-v2.4.0-37
kubevirt-vmware-container-v2.4.0-21
hyperconverged-cluster-operator-container-v2.4.0-70
virt-handler-container-v2.4.0-58
virt-cdi-importer-container-v2.4.0-29
virt-launcher-container-v2.4.0-58
kubevirt-cpu-model-nfd-plugin-container-v2.4.0-17
virt-api-container-v2.4.0-58
ovs-cni-marker-container-v2.4.0-38
kubemacpool-container-v2.4.0-39
cluster-network-addons-operator-container-v2.4.0-38
bridge-marker-container-v2.4.0-39
vm-import-controller-container-v2.4.0-21
hco-bundle-registry-container-v2.3.0-497
3. Bugs fixed (https://bugzilla.redhat.com/):
1684772 - virt-launcher images do not have the edk2-ovmf package installed
1716329 - missing Status, Version and Label for a number of CNV components, and Status term inconsistency
1724978 - [RFE][v2v] Improve the way we display progress percent in UI
1725672 - CDI: getting error with "unknown reason" when trying to create UploadTokenRequest for a none existing pvc
1727117 - [RFE] Reduce installed libvirt components
1780473 - Delete VM is hanging if the corresponding template does not exist anymore
1787213 - KubeMacpool may not work from time to time since it is skipped when we face certificate issue.
1789564 - Failed to allocate a SRIOV VF to VMI
1795889 - internal IP shown on VMI spec instead of public one on VMI with guest-agent
1796342 - VM Failing to start since hard disk not ready
1802554 - [SSP] cpu-feature-lahf_lm and Conroe are enabled on one worker (test issue)
1805044 - No mem/filesystem/Network Utilization in VM overview
1806288 - [CDI] fails to import images that comes from url that reject HEAD requests
1806436 - [SSP] Windows common templates - Windows10 should be removed from windows-server* templates, windows-server* should not have desktop version
1811111 - All the VM templates are visible in the developer catalog but not really/easily instantiable
1811417 - Failed to install cnv-2.4 on top of ocp 4.4 (hco operator in crashLoopBackOff state)
1816518 - [SSP] Common templates - template name under objects -> metadata -> labels should be identical to the template actual name
1817080 - node maintenance CRD is marked with NonStructuralSchema condition
1819252 - kubevirt-ssp-operator cannot create ServiceMonitor object
1820651 - CDI import fails using block volume (available size -1)
1821209 - Debug log message looks unprofessional
1822079 - nmstate-handler fails to start and keeps restarting
1822315 - status.desiredState: doesn't pick the correct value and is null
1823342 - Invalid qcow2 image causes HTTP range error and difficult to read stack trace
1823699 - [CNV-2.4] Failing to deploy NetworkAddons
1823701 - [CNV-2.4] when a single component is failing, HCO can continue reporting outdated negative conditions also on other components
1825801 - [CNV-2.4] Failing to deploy due issues in CRD of cluster network operator
1826044 - [CNV-2.4] Failing to deploy due issues in CRD of cluster host-path-provisioner operator
1827257 - VMs' connectivity is available even the two VMs are in different vlan
1828401 - misconfigured prow job e2e-aws-4.5-cnv resulting in step e2e-aws failed: step needs a lease but no lease client provided
1829376 - VMs with blank block volumes fail to spin up
1830780 - virt-v2v-wrapper - 0% VM migration progress in UI
1831536 - kubevirt-{handler,apiserver,controller} service accounts added to the privileged SCC
1832179 - [virt] VM with runStrategy attribute (instead of 'running' attribute) does not have 'RUNNING' state in cli
1832283 - [SSP operator] Common templates and template_validator are missing after clean installation
1832291 - SSP installation is successful even with some components missing
1832769 - [kubevirt version] is not reported correctly
1833220 - CVE-2020-10749 containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters
1833376 - Hardcoded VMware-vix-disklib version 6 - import fail with version 7
1833786 - kubevirt hyperconverged-cluster-operator deploy_marketplace.sh fails in disconnected cluster
1834253 - VMs are stuck in Starting state
1835242 - Can't query SSP CRs after upgrade from 2.3 to 2.4
1835426 - [RFE] Provide a clear error message when VM and VMI name does not match
1836792 - [CNV deployment] kubevirt components are missing
1837182 - VMI virt-launcher reaches Error state after running for 10-24 hours
1837670 - Specifying "Ubuntu 18.04 LTS" force the Conroe CPU model
1838066 - [CNV deployment] kubevirt failing to create cpu-plugin-configmap obsoleteCPUs
1838424 - [Installation] CNV 2.4.0 virt-handler and kubevirt-node-labeller pods are not showing up
1839982 - [CNV][DOC] Lack of explanation for StorageClass default accessMode in openshift-cnv kubevirt-storage-class-defaults
1840047 - [CNV-2.4] virt-handler failing on /usr/bin/container-disk: no such file or directory
1840220 - [CNV-2.4] node-maintenance-operator failing to create deployment - invalid format of manifest
1840652 - Upgrade indication is missing
1841065 - [v2v] RHV to CNV: VM import fail on network mapping validation
1841325 - [CNV][V2V] VM migration fails if VMWare host isn't under Cluster but directly under Datacenter
1841505 - [CNV-2.4] virt-template-validator container fails to start
1842869 - vmi cannot be scheduled, because node labeller doesn't report correct labels
1842958 - [SSP] Fail to create Windows VMs from templates - windows-cd-bus validation added but cdrom is missing from the template
1843219 - node-labeller SCC is privileged, which appears too relaxed
1843456 - virt-launcher goes from running to error state due to panic: timed out waiting for domain to be defined
1843467 - [CNV network KMP] kubemacpool causes worker node to be Ready,SchedulingDisabled
1843519 - HCO CR is not listed when running "kubectl get all" from command line
1843948 - [Network operator] Upgrade from 2.3 to 2.4 - Network operator fails to upgrade ovs-cni pods, upgrade is not completed
1844057 - [CNV-2.4] cluster-network-addons-operator failing to start
1844105 - [SSP operator] Upgrade from 2.3.0 to 2.4.0- SSP operator fails to upgrade node labeller and template validator
1844907 - kubemacpool deployment status errors regarding replicas
1845060 - Node-labeller is in pending state when node doesn't have kvm device
1845061 - Version displayed in Container Native Virtualization OperatorHub side panel
1845477 - [SSP] Template validator fails to "Extract the CA bundle"; template validator is not called when a VM is created
1845557 - [CNV-2.4] template validator webhook fails with certification issues
1845604 - [v2v] RHV to CNV VM import: Prevent a second vm-import from starting.
1845899 - [CNV-2.5] cluster-network-addons-operator failing to start
1845901 - Filesystem corruption related to smart clone
1847070 - vmi cannot be scheduled , qemu-kvm core dump
1847594 - pods in openshift-cnv namespace no longer have openshift.io/scc under metadata.annotations
1848004 - [CNV-2.5] Deployment fails on NetworkAddonsConfigNotAvailable
1848007 - [CNV-2.4] Deployment fails on NetworkAddonsConfigNotAvailable
1848951 - CVE-2020-14316 kubevirt: VMIs can be used to access host files
1849527 - [v2v] [api] VM import RHV to CNV importer should stop send requests to RHV if they are rejected because of wrong user/pass
1849915 - [v2v] VM import RHV to CNV: The timezone data is not available in the vm-import-controller image.
1850425 - [v2v][VM import RHV to CNV] Add validation for network target type in network mapping
1850467 - [v2v] [api] VM import RHV to CNV invalid target network type should not crash the controller
1850482 - [v2v][VM import from RHV to CNV] 2 nics are mapped to a new network though second was mapped to pod.
1850937 - kubemacpool fails in a specific order of components startup
1851856 - Deployment not progressing due to PriorityClass missing
1851886 - [CNV][V2V] VMWare pod is failing when running wizard to migrate from RHV
1852446 - [v2v][RHV to CNV VM import] Windows10 VM import fail on: timezone is not UTC-compatible
1853028 - CNV must-gather failure on CNV-QE BM-RHCOS environment
1853133 - [CNV-2.4] Deployment fails on KubeVirtMetricsAggregationNotAvailable
1853373 - virtctl image-upload fails to upload an image if the dv name includes a "."
1854419 - [Re-brand] Align CSV
1854744 - To stabilize some tests I need to backport PRs which change production code
1855256 - [v2v][RHV to CNV VM import] Empty directories created for vm-import-operator/controller logs in cnv-must-gather
1856438 - [CNAO] Upgrade is not completed (wrong operatorVersion), CR is not updated.
1856447 - CNV upgrade - HCO fails to identify wrong observedVersion in CR, HCO is reported as READY
1856979 - Domain notify errors break VMI migrations and graceful shutdown
5
| VAR-202005-0956 | CVE-2020-7137 | HPE Superdome Flex Server Input verification vulnerability in |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
A validation issue in HPE Superdome Flex's RMC component may allow local elevation of privilege. Apply HPE Superdome Flex Server version 3.25.46 or later to resolve this issue. HPE Superdome Flex Server There is an input verification vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
| VAR-202005-1116 | No CVE | D-Link DIR-816 A1 has command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
D-Link DIR-816 A1 is a wireless router of D-Link Electronic Equipment (Shanghai) Co., Ltd.
There is a command execution vulnerability in D-Link DIR-816 A1. An attacker can use this vulnerability to execute arbitrary commands by sending a POST request with the ‘datetime’ parameter to form2systime.cgi.
| VAR-202005-1108 | No CVE | Control Expert has a denial of service vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Control Expert (formerly known as Unity Pro) is a PLC configuration software launched by Schneider, through which the PLC program can be written and downloaded.
There is a denial of service vulnerability in Control Expert, which can be exploited by attackers to cause a denial of service.
| VAR-202005-1091 | No CVE | Codesys v3 has a denial of service vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Codesys is a powerful PLC software programming tool.
Codesys v3 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
| VAR-202005-0124 | CVE-2020-11550 | plural NETGEAR Information leakage vulnerabilities in products |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
An issue was discovered on NETGEAR Orbi Tri-Band Business WiFi Add-on Satellite (SRS60) AC3000 V2.5.1.106, Outdoor Satellite (RBS50Y) V2.5.1.106, and Pro Tri-Band Business WiFi Router (SRR60) AC3000 V2.5.1.106. The administrative SOAP interface allows an unauthenticated remote leak of sensitive/arbitrary Wi-Fi information, such as SSIDs and Pre-Shared-Keys (PSK)
| VAR-202005-0158 | CVE-2020-13136 | D-Link DSP-W215 Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
D-Link DSP-W215 1.26b03 devices send an obfuscated hash that can be retrieved and understood by a network sniffer. D-Link DSP-W215 The device contains a vulnerability related to information leakage.Information may be obtained. D-Link DSP-W215 is a smart plug product of D-Link, Taiwan.
D-Link DSP-W215 1.26b03 version has a security vulnerability
| VAR-202005-0122 | CVE-2020-11549 | plural NETGEAR Vulnerabilities in the use of hard-coded credentials in products |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
An issue was discovered on NETGEAR Orbi Tri-Band Business WiFi Add-on Satellite (SRS60) AC3000 V2.5.1.106, Outdoor Satellite (RBS50Y) V2.5.1.106, and Pro Tri-Band Business WiFi Router (SRR60) AC3000 V2.5.1.106. The root account has the same password as the Web-admin component. Thus, by exploiting CVE-2020-11551, it is possible to achieve remote code execution with root privileges on the embedded Linux system. (DoS) It may be put into a state
| VAR-202005-0125 | CVE-2020-11551 | plural NETGEAR Product authentication vulnerabilities |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
An issue was discovered on NETGEAR Orbi Tri-Band Business WiFi Add-on Satellite (SRS60) AC3000 V2.5.1.106, Outdoor Satellite (RBS50Y) V2.5.1.106, and Pro Tri-Band Business WiFi Router (SRR60) AC3000 V2.5.1.106. The administrative SOAP interface allows an unauthenticated remote write of arbitrary Wi-Fi configuration data such as authentication details (e.g., the Web-admin password), network settings, DNS settings, system administration interface configuration, etc. (DoS) It may be put into a state
| VAR-202005-0157 | CVE-2020-13135 | D-Link DSP-W215 Information leakage vulnerabilities in devices |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
D-Link DSP-W215 1.26b03 devices allow information disclosure by intercepting messages on the local network, as demonstrated by a Squid Proxy. D-Link DSP-W215 The device contains a vulnerability related to information leakage.Information may be obtained. D-Link DSP-W215 is a smart plug product of D-Link, Taiwan.
D-Link DSP-W215 1.26b03 version has a security vulnerability