VARIoT IoT vulnerabilities database
| VAR-202005-0992 | CVE-2020-5897 | BIG-IP Edge Client Vulnerability in using free memory in |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
In versions 7.1.5-7.1.9, there is use-after-free memory vulnerability in the BIG-IP Edge Client Windows ActiveX component. BIG-IP Edge Client Is vulnerable to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. F5 BIG-IP APM, etc. are all products of F5 Company in the United States. F5 BIG-IP APM is an access and security solution. F5 BIG-IP APM Clients is a set of APM client software. F5 BIG-IP is an application delivery platform that integrates functions such as network traffic management, application security management, and load balancing. An attacker could exploit this vulnerability via a specially crafted malicious web page to cause memory corruption of the browser or code execution from the browser. The following products and versions are affected: F5 BIG-IP APM 15.0.0 to 15.1.0, 14.1.0 to 14.1.2, 13.1.0 to 13.1.3, 12.1.0 to 12.1.5 Version, 11.6.1 to 11.6.5; BIG-IP APM Clients 7.1.5 to 7.1.9
| VAR-202005-0991 | CVE-2020-5896 | BIG-IP Edge Client Vulnerability regarding improper default permissions in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
On versions 7.1.5-7.1.9, the BIG-IP Edge Client's Windows Installer Service's temporary folder has weak file and folder permissions. BIG-IP Edge Client There is a vulnerability in improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Both F5 BIG-IP APM and F5 BIG-IP APM Clients are products of F5 Corporation in the United States. F5 BIG-IP APM is an access and security solution. The product provides unified access to business-critical applications and networks. F5 BIG-IP APM Clients is a set of APM client software. A security vulnerability exists in the temp folder of the BIG-IP Edge Client Windows Component Installer service in F5 BIG-IP APM and BIG-IP APM Clients. An attacker could exploit this vulnerability to elevate privileges. The following products and versions are affected: F5 BIG-IP APM 15.0.0 to 15.1.0, 14.1.0 to 14.1.2, 13.1.0 to 13.1.3, 12.1.0 to 12.1.5 Version, 11.6.1 to 11.6.5; BIG-IP APM Clients 7.1.5 to 7.1.9
| VAR-202005-0719 | CVE-2020-3341 | Clam AntiVirus Input verification vulnerabilities in software |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition. Clam AntiVirus (ClamAV) The software contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state. Clam AntiVirus is an open source antivirus engine from the ClamAV team for detecting Trojans, viruses, malware and other malicious threats. ==========================================================================
Ubuntu Security Notice USN-4370-2
May 21, 2020
clamav vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
- Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in ClamAV.
Software Description:
- clamav: Anti-virus utility for Unix
Details:
USN-4370-1 fixed several vulnerabilities in ClamAV. This update provides
the corresponding update for Ubuntu 12.04 ESM and 14.04 ESM.
Original advisory details:
It was discovered that ClamAV incorrectly handled parsing ARJ archives. (CVE-2020-3327)
It was discovered that ClamAV incorrectly handled parsing PDF files. (CVE-2020-3341)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
clamav 0.102.3+dfsg-0ubuntu0.14.04.1+esm1
Ubuntu 12.04 ESM:
clamav 0.102.3+dfsg-0ubuntu0.12.04.1
This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/4370-2
https://usn.ubuntu.com/4370-1
CVE-2020-3327, CVE-2020-3341
| VAR-202005-0717 | CVE-2020-3327 | Clam AntiVirus Input verification vulnerabilities in software |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition. Clam AntiVirus (ClamAV) The software contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state. Clam AntiVirus is an open source antivirus engine from the ClamAV team for detecting Trojans, viruses, malware and other malicious threats. =========================================================================
Ubuntu Security Notice USN-4435-2
July 27, 2020
clamav vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
- Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in ClamAV.
Software Description:
- clamav: Anti-virus utility for Unix
Details:
USN-4435-1 fixed several vulnerabilities in ClamAV. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that ClamAV incorrectly handled parsing ARJ archives. (CVE-2020-3327)
It was discovered that ClamAV incorrectly handled scanning malicious files.
A local attacker could possibly use this issue to delete arbitrary files.
(CVE-2020-3350)
It was discovered that ClamAV incorrectly handled parsing EGG archives. (CVE-2020-3481)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
clamav 0.102.4+dfsg-0ubuntu0.14.04.1+esm1
Ubuntu 12.04 ESM:
clamav 0.102.4+dfsg-0ubuntu0.12.04.1
This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/4435-2
https://usn.ubuntu.com/4435-1
CVE-2020-3327, CVE-2020-3350, CVE-2020-3481
| VAR-202005-1115 | No CVE | Dalian Technology Computer Control Engineering Co., Ltd. DCCE HMIware has a memory corruption vulnerability (CNVD-2020-27184) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
DCCE HMIware configuration editing software is a special man-machine interface configuration software specially developed for DCCE touch screen. This software provides users with a powerful integrated development environment. The products are widely used in medical, chemical, electric power, printing, textile , Smart home and other fields.
DCCE HMIware of Dalian Polytechnic Computer Control Engineering Co., Ltd. has a memory corruption vulnerability. The vulnerability is due to a problem in the DCCE HMIware engineering file Wpj in processing the wpj format. An attacker can use this vulnerability to construct a deformed wpj file to cause the program to crash.
| VAR-202005-1104 | No CVE | DView2.6.2 configuration software of Dalian Polytechnic Computer Control Engineering Co., Ltd. has a memory corruption vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
DView2.6.2 is a Windows-based operating system, a data monitoring system software development platform for the field of industrial automation, including DXP data interaction platform software and DHMI man-machine interface configuration software, integrated device management, variable management, communication scheduling, man-machine Interface development, Web services, historical data storage and other functions.
The DView2.6.2 configuration software of Dalian Polytechnic Computer Control Engineering Co., Ltd. has a memory destruction vulnerability, which can be used by an attacker to construct a malformed dsl sample, causing the program to crash.
| VAR-202005-1105 | No CVE | Dalian Technology Computer Control Engineering Co., Ltd. DCCE HMIware has a memory corruption vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
DCCE HMIware configuration editing software is a special man-machine interface configuration software specially developed for DCCE touch screen. This software provides users with a powerful integrated development environment. The products are widely used in medical, chemical, electric power, printing, textile , Smart home and other fields.
The software has a memory corruption vulnerability in the WAV format. An attacker can use this vulnerability to construct a deformed WAV sample that can cause the program to crash.
| VAR-202005-0542 | CVE-2019-5500 | NetApp Service Processor and Baseboard Management Controller Firmware vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Certain versions of the NetApp Service Processor and Baseboard Management Controller firmware allow a remote unauthenticated attacker to cause a Denial of Service (DoS). The product provides remote node management capabilities, including console redirection, recording and power control. NetApp Baseboard Management Controller is a baseboard management controller. The product mainly provides remote management functions such as console redirection, logging, and power control
| VAR-202010-1571 | CVE-2020-7069 | PHP Vulnerability in cryptography |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data. PHP Contains a cryptographic vulnerability.Information may be obtained and information may be tampered with. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. A buffer error vulnerability exists in PHP versions 7.2.0, 7.3.0 and 7.4.0 due to the fact that the 'mbfl_filt_conv_big5_wchar' function does not check bounds properly. A remote attacker could exploit this vulnerability with specially crafted parameters to execute arbitrary code on the system or cause an application to crash. 8) - aarch64, noarch, ppc64le, s390x, x86_64
3.
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.5 Release Notes linked from the References section. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: rh-php73-php security, bug fix, and enhancement update
Advisory ID: RHSA-2021:2992-01
Product: Red Hat Software Collections
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2992
Issue date: 2021-08-03
CVE Names: CVE-2020-7068 CVE-2020-7069 CVE-2020-7070
CVE-2020-7071 CVE-2021-21702 CVE-2021-21705
====================================================================
1. Summary:
An update for rh-php73-php is now available for Red Hat Software
Collections.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64
3. Description:
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Server.
The following packages have been upgraded to a later upstream version:
rh-php73-php (7.3.29). (BZ#1977764)
Security Fix(es):
* php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV
(CVE-2020-7069)
* php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo
(CVE-2020-7071)
* php: SSRF bypass in FILTER_VALIDATE_URL (CVE-2021-21705)
* php: Use of freed hash key in the phar_parse_zipfile function
(CVE-2020-7068)
* php: URL decoding of cookie names can lead to different interpretation of
cookies between browser and server (CVE-2020-7070)
* php: NULL pointer dereference in SoapClient (CVE-2021-21702)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon must be restarted
for the update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1868109 - CVE-2020-7068 php: Use of freed hash key in the phar_parse_zipfile function
1885735 - CVE-2020-7069 php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV
1885738 - CVE-2020-7070 php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server
1913846 - CVE-2020-7071 php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo
1925272 - CVE-2021-21702 php: NULL pointer dereference in SoapClient
1977764 - PDO ODBC truncates BLOB records at every 256th byte [rhscl-3.7.z]
1978755 - CVE-2021-21705 php: SSRF bypass in FILTER_VALIDATE_URL
6. Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
rh-php73-php-7.3.29-1.el7.src.rpm
ppc64le:
rh-php73-php-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-bcmath-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-cli-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-common-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-dba-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-dbg-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-debuginfo-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-devel-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-embedded-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-enchant-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-fpm-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-gd-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-gmp-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-intl-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-json-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-ldap-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-mbstring-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-mysqlnd-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-odbc-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-opcache-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-pdo-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-pgsql-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-process-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-pspell-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-recode-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-snmp-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-soap-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-xml-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-xmlrpc-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-zip-7.3.29-1.el7.ppc64le.rpm
s390x:
rh-php73-php-7.3.29-1.el7.s390x.rpm
rh-php73-php-bcmath-7.3.29-1.el7.s390x.rpm
rh-php73-php-cli-7.3.29-1.el7.s390x.rpm
rh-php73-php-common-7.3.29-1.el7.s390x.rpm
rh-php73-php-dba-7.3.29-1.el7.s390x.rpm
rh-php73-php-dbg-7.3.29-1.el7.s390x.rpm
rh-php73-php-debuginfo-7.3.29-1.el7.s390x.rpm
rh-php73-php-devel-7.3.29-1.el7.s390x.rpm
rh-php73-php-embedded-7.3.29-1.el7.s390x.rpm
rh-php73-php-enchant-7.3.29-1.el7.s390x.rpm
rh-php73-php-fpm-7.3.29-1.el7.s390x.rpm
rh-php73-php-gd-7.3.29-1.el7.s390x.rpm
rh-php73-php-gmp-7.3.29-1.el7.s390x.rpm
rh-php73-php-intl-7.3.29-1.el7.s390x.rpm
rh-php73-php-json-7.3.29-1.el7.s390x.rpm
rh-php73-php-ldap-7.3.29-1.el7.s390x.rpm
rh-php73-php-mbstring-7.3.29-1.el7.s390x.rpm
rh-php73-php-mysqlnd-7.3.29-1.el7.s390x.rpm
rh-php73-php-odbc-7.3.29-1.el7.s390x.rpm
rh-php73-php-opcache-7.3.29-1.el7.s390x.rpm
rh-php73-php-pdo-7.3.29-1.el7.s390x.rpm
rh-php73-php-pgsql-7.3.29-1.el7.s390x.rpm
rh-php73-php-process-7.3.29-1.el7.s390x.rpm
rh-php73-php-pspell-7.3.29-1.el7.s390x.rpm
rh-php73-php-recode-7.3.29-1.el7.s390x.rpm
rh-php73-php-snmp-7.3.29-1.el7.s390x.rpm
rh-php73-php-soap-7.3.29-1.el7.s390x.rpm
rh-php73-php-xml-7.3.29-1.el7.s390x.rpm
rh-php73-php-xmlrpc-7.3.29-1.el7.s390x.rpm
rh-php73-php-zip-7.3.29-1.el7.s390x.rpm
x86_64:
rh-php73-php-7.3.29-1.el7.x86_64.rpm
rh-php73-php-bcmath-7.3.29-1.el7.x86_64.rpm
rh-php73-php-cli-7.3.29-1.el7.x86_64.rpm
rh-php73-php-common-7.3.29-1.el7.x86_64.rpm
rh-php73-php-dba-7.3.29-1.el7.x86_64.rpm
rh-php73-php-dbg-7.3.29-1.el7.x86_64.rpm
rh-php73-php-debuginfo-7.3.29-1.el7.x86_64.rpm
rh-php73-php-devel-7.3.29-1.el7.x86_64.rpm
rh-php73-php-embedded-7.3.29-1.el7.x86_64.rpm
rh-php73-php-enchant-7.3.29-1.el7.x86_64.rpm
rh-php73-php-fpm-7.3.29-1.el7.x86_64.rpm
rh-php73-php-gd-7.3.29-1.el7.x86_64.rpm
rh-php73-php-gmp-7.3.29-1.el7.x86_64.rpm
rh-php73-php-intl-7.3.29-1.el7.x86_64.rpm
rh-php73-php-json-7.3.29-1.el7.x86_64.rpm
rh-php73-php-ldap-7.3.29-1.el7.x86_64.rpm
rh-php73-php-mbstring-7.3.29-1.el7.x86_64.rpm
rh-php73-php-mysqlnd-7.3.29-1.el7.x86_64.rpm
rh-php73-php-odbc-7.3.29-1.el7.x86_64.rpm
rh-php73-php-opcache-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pdo-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pgsql-7.3.29-1.el7.x86_64.rpm
rh-php73-php-process-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pspell-7.3.29-1.el7.x86_64.rpm
rh-php73-php-recode-7.3.29-1.el7.x86_64.rpm
rh-php73-php-snmp-7.3.29-1.el7.x86_64.rpm
rh-php73-php-soap-7.3.29-1.el7.x86_64.rpm
rh-php73-php-xml-7.3.29-1.el7.x86_64.rpm
rh-php73-php-xmlrpc-7.3.29-1.el7.x86_64.rpm
rh-php73-php-zip-7.3.29-1.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7):
Source:
rh-php73-php-7.3.29-1.el7.src.rpm
ppc64le:
rh-php73-php-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-bcmath-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-cli-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-common-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-dba-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-dbg-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-debuginfo-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-devel-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-embedded-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-enchant-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-fpm-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-gd-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-gmp-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-intl-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-json-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-ldap-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-mbstring-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-mysqlnd-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-odbc-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-opcache-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-pdo-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-pgsql-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-process-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-pspell-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-recode-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-snmp-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-soap-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-xml-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-xmlrpc-7.3.29-1.el7.ppc64le.rpm
rh-php73-php-zip-7.3.29-1.el7.ppc64le.rpm
s390x:
rh-php73-php-7.3.29-1.el7.s390x.rpm
rh-php73-php-bcmath-7.3.29-1.el7.s390x.rpm
rh-php73-php-cli-7.3.29-1.el7.s390x.rpm
rh-php73-php-common-7.3.29-1.el7.s390x.rpm
rh-php73-php-dba-7.3.29-1.el7.s390x.rpm
rh-php73-php-dbg-7.3.29-1.el7.s390x.rpm
rh-php73-php-debuginfo-7.3.29-1.el7.s390x.rpm
rh-php73-php-devel-7.3.29-1.el7.s390x.rpm
rh-php73-php-embedded-7.3.29-1.el7.s390x.rpm
rh-php73-php-enchant-7.3.29-1.el7.s390x.rpm
rh-php73-php-fpm-7.3.29-1.el7.s390x.rpm
rh-php73-php-gd-7.3.29-1.el7.s390x.rpm
rh-php73-php-gmp-7.3.29-1.el7.s390x.rpm
rh-php73-php-intl-7.3.29-1.el7.s390x.rpm
rh-php73-php-json-7.3.29-1.el7.s390x.rpm
rh-php73-php-ldap-7.3.29-1.el7.s390x.rpm
rh-php73-php-mbstring-7.3.29-1.el7.s390x.rpm
rh-php73-php-mysqlnd-7.3.29-1.el7.s390x.rpm
rh-php73-php-odbc-7.3.29-1.el7.s390x.rpm
rh-php73-php-opcache-7.3.29-1.el7.s390x.rpm
rh-php73-php-pdo-7.3.29-1.el7.s390x.rpm
rh-php73-php-pgsql-7.3.29-1.el7.s390x.rpm
rh-php73-php-process-7.3.29-1.el7.s390x.rpm
rh-php73-php-pspell-7.3.29-1.el7.s390x.rpm
rh-php73-php-recode-7.3.29-1.el7.s390x.rpm
rh-php73-php-snmp-7.3.29-1.el7.s390x.rpm
rh-php73-php-soap-7.3.29-1.el7.s390x.rpm
rh-php73-php-xml-7.3.29-1.el7.s390x.rpm
rh-php73-php-xmlrpc-7.3.29-1.el7.s390x.rpm
rh-php73-php-zip-7.3.29-1.el7.s390x.rpm
x86_64:
rh-php73-php-7.3.29-1.el7.x86_64.rpm
rh-php73-php-bcmath-7.3.29-1.el7.x86_64.rpm
rh-php73-php-cli-7.3.29-1.el7.x86_64.rpm
rh-php73-php-common-7.3.29-1.el7.x86_64.rpm
rh-php73-php-dba-7.3.29-1.el7.x86_64.rpm
rh-php73-php-dbg-7.3.29-1.el7.x86_64.rpm
rh-php73-php-debuginfo-7.3.29-1.el7.x86_64.rpm
rh-php73-php-devel-7.3.29-1.el7.x86_64.rpm
rh-php73-php-embedded-7.3.29-1.el7.x86_64.rpm
rh-php73-php-enchant-7.3.29-1.el7.x86_64.rpm
rh-php73-php-fpm-7.3.29-1.el7.x86_64.rpm
rh-php73-php-gd-7.3.29-1.el7.x86_64.rpm
rh-php73-php-gmp-7.3.29-1.el7.x86_64.rpm
rh-php73-php-intl-7.3.29-1.el7.x86_64.rpm
rh-php73-php-json-7.3.29-1.el7.x86_64.rpm
rh-php73-php-ldap-7.3.29-1.el7.x86_64.rpm
rh-php73-php-mbstring-7.3.29-1.el7.x86_64.rpm
rh-php73-php-mysqlnd-7.3.29-1.el7.x86_64.rpm
rh-php73-php-odbc-7.3.29-1.el7.x86_64.rpm
rh-php73-php-opcache-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pdo-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pgsql-7.3.29-1.el7.x86_64.rpm
rh-php73-php-process-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pspell-7.3.29-1.el7.x86_64.rpm
rh-php73-php-recode-7.3.29-1.el7.x86_64.rpm
rh-php73-php-snmp-7.3.29-1.el7.x86_64.rpm
rh-php73-php-soap-7.3.29-1.el7.x86_64.rpm
rh-php73-php-xml-7.3.29-1.el7.x86_64.rpm
rh-php73-php-xmlrpc-7.3.29-1.el7.x86_64.rpm
rh-php73-php-zip-7.3.29-1.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-php73-php-7.3.29-1.el7.src.rpm
x86_64:
rh-php73-php-7.3.29-1.el7.x86_64.rpm
rh-php73-php-bcmath-7.3.29-1.el7.x86_64.rpm
rh-php73-php-cli-7.3.29-1.el7.x86_64.rpm
rh-php73-php-common-7.3.29-1.el7.x86_64.rpm
rh-php73-php-dba-7.3.29-1.el7.x86_64.rpm
rh-php73-php-dbg-7.3.29-1.el7.x86_64.rpm
rh-php73-php-debuginfo-7.3.29-1.el7.x86_64.rpm
rh-php73-php-devel-7.3.29-1.el7.x86_64.rpm
rh-php73-php-embedded-7.3.29-1.el7.x86_64.rpm
rh-php73-php-enchant-7.3.29-1.el7.x86_64.rpm
rh-php73-php-fpm-7.3.29-1.el7.x86_64.rpm
rh-php73-php-gd-7.3.29-1.el7.x86_64.rpm
rh-php73-php-gmp-7.3.29-1.el7.x86_64.rpm
rh-php73-php-intl-7.3.29-1.el7.x86_64.rpm
rh-php73-php-json-7.3.29-1.el7.x86_64.rpm
rh-php73-php-ldap-7.3.29-1.el7.x86_64.rpm
rh-php73-php-mbstring-7.3.29-1.el7.x86_64.rpm
rh-php73-php-mysqlnd-7.3.29-1.el7.x86_64.rpm
rh-php73-php-odbc-7.3.29-1.el7.x86_64.rpm
rh-php73-php-opcache-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pdo-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pgsql-7.3.29-1.el7.x86_64.rpm
rh-php73-php-process-7.3.29-1.el7.x86_64.rpm
rh-php73-php-pspell-7.3.29-1.el7.x86_64.rpm
rh-php73-php-recode-7.3.29-1.el7.x86_64.rpm
rh-php73-php-snmp-7.3.29-1.el7.x86_64.rpm
rh-php73-php-soap-7.3.29-1.el7.x86_64.rpm
rh-php73-php-xml-7.3.29-1.el7.x86_64.rpm
rh-php73-php-xmlrpc-7.3.29-1.el7.x86_64.rpm
rh-php73-php-zip-7.3.29-1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-7068
https://access.redhat.com/security/cve/CVE-2020-7069
https://access.redhat.com/security/cve/CVE-2020-7070
https://access.redhat.com/security/cve/CVE-2020-7071
https://access.redhat.com/security/cve/CVE-2021-21702
https://access.redhat.com/security/cve/CVE-2021-21705
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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waMi
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202012-16
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Low
Title: PHP: Multiple vulnerabilities
Date: December 23, 2020
Bugs: #711140, #745993, #756775
ID: 202012-16
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in PHP, the worst of which
could result in a Denial of Service condition.
Background
==========
PHP is an open source general-purpose scripting language that is
especially suited for web development.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-lang/php < 8.0.0 >= 7.2.34-r1:7.2
>= 7.3.25:7.3
>= 7.4.13:7.4
Description
===========
Multiple vulnerabilities have been discovered in PHP. Please review the
CVE identifiers and change log referenced below for details.
Impact
======
An attacker could cause a Denial of Service condition or obtain
sensitive information.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All PHP 7.2.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/php-7.2.34-r1:7.2"
All PHP 7.3.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/php-7.3.25:7.3"
All PHP 7.4.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/php-7.4.13:7.4"
References
==========
[ 1 ] CVE-2020-7069
https://nvd.nist.gov/vuln/detail/CVE-2020-7069
[ 2 ] CVE-2020-7070
https://nvd.nist.gov/vuln/detail/CVE-2020-7070
[ 3 ] PHP 7.4.13 Change Log
https://www.php.net/ChangeLog-7.php#7.4.13
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202012-16
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2020 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. =========================================================================
Ubuntu Security Notice USN-4583-2
October 27, 2020
php7.4 vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.10
Summary:
Several security issues were fixed in PHP. This update provides
the corresponding update for Ubuntu 20.10.
Original advisory details:
It was discovered that PHP incorrectly handled certain encrypt ciphers. (CVE-2020-7069)
It was discorevered that PHP incorrectly handled certain HTTP cookies.
An attacker could possibly use this issue to forge cookie which is supposed to
be secure. (CVE-2020-7070)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.10:
libapache2-mod-php7.4 7.4.9-1ubuntu1.1
php7.4-cgi 7.4.9-1ubuntu1.1
php7.4-cli 7.4.9-1ubuntu1.1
php7.4-curl 7.4.9-1ubuntu1.1
php7.4-fpm 7.4.9-1ubuntu1.1
In general, a standard system update will make all the necessary changes.
For the stable distribution (buster), these problems have been fixed in
version 7.3.27-1~deb10u1.
We recommend that you upgrade your php7.3 packages.
For the detailed security status of php7.3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php7.3
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmAtkVwACgkQEMKTtsN8
TjZ41g//e8PiVKbNVmYAbvssLu1ftKMLRmKkzQZZo4EK8GK50i25SKxlEVgGqFef
PCbr7AaD3eGrTOTzIE5wqJclhhx664DAWeM68rEJKfn0w5EYznCi/h/vyBiEW4eH
DAkBHcckCOMwsXgdvfQk/HAtqA1xoPmC8DZnbpgkd7feXT9/b/YYvv2dQxTMCaT3
AWaX4DBFOQVuk2yyLW9uCNC/cZBkeD3sTZFllV2SsXVr9NKMz3zxMsQAv1UlCTdl
8o8UM7d+zU3a5U5Ua1ENa2QR+RK0jhdRGgkJaXHZbdgZ+uV9rmt/PsV6NFzDseRv
/lv44YF+Qs1a5u8SIUORB6BVMhCWECXgXBEQHXsoN+63xc8UcOIpI5tQHq+D4/MY
YDyzC9W+fCred/NjVbaPUce6kxoz7k79/dfYbiE/sXj3pvoXqLRj9biRYUM2+/En
vzstFBnZqwMv04zSzx+JALpFhkBv5ddg5R03B10o/FxndSJak1dGTUKOsa6M31qR
0pEeKmMizGq7Ws1QmqEvWfbR/uXEd43sEoaC0+OVB6XntUISRmUAj5hkFt/Yy3bd
622nZfXyhdepoPCXTEaDearJd2qdL8wcREG4f+42PMwhjTys/Iw0eVR5LGdKnlmX
lbkT1Q1MX3XNbAQTIQpYX0TJJ9oCFU8Wq9HLlV2Eatqb2Hw7AEQ=
=9Q7e
-----END PGP SIGNATURE-----
| VAR-202005-0919 | CVE-2020-9840 | SwiftNIO Extras Vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In SwiftNIO Extras before 1.4.1, a logic issue was addressed with improved restrictions. SwiftNIO Extras There is an unspecified vulnerability in.Service operation interruption (DoS) It may be put into a state. Apple SwiftNIO Extras is an extension of the SwiftNIO network application framework of Apple (Apple). A security vulnerability exists in Apple SwiftNIO Extras prior to 1.4.1. A remote attacker could exploit this vulnerability to cause a denial of service in the client or server
| VAR-202005-1062 | No CVE | Apparent video surveillance system has arbitrary file reading vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Apstar focuses on ultra-high-definition, ultra-telephoto, multi-spectral, thermal imaging product technical services and overall customized solutions.
The Apex video surveillance system has an arbitrary file reading vulnerability. The vulnerability is due to the fact that its video surveillance background does not perform any filtering and verification of resource requests, resulting in direct reading of system files across directories. Attackers can use this vulnerability to perform arbitrary Reading of files.
| VAR-202005-1083 | No CVE | Xiaomi Mi Box memory corruption vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Xiaomi Mi Box is a Xiaomi set-top box application.
There is a memory corruption vulnerability in Xiaomi Mi Box. An attacker can use this vulnerability to execute arbitrary code in the context of the currently logged in user, which may result in a denial of service condition.
| VAR-202005-1093 | No CVE | Ruijie IoT platform has weak password vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Ruijie Networks Co., Ltd. is a company mainly engaged in information system integration services, Internet virtual private network services, Internet management services and other projects.
There is a weak password vulnerability in the Ruijie Internet of Things platform. Attackers can use this vulnerability to log in to the system to obtain sensitive information or perform unauthorized operations.
| VAR-202005-1094 | No CVE | Unauthorized access vulnerability exists in Jiu'an video surveillance equipment |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Guangzhou Jiu'an Intelligent Technology Co., Ltd. (Jiu'an JUAN) is the world's leading provider of mobile image transmission infrastructure and Internet of Things platforms.
Unauthorized access vulnerability exists in Jiu'an video surveillance equipment, which can be exploited by attackers to obtain sensitive website information.
| VAR-202005-0588 | CVE-2019-20795 | iproute2 Vulnerability in using free memory in |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may block exploitability. iproute2 Is vulnerable to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. in the Linux kernel by American Stephen Hemminger software developer. A resource management error vulnerability exists in the 'get_netnsid_from_name' function of the ip/ipnetns.c file in iproute2 versions prior to 5.1.0. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202008-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: iproute2: Denial of service
Date: August 08, 2020
Bugs: #722144
ID: 202008-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
A use-after-free was found in iproute2, possibly allowing a Denial of
Service condition.
Background
=========
iproute2 is a set of tools for managing Linux network routing and
advanced features.
Affected packages
================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 sys-apps/iproute2 < 5.1.0 >= 5.1.0
Description
==========
iproute2 was found to contain a use-after-free in get_netnsid_from_name
in ip/ipnetns.c.
Impact
=====
A remote attacker, able to feed iproute2 crafted data, may be able to
cause a Denial of Service condition.
Workaround
=========
There is no known workaround at this time.
Resolution
=========
All iproute2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-apps/iproute2-5.1.0"
References
=========
[ 1 ] CVE-2019-20795
https://nvd.nist.gov/vuln/detail/CVE-2019-20795
Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202008-06
Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
======
Copyright 2020 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. =========================================================================
Ubuntu Security Notice USN-4357-1
May 13, 2020
iproute2 vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
Summary:
IPRoute could be made to execute arbitrary code if it received a specially
crafted input.
Software Description:
- iproute2: networking and traffic control tools
Details:
It was discovered that IPRoute incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
iproute2 4.15.0-2ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4357-1
CVE-2019-20795
Package Information:
https://launchpad.net/ubuntu/+source/iproute2/4.15.0-2ubuntu1.1
| VAR-202005-0397 | CVE-2020-12762 | Red Hat Security Advisory 2021-5128-06 |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend. Bugs fixed (https://bugzilla.redhat.com/):
1944888 - CVE-2021-21409 netty: Request smuggling via content-length header
2004133 - CVE-2021-37136 netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
2004135 - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
2030932 - CVE-2021-44228 log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value
5. JIRA issues fixed (https://issues.jboss.org/):
LOG-1971 - Applying cluster state is causing elasticsearch to hit an issue and become unusable
6.
The following data is constructed from data provided by Red Hat's json file at:
https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_6431.json
Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment.
Description:
The libfastjson library provides essential JavaScript Object Notation (JSON) handling functions. The library enables users to construct JSON objects in C, output them as JSON-formatted strings, and convert JSON-formatted strings back to the C representation of JSON objects.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202006-13
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: json-c: Multiple vulnerabilities
Date: June 15, 2020
Bugs: #722150
ID: 202006-13
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Multiple vulnerabilities have been found in json-c, the worst of which
could result in a Denial of Service condition.
Background
=========
json-c is a JSON implementation in C.
Affected packages
================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-libs/json-c < 0.14-r3 >= 0.14-r3
Description
==========
Multiple vulnerabilities have been discovered in json-c. Please review
the CVE identifiers referenced below for details.
Impact
=====
A remote/local attacker could send a specially crafted file possibly
resulting in a Denial of Service condition.
Workaround
=========
There is no known workaround at this time.
Resolution
=========
All json-c users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">\xdev-libs/json-c-0.14-r3"
References
=========
[ 1 ] CVE-2020-12762
https://nvd.nist.gov/vuln/detail/CVE-2020-12762
Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202006-13
Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
======
Copyright 2020 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. Summary:
The Migration Toolkit for Containers (MTC) 1.5.2 is now available. Description:
The Migration Toolkit for Containers (MTC) enables you to migrate
Kubernetes resources, persistent volume data, and internal container images
between OpenShift Container Platform clusters, using the MTC web console or
the Kubernetes API. Solution:
For details on how to install and use MTC, refer to:
https://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html
4. Bugs fixed (https://bugzilla.redhat.com/):
2000734 - CVE-2021-3757 nodejs-immer: prototype pollution may lead to DoS or remote code execution
2005438 - Combining Rsync and Stunnel in a single pod can degrade performance (1.5 backport)
2006842 - MigCluster CR remains in "unready" state and source registry is inaccessible after temporary shutdown of source cluster
2007429 - "oc describe" and "oc log" commands on "Migration resources" tree cannot be copied after failed migration
2022017 - CVE-2021-3948 mig-controller: incorrect namespaces handling may lead to not authorized usage of Migration Toolkit for Containers (MTC)
5. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Openshift Logging 5.3.0 bug fix and security update
Advisory ID: RHSA-2021:4627-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2021:4627
Issue date: 2021-11-15
CVE Names: CVE-2018-20673 CVE-2018-25009 CVE-2018-25010
CVE-2018-25012 CVE-2018-25013 CVE-2018-25014
CVE-2019-5827 CVE-2019-13750 CVE-2019-13751
CVE-2019-14615 CVE-2019-17594 CVE-2019-17595
CVE-2019-18218 CVE-2019-19603 CVE-2019-20838
CVE-2020-0427 CVE-2020-10001 CVE-2020-12762
CVE-2020-13435 CVE-2020-14145 CVE-2020-14155
CVE-2020-16135 CVE-2020-17541 CVE-2020-24370
CVE-2020-24502 CVE-2020-24503 CVE-2020-24504
CVE-2020-24586 CVE-2020-24587 CVE-2020-24588
CVE-2020-26139 CVE-2020-26140 CVE-2020-26141
CVE-2020-26143 CVE-2020-26144 CVE-2020-26145
CVE-2020-26146 CVE-2020-26147 CVE-2020-27777
CVE-2020-29368 CVE-2020-29660 CVE-2020-35448
CVE-2020-35521 CVE-2020-35522 CVE-2020-35523
CVE-2020-35524 CVE-2020-36158 CVE-2020-36312
CVE-2020-36330 CVE-2020-36331 CVE-2020-36332
CVE-2020-36386 CVE-2021-0129 CVE-2021-3200
CVE-2021-3348 CVE-2021-3426 CVE-2021-3445
CVE-2021-3481 CVE-2021-3487 CVE-2021-3489
CVE-2021-3564 CVE-2021-3572 CVE-2021-3573
CVE-2021-3580 CVE-2021-3600 CVE-2021-3635
CVE-2021-3659 CVE-2021-3679 CVE-2021-3732
CVE-2021-3778 CVE-2021-3796 CVE-2021-3800
CVE-2021-20194 CVE-2021-20197 CVE-2021-20231
CVE-2021-20232 CVE-2021-20239 CVE-2021-20266
CVE-2021-20284 CVE-2021-22876 CVE-2021-22898
CVE-2021-22925 CVE-2021-23133 CVE-2021-23840
CVE-2021-23841 CVE-2021-27645 CVE-2021-28153
CVE-2021-28950 CVE-2021-28971 CVE-2021-29155
CVE-2021-29646 CVE-2021-29650 CVE-2021-31440
CVE-2021-31535 CVE-2021-31829 CVE-2021-31916
CVE-2021-33033 CVE-2021-33194 CVE-2021-33200
CVE-2021-33560 CVE-2021-33574 CVE-2021-35942
CVE-2021-36084 CVE-2021-36085 CVE-2021-36086
CVE-2021-36087 CVE-2021-42574
=====================================================================
1. Summary:
An update is now available for OpenShift Logging 5.3.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Description:
Openshift Logging Bug Fix Release (5.3.0)
Security Fix(es):
* golang: x/net/html: infinite loop in ParseFragment (CVE-2021-33194)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
3. Solution:
For OpenShift Container Platform 4.9 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this errata update:
https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html
For Red Hat OpenShift Logging 5.3, see the following instructions to apply
this update:
https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html
4. Bugs fixed (https://bugzilla.redhat.com/):
1963232 - CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment
5. JIRA issues fixed (https://issues.jboss.org/):
LOG-1168 - Disable hostname verification in syslog TLS settings
LOG-1235 - Using HTTPS without a secret does not translate into the correct 'scheme' value in Fluentd
LOG-1375 - ssl_ca_cert should be optional
LOG-1378 - CLO should support sasl_plaintext(Password over http)
LOG-1392 - In fluentd config, flush_interval can't be set with flush_mode=immediate
LOG-1494 - Syslog output is serializing json incorrectly
LOG-1555 - Fluentd logs emit transaction failed: error_class=NoMethodError while forwarding to external syslog server
LOG-1575 - Rejected by Elasticsearch and unexpected json-parsing
LOG-1735 - Regression introducing flush_at_shutdown
LOG-1774 - The collector logs should be excluded in fluent.conf
LOG-1776 - fluentd total_limit_size sets value beyond available space
LOG-1822 - OpenShift Alerting Rules Style-Guide Compliance
LOG-1859 - CLO Should not error and exit early on missing ca-bundle when cluster wide proxy is not enabled
LOG-1862 - Unsupported kafka parameters when enabled Kafka SASL
LOG-1903 - Fix the Display of ClusterLogging type in OLM
LOG-1911 - CLF API changes to Opt-in to multiline error detection
LOG-1918 - Alert `FluentdNodeDown` always firing
LOG-1939 - Opt-in multiline detection breaks cloudwatch forwarding
6. References:
https://access.redhat.com/security/cve/CVE-2018-20673
https://access.redhat.com/security/cve/CVE-2018-25009
https://access.redhat.com/security/cve/CVE-2018-25010
https://access.redhat.com/security/cve/CVE-2018-25012
https://access.redhat.com/security/cve/CVE-2018-25013
https://access.redhat.com/security/cve/CVE-2018-25014
https://access.redhat.com/security/cve/CVE-2019-5827
https://access.redhat.com/security/cve/CVE-2019-13750
https://access.redhat.com/security/cve/CVE-2019-13751
https://access.redhat.com/security/cve/CVE-2019-14615
https://access.redhat.com/security/cve/CVE-2019-17594
https://access.redhat.com/security/cve/CVE-2019-17595
https://access.redhat.com/security/cve/CVE-2019-18218
https://access.redhat.com/security/cve/CVE-2019-19603
https://access.redhat.com/security/cve/CVE-2019-20838
https://access.redhat.com/security/cve/CVE-2020-0427
https://access.redhat.com/security/cve/CVE-2020-10001
https://access.redhat.com/security/cve/CVE-2020-12762
https://access.redhat.com/security/cve/CVE-2020-13435
https://access.redhat.com/security/cve/CVE-2020-14145
https://access.redhat.com/security/cve/CVE-2020-14155
https://access.redhat.com/security/cve/CVE-2020-16135
https://access.redhat.com/security/cve/CVE-2020-17541
https://access.redhat.com/security/cve/CVE-2020-24370
https://access.redhat.com/security/cve/CVE-2020-24502
https://access.redhat.com/security/cve/CVE-2020-24503
https://access.redhat.com/security/cve/CVE-2020-24504
https://access.redhat.com/security/cve/CVE-2020-24586
https://access.redhat.com/security/cve/CVE-2020-24587
https://access.redhat.com/security/cve/CVE-2020-24588
https://access.redhat.com/security/cve/CVE-2020-26139
https://access.redhat.com/security/cve/CVE-2020-26140
https://access.redhat.com/security/cve/CVE-2020-26141
https://access.redhat.com/security/cve/CVE-2020-26143
https://access.redhat.com/security/cve/CVE-2020-26144
https://access.redhat.com/security/cve/CVE-2020-26145
https://access.redhat.com/security/cve/CVE-2020-26146
https://access.redhat.com/security/cve/CVE-2020-26147
https://access.redhat.com/security/cve/CVE-2020-27777
https://access.redhat.com/security/cve/CVE-2020-29368
https://access.redhat.com/security/cve/CVE-2020-29660
https://access.redhat.com/security/cve/CVE-2020-35448
https://access.redhat.com/security/cve/CVE-2020-35521
https://access.redhat.com/security/cve/CVE-2020-35522
https://access.redhat.com/security/cve/CVE-2020-35523
https://access.redhat.com/security/cve/CVE-2020-35524
https://access.redhat.com/security/cve/CVE-2020-36158
https://access.redhat.com/security/cve/CVE-2020-36312
https://access.redhat.com/security/cve/CVE-2020-36330
https://access.redhat.com/security/cve/CVE-2020-36331
https://access.redhat.com/security/cve/CVE-2020-36332
https://access.redhat.com/security/cve/CVE-2020-36386
https://access.redhat.com/security/cve/CVE-2021-0129
https://access.redhat.com/security/cve/CVE-2021-3200
https://access.redhat.com/security/cve/CVE-2021-3348
https://access.redhat.com/security/cve/CVE-2021-3426
https://access.redhat.com/security/cve/CVE-2021-3445
https://access.redhat.com/security/cve/CVE-2021-3481
https://access.redhat.com/security/cve/CVE-2021-3487
https://access.redhat.com/security/cve/CVE-2021-3489
https://access.redhat.com/security/cve/CVE-2021-3564
https://access.redhat.com/security/cve/CVE-2021-3572
https://access.redhat.com/security/cve/CVE-2021-3573
https://access.redhat.com/security/cve/CVE-2021-3580
https://access.redhat.com/security/cve/CVE-2021-3600
https://access.redhat.com/security/cve/CVE-2021-3635
https://access.redhat.com/security/cve/CVE-2021-3659
https://access.redhat.com/security/cve/CVE-2021-3679
https://access.redhat.com/security/cve/CVE-2021-3732
https://access.redhat.com/security/cve/CVE-2021-3778
https://access.redhat.com/security/cve/CVE-2021-3796
https://access.redhat.com/security/cve/CVE-2021-3800
https://access.redhat.com/security/cve/CVE-2021-20194
https://access.redhat.com/security/cve/CVE-2021-20197
https://access.redhat.com/security/cve/CVE-2021-20231
https://access.redhat.com/security/cve/CVE-2021-20232
https://access.redhat.com/security/cve/CVE-2021-20239
https://access.redhat.com/security/cve/CVE-2021-20266
https://access.redhat.com/security/cve/CVE-2021-20284
https://access.redhat.com/security/cve/CVE-2021-22876
https://access.redhat.com/security/cve/CVE-2021-22898
https://access.redhat.com/security/cve/CVE-2021-22925
https://access.redhat.com/security/cve/CVE-2021-23133
https://access.redhat.com/security/cve/CVE-2021-23840
https://access.redhat.com/security/cve/CVE-2021-23841
https://access.redhat.com/security/cve/CVE-2021-27645
https://access.redhat.com/security/cve/CVE-2021-28153
https://access.redhat.com/security/cve/CVE-2021-28950
https://access.redhat.com/security/cve/CVE-2021-28971
https://access.redhat.com/security/cve/CVE-2021-29155
https://access.redhat.com/security/cve/CVE-2021-29646
https://access.redhat.com/security/cve/CVE-2021-29650
https://access.redhat.com/security/cve/CVE-2021-31440
https://access.redhat.com/security/cve/CVE-2021-31535
https://access.redhat.com/security/cve/CVE-2021-31829
https://access.redhat.com/security/cve/CVE-2021-31916
https://access.redhat.com/security/cve/CVE-2021-33033
https://access.redhat.com/security/cve/CVE-2021-33194
https://access.redhat.com/security/cve/CVE-2021-33200
https://access.redhat.com/security/cve/CVE-2021-33560
https://access.redhat.com/security/cve/CVE-2021-33574
https://access.redhat.com/security/cve/CVE-2021-35942
https://access.redhat.com/security/cve/CVE-2021-36084
https://access.redhat.com/security/cve/CVE-2021-36085
https://access.redhat.com/security/cve/CVE-2021-36086
https://access.redhat.com/security/cve/CVE-2021-36087
https://access.redhat.com/security/cve/CVE-2021-42574
https://access.redhat.com/security/updates/classification/#moderate
7. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=di1X
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
. Description:
This version of the OpenShift Serverless Operator is supported on Red Hat
OpenShift Container Platform versions 4.6, 4.7, 4.8, and 4.9, and includes
security and bug fixes and enhancements. Solution:
See the Red Hat OpenShift Container Platform 4.6 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index
See the Red Hat OpenShift Container Platform 4.7 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index
See the Red Hat OpenShift Container Platform 4.8 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index
See the Red Hat OpenShift Container Platform 4.9 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index
4. Bugs fixed (https://bugzilla.redhat.com/):
1992006 - CVE-2021-29923 golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet
2006044 - CVE-2021-39293 golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)
2012887 - CVE-2021-38297 golang: Command-line arguments may overwrite global data
2024838 - Release of OpenShift Serverless Eventing 1.20.0
2024839 - Release of OpenShift Serverless Serving 1.20.0
5
| VAR-202005-1250 | No CVE | Advantech WebAccess/SCADA DATACORE IOCTL 0x520B Heap-based Buffer Overflow Remote Code Execution Vulnerability |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x520B in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.
| VAR-202005-1246 | No CVE | Advantech WebAccess/SCADA DATACORE IOCTL 0x520B Heap-based Buffer Overflow Remote Code Execution Vulnerability |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x520B in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.
| VAR-202005-1243 | No CVE | Advantech WebAccess/SCADA DATACORE IOCTL 0x5218 Heap-based Buffer Overflow Remote Code Execution Vulnerability |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x5218 in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.
| VAR-202005-1242 | No CVE | Advantech WebAccess/SCADA DATACORE IOCTL 0x521B Heap-based Buffer Overflow Remote Code Execution Vulnerability |
CVSS V2: - CVSS V3: 9.8 Severity: CRITICAL |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of IOCTL 0x521B in datacore.exe. The issue results from the lack of proper validation of user-supplied data, which can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of Administrator.