VARIoT IoT vulnerabilities database

VAR-201912-0709 | CVE-2019-20070 | Netis DL4323 Device cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
On Netis DL4323 devices, XSS exists via the urlFQDN parameter to form2url.cgi (aka the Keyword field of the URL Blocking Configuration). Netis DL4323 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. NETCORE Netis DL4323 is a multifunctional modem from China Netcore Corporation.
A cross-site scripting vulnerability exists in NETCORE Netis DL4323. The vulnerability stems from the lack of proper verification of client data by web applications. Attackers can use this vulnerability to execute client code
VAR-201912-0710 | CVE-2019-20071 | Netis DL4323 Device cross-site request forgery vulnerability |
CVSS V2: 5.8 CVSS V3: 6.5 Severity: MEDIUM |
On Netis DL4323 devices, CSRF exists via form2logaction.cgi to delete all logs. Netis DL4323 The device contains a cross-site request forgery vulnerability.Information may be tampered with. NETCORE Netis DL4323 is a multifunctional modem from China Netcore Corporation. The vulnerability stems from a web application's insufficient verification that the request came from a trusted user. An attacker could use this vulnerability to send an unexpected request to the server through an affected client
VAR-201912-0713 | CVE-2019-20074 | Netis DL4323 Vulnerability related to information leak from cache in device |
CVSS V2: 4.0 CVSS V3: 8.8 Severity: HIGH |
On Netis DL4323 devices, any user role can view sensitive information, such as a user password or the FTP password, via the form2saveConf.cgi page. Netis DL4323 The device contains a vulnerability related to information disclosure from the cache.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. NETCORE Netis DL4323 is a multifunctional modem from China Netcore Corporation.
An information disclosure vulnerability exists in NETCORE Netis DL4323
VAR-201912-0712 | CVE-2019-20073 | Netis DL4323 Device cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
On Netis DL4323 devices, XSS exists via the form2userconfig.cgi username parameter (User Account Configuration). Netis DL4323 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. NETCORE Netis DL4323 is a multifunctional modem from China Netcore Corporation.
A cross-site scripting vulnerability exists in NETCORE Netis DL4323. The vulnerability stems from the lack of proper verification of client data by web applications. Attackers can use this vulnerability to execute client code
VAR-201912-0711 | CVE-2019-20072 | Netis DL4323 Device cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
On Netis DL4323 devices, XSS exists via the form2Ddns.cgi hostname parameter (Dynamic DNS Configuration). Netis DL4323 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. NETCORE Netis DL4323 is a multifunctional modem from China Netcore Corporation.
A cross-site scripting vulnerability exists in NETCORE Netis DL4323. The vulnerability stems from the lack of proper verification of client data by web applications. Attackers can use this vulnerability to execute client code
VAR-201912-2002 | No CVE | Denial of Service Vulnerability in TP-Link AC1900 Router |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
TP-Link AC1900 is a mini wireless router of China TP-Link.
TP-Link AC1900 has a denial of service vulnerability, which can be exploited by an attacker to cause a denial of service.
VAR-201912-1673 | CVE-2014-4558 | WordPress for Swipe Checkout for WooCommerce Cross-site scripting vulnerability in plugin |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in test-plugin.php in the Swipe Checkout for WooCommerce plugin 2.7.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the api_url parameter. WordPress is a blogging platform developed by the WordPress Foundation using PHP language. The platform supports setting up personal blog sites on PHP and MySQL servers. Swipe Checkout for WooCommerce is a payment plugin for e-commerce used in it. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
VAR-201912-2013 | No CVE | TL-WR840N Denial of Service Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
TL-WR840N is a mini wireless router from China TP-Link.
TL-WR840N has a denial of service vulnerability. An attacker could exploit this vulnerability to cause a denial of service.
VAR-201912-0003 | CVE-2007-0158 | thttpd Vulnerable to out-of-bounds writing |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
thttpd 2007 has buffer underflow. thttpd Contains an out-of-bounds write vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. thttpd is a lightweight open source web server from ACME Labs. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow
VAR-201912-1595 | CVE-2013-4743 | Static HTTP Server Vulnerable to classical buffer overflow |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Static HTTP Server 1.0 has a Local Overflow. Static HTTP Server Contains a classic buffer overflow vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow
VAR-201912-1674 | CVE-2014-4559 | WordPress for Swipe Checkout for WP e-Commerce Plug-in vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in test-plugin.php in the Swipe Checkout for WP e-Commerce plugin 3.1.0 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) api_key, (2) payment_page_url, (3) merchant_id, (4) api_url, or (5) currency parameter. WordPress is a blogging platform developed by the WordPress Foundation using PHP language. The platform supports setting up personal blog sites on PHP and MySQL servers. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
VAR-202010-0251 | CVE-2019-17006 | Network Security Services Vulnerability for inadequate validation of data reliability in |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow. Network Security Services (NSS) Exists in an inadequate validation of data reliability vulnerabilities.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state.
For the stable distribution (buster), these problems have been fixed in
version 2:3.42.1-1+deb10u3.
For the detailed security status of nss please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/nss
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=VQPA
-----END PGP SIGNATURE-----
. Solution:
For information on upgrading Ansible Tower, reference the Ansible Tower
Upgrade and Migration Guide:
https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/
index.html
4. Bugs fixed (https://bugzilla.redhat.com/):
1790277 - CVE-2019-20372 nginx: HTTP request smuggling in configurations with URL redirect used as error_page
1828406 - CVE-2020-11022 jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method
1850004 - CVE-2020-11023 jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution
1911314 - CVE-2020-35678 python-autobahn: allows redirect header injection
1928847 - CVE-2021-20253 ansible-tower: Privilege escalation via job isolation escape
5. Description:
Red Hat 3scale API Management delivers centralized API management features
through a distributed, cloud-hosted layer. It includes built-in features to
help in building a more successful API program, including access control,
rate limits, payment gateway integration, and developer experience tools.
This advisory is intended to use with container images for Red Hat 3scale
API Management 2.10.0. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):
1804533 - CVE-2020-9283 golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic
1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
5. Description:
Red Hat OpenShift Do (odo) is a simple CLI tool for developers to create,
build, and deploy applications on OpenShift. The odo tool is completely
client-based and requires no server within the OpenShift cluster for
deployment. It detects changes to local code and deploys it to the cluster
automatically, giving instant feedback to validate changes in real-time. It
supports multiple programming languages and frameworks.
The advisory addresses the following issues:
* Re-release of odo-init-image 1.1.3 for security updates
3. Solution:
Download and install a new CLI binary by following the instructions linked
from the References section. Bugs fixed (https://bugzilla.redhat.com/):
1832983 - Release of 1.1.3 odo-init-image
5. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: nss and nspr security, bug fix, and enhancement update
Advisory ID: RHSA-2020:4076-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4076
Issue date: 2020-09-29
CVE Names: CVE-2019-11719 CVE-2019-11727 CVE-2019-11756
CVE-2019-17006 CVE-2019-17023 CVE-2020-6829
CVE-2020-12400 CVE-2020-12401 CVE-2020-12402
CVE-2020-12403
====================================================================
1. Summary:
An update for nss, nss-softokn, nss-util, and nspr is now available for Red
Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
Network Security Services (NSS) is a set of libraries designed to support
the cross-platform development of security-enabled client and server
applications.
Netscape Portable Runtime (NSPR) provides platform independence for non-GUI
operating system facilities.
The following packages have been upgraded to a later upstream version: nss
(3.53.1), nss-softokn (3.53.1), nss-util (3.53.1), nspr (4.25.0).
(BZ#1804262, BZ#1804264, BZ#1804271, BZ#1804273)
Security Fix(es):
* nss: Out-of-bounds read when importing curve25519 private key
(CVE-2019-11719)
* nss: Use-after-free in sftk_FreeSession due to improper refcounting
(CVE-2019-11756)
* nss: Check length of inputs for cryptographic primitives (CVE-2019-17006)
* nss: Side channel attack on ECDSA signature generation (CVE-2020-6829)
* nss: P-384 and P-521 implementation uses a side-channel vulnerable
modular inversion function (CVE-2020-12400)
* nss: ECDSA timing attack mitigation bypass (CVE-2020-12401)
* nss: Side channel vulnerabilities during RSA key generation
(CVE-2020-12402)
* nss: CHACHA20-POLY1305 decryption with undersized tag leads to
out-of-bounds read (CVE-2020-12403)
* nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727)
* nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid
state (CVE-2019-17023)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* Memory leak: libcurl leaks 120 bytes on each connection (BZ#1688958)
* NSS does not set downgrade sentinel in ServerHello.random for TLS 1.0 and
TLS 1.1 (BZ#1712924)
* Make TLS 1.3 work in FIPS mode (BZ#1724251)
* Name Constraints validation: CN treated as DNS name even when
syntactically invalid as DNS name (BZ#1737910)
* x25519 allowed in FIPS mode (BZ#1754518)
* When NSS_SDB_USE_CACHE not set, after curl access https, dentry increase
but never released - consider alternative algorithm for benchmarking ACCESS
call in sdb_measureAccess (BZ#1779325)
* Running ipa-backup continuously causes httpd to crash and makes it
irrecoverable (BZ#1804015)
* nss needs to comply to the new SP800-56A rev 3 requirements (BZ#1857308)
* KDF-self-tests-induced changes for nss in RHEL 7.9 (BZ#1870885)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, applications using NSS or NSPR (for example,
Firefox) must be restarted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1688958 - Memory leak: libcurl leaks 120 bytes on each connection [rhel-7.9.z]
1724251 - Make TLS 1.3 work in FIPS mode [rhel-7.9.z]
1728436 - CVE-2019-11719 nss: Out-of-bounds read when importing curve25519 private key
1730988 - CVE-2019-11727 nss: PKCS#1 v1.5 signatures can be used for TLS 1.3
1737910 - Name Constraints validation: CN treated as DNS name even when syntactically invalid as DNS name [rhel-7.9.z]
1774835 - CVE-2019-11756 nss: Use-after-free in sftk_FreeSession due to improper refcounting
1775916 - CVE-2019-17006 nss: Check length of inputs for cryptographic primitives
1779325 - when NSS_SDB_USE_CACHE not set, after curl access https, dentry increase but never released - consider alternative algorithm for benchmarking ACCESS call in sdb_measureAccess
1791225 - CVE-2019-17023 nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state
1804015 - Running ipa-backup continuously causes httpd to crash and makes it irrecoverable
1826187 - CVE-2020-6829 nss: Side channel attack on ECDSA signature generation
1826231 - CVE-2020-12402 nss: Side channel vulnerabilities during RSA key generation
1851294 - CVE-2020-12401 nss: ECDSA timing attack mitigation bypass
1853983 - CVE-2020-12400 nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function
1868931 - CVE-2020-12403 nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read
1870885 - KDF-self-tests-induced changes for nss in RHEL 7.9
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
nspr-4.25.0-2.el7_9.src.rpm
nss-3.53.1-3.el7_9.src.rpm
nss-softokn-3.53.1-6.el7_9.src.rpm
nss-util-3.53.1-1.el7_9.src.rpm
x86_64:
nspr-4.25.0-2.el7_9.i686.rpm
nspr-4.25.0-2.el7_9.x86_64.rpm
nspr-debuginfo-4.25.0-2.el7_9.i686.rpm
nspr-debuginfo-4.25.0-2.el7_9.x86_64.rpm
nss-3.53.1-3.el7_9.i686.rpm
nss-3.53.1-3.el7_9.x86_64.rpm
nss-debuginfo-3.53.1-3.el7_9.i686.rpm
nss-debuginfo-3.53.1-3.el7_9.x86_64.rpm
nss-softokn-3.53.1-6.el7_9.i686.rpm
nss-softokn-3.53.1-6.el7_9.x86_64.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.i686.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.x86_64.rpm
nss-softokn-freebl-3.53.1-6.el7_9.i686.rpm
nss-softokn-freebl-3.53.1-6.el7_9.x86_64.rpm
nss-sysinit-3.53.1-3.el7_9.x86_64.rpm
nss-tools-3.53.1-3.el7_9.x86_64.rpm
nss-util-3.53.1-1.el7_9.i686.rpm
nss-util-3.53.1-1.el7_9.x86_64.rpm
nss-util-debuginfo-3.53.1-1.el7_9.i686.rpm
nss-util-debuginfo-3.53.1-1.el7_9.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
nspr-debuginfo-4.25.0-2.el7_9.i686.rpm
nspr-debuginfo-4.25.0-2.el7_9.x86_64.rpm
nspr-devel-4.25.0-2.el7_9.i686.rpm
nspr-devel-4.25.0-2.el7_9.x86_64.rpm
nss-debuginfo-3.53.1-3.el7_9.i686.rpm
nss-debuginfo-3.53.1-3.el7_9.x86_64.rpm
nss-devel-3.53.1-3.el7_9.i686.rpm
nss-devel-3.53.1-3.el7_9.x86_64.rpm
nss-pkcs11-devel-3.53.1-3.el7_9.i686.rpm
nss-pkcs11-devel-3.53.1-3.el7_9.x86_64.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.i686.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.x86_64.rpm
nss-softokn-devel-3.53.1-6.el7_9.i686.rpm
nss-softokn-devel-3.53.1-6.el7_9.x86_64.rpm
nss-softokn-freebl-devel-3.53.1-6.el7_9.i686.rpm
nss-softokn-freebl-devel-3.53.1-6.el7_9.x86_64.rpm
nss-util-debuginfo-3.53.1-1.el7_9.i686.rpm
nss-util-debuginfo-3.53.1-1.el7_9.x86_64.rpm
nss-util-devel-3.53.1-1.el7_9.i686.rpm
nss-util-devel-3.53.1-1.el7_9.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
nspr-4.25.0-2.el7_9.src.rpm
nss-3.53.1-3.el7_9.src.rpm
nss-softokn-3.53.1-6.el7_9.src.rpm
nss-util-3.53.1-1.el7_9.src.rpm
x86_64:
nspr-4.25.0-2.el7_9.i686.rpm
nspr-4.25.0-2.el7_9.x86_64.rpm
nspr-debuginfo-4.25.0-2.el7_9.i686.rpm
nspr-debuginfo-4.25.0-2.el7_9.x86_64.rpm
nss-3.53.1-3.el7_9.i686.rpm
nss-3.53.1-3.el7_9.x86_64.rpm
nss-debuginfo-3.53.1-3.el7_9.i686.rpm
nss-debuginfo-3.53.1-3.el7_9.x86_64.rpm
nss-softokn-3.53.1-6.el7_9.i686.rpm
nss-softokn-3.53.1-6.el7_9.x86_64.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.i686.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.x86_64.rpm
nss-softokn-freebl-3.53.1-6.el7_9.i686.rpm
nss-softokn-freebl-3.53.1-6.el7_9.x86_64.rpm
nss-sysinit-3.53.1-3.el7_9.x86_64.rpm
nss-tools-3.53.1-3.el7_9.x86_64.rpm
nss-util-3.53.1-1.el7_9.i686.rpm
nss-util-3.53.1-1.el7_9.x86_64.rpm
nss-util-debuginfo-3.53.1-1.el7_9.i686.rpm
nss-util-debuginfo-3.53.1-1.el7_9.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
nspr-debuginfo-4.25.0-2.el7_9.i686.rpm
nspr-debuginfo-4.25.0-2.el7_9.x86_64.rpm
nspr-devel-4.25.0-2.el7_9.i686.rpm
nspr-devel-4.25.0-2.el7_9.x86_64.rpm
nss-debuginfo-3.53.1-3.el7_9.i686.rpm
nss-debuginfo-3.53.1-3.el7_9.x86_64.rpm
nss-devel-3.53.1-3.el7_9.i686.rpm
nss-devel-3.53.1-3.el7_9.x86_64.rpm
nss-pkcs11-devel-3.53.1-3.el7_9.i686.rpm
nss-pkcs11-devel-3.53.1-3.el7_9.x86_64.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.i686.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.x86_64.rpm
nss-softokn-devel-3.53.1-6.el7_9.i686.rpm
nss-softokn-devel-3.53.1-6.el7_9.x86_64.rpm
nss-softokn-freebl-devel-3.53.1-6.el7_9.i686.rpm
nss-softokn-freebl-devel-3.53.1-6.el7_9.x86_64.rpm
nss-util-debuginfo-3.53.1-1.el7_9.i686.rpm
nss-util-debuginfo-3.53.1-1.el7_9.x86_64.rpm
nss-util-devel-3.53.1-1.el7_9.i686.rpm
nss-util-devel-3.53.1-1.el7_9.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
nspr-4.25.0-2.el7_9.src.rpm
nss-3.53.1-3.el7_9.src.rpm
nss-softokn-3.53.1-6.el7_9.src.rpm
nss-util-3.53.1-1.el7_9.src.rpm
ppc64:
nspr-4.25.0-2.el7_9.ppc.rpm
nspr-4.25.0-2.el7_9.ppc64.rpm
nspr-debuginfo-4.25.0-2.el7_9.ppc.rpm
nspr-debuginfo-4.25.0-2.el7_9.ppc64.rpm
nspr-devel-4.25.0-2.el7_9.ppc.rpm
nspr-devel-4.25.0-2.el7_9.ppc64.rpm
nss-3.53.1-3.el7_9.ppc.rpm
nss-3.53.1-3.el7_9.ppc64.rpm
nss-debuginfo-3.53.1-3.el7_9.ppc.rpm
nss-debuginfo-3.53.1-3.el7_9.ppc64.rpm
nss-devel-3.53.1-3.el7_9.ppc.rpm
nss-devel-3.53.1-3.el7_9.ppc64.rpm
nss-softokn-3.53.1-6.el7_9.ppc.rpm
nss-softokn-3.53.1-6.el7_9.ppc64.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.ppc.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.ppc64.rpm
nss-softokn-devel-3.53.1-6.el7_9.ppc.rpm
nss-softokn-devel-3.53.1-6.el7_9.ppc64.rpm
nss-softokn-freebl-3.53.1-6.el7_9.ppc.rpm
nss-softokn-freebl-3.53.1-6.el7_9.ppc64.rpm
nss-softokn-freebl-devel-3.53.1-6.el7_9.ppc.rpm
nss-softokn-freebl-devel-3.53.1-6.el7_9.ppc64.rpm
nss-sysinit-3.53.1-3.el7_9.ppc64.rpm
nss-tools-3.53.1-3.el7_9.ppc64.rpm
nss-util-3.53.1-1.el7_9.ppc.rpm
nss-util-3.53.1-1.el7_9.ppc64.rpm
nss-util-debuginfo-3.53.1-1.el7_9.ppc.rpm
nss-util-debuginfo-3.53.1-1.el7_9.ppc64.rpm
nss-util-devel-3.53.1-1.el7_9.ppc.rpm
nss-util-devel-3.53.1-1.el7_9.ppc64.rpm
ppc64le:
nspr-4.25.0-2.el7_9.ppc64le.rpm
nspr-debuginfo-4.25.0-2.el7_9.ppc64le.rpm
nspr-devel-4.25.0-2.el7_9.ppc64le.rpm
nss-3.53.1-3.el7_9.ppc64le.rpm
nss-debuginfo-3.53.1-3.el7_9.ppc64le.rpm
nss-devel-3.53.1-3.el7_9.ppc64le.rpm
nss-softokn-3.53.1-6.el7_9.ppc64le.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.ppc64le.rpm
nss-softokn-devel-3.53.1-6.el7_9.ppc64le.rpm
nss-softokn-freebl-3.53.1-6.el7_9.ppc64le.rpm
nss-softokn-freebl-devel-3.53.1-6.el7_9.ppc64le.rpm
nss-sysinit-3.53.1-3.el7_9.ppc64le.rpm
nss-tools-3.53.1-3.el7_9.ppc64le.rpm
nss-util-3.53.1-1.el7_9.ppc64le.rpm
nss-util-debuginfo-3.53.1-1.el7_9.ppc64le.rpm
nss-util-devel-3.53.1-1.el7_9.ppc64le.rpm
s390x:
nspr-4.25.0-2.el7_9.s390.rpm
nspr-4.25.0-2.el7_9.s390x.rpm
nspr-debuginfo-4.25.0-2.el7_9.s390.rpm
nspr-debuginfo-4.25.0-2.el7_9.s390x.rpm
nspr-devel-4.25.0-2.el7_9.s390.rpm
nspr-devel-4.25.0-2.el7_9.s390x.rpm
nss-3.53.1-3.el7_9.s390.rpm
nss-3.53.1-3.el7_9.s390x.rpm
nss-debuginfo-3.53.1-3.el7_9.s390.rpm
nss-debuginfo-3.53.1-3.el7_9.s390x.rpm
nss-devel-3.53.1-3.el7_9.s390.rpm
nss-devel-3.53.1-3.el7_9.s390x.rpm
nss-softokn-3.53.1-6.el7_9.s390.rpm
nss-softokn-3.53.1-6.el7_9.s390x.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.s390.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.s390x.rpm
nss-softokn-devel-3.53.1-6.el7_9.s390.rpm
nss-softokn-devel-3.53.1-6.el7_9.s390x.rpm
nss-softokn-freebl-3.53.1-6.el7_9.s390.rpm
nss-softokn-freebl-3.53.1-6.el7_9.s390x.rpm
nss-softokn-freebl-devel-3.53.1-6.el7_9.s390.rpm
nss-softokn-freebl-devel-3.53.1-6.el7_9.s390x.rpm
nss-sysinit-3.53.1-3.el7_9.s390x.rpm
nss-tools-3.53.1-3.el7_9.s390x.rpm
nss-util-3.53.1-1.el7_9.s390.rpm
nss-util-3.53.1-1.el7_9.s390x.rpm
nss-util-debuginfo-3.53.1-1.el7_9.s390.rpm
nss-util-debuginfo-3.53.1-1.el7_9.s390x.rpm
nss-util-devel-3.53.1-1.el7_9.s390.rpm
nss-util-devel-3.53.1-1.el7_9.s390x.rpm
x86_64:
nspr-4.25.0-2.el7_9.i686.rpm
nspr-4.25.0-2.el7_9.x86_64.rpm
nspr-debuginfo-4.25.0-2.el7_9.i686.rpm
nspr-debuginfo-4.25.0-2.el7_9.x86_64.rpm
nspr-devel-4.25.0-2.el7_9.i686.rpm
nspr-devel-4.25.0-2.el7_9.x86_64.rpm
nss-3.53.1-3.el7_9.i686.rpm
nss-3.53.1-3.el7_9.x86_64.rpm
nss-debuginfo-3.53.1-3.el7_9.i686.rpm
nss-debuginfo-3.53.1-3.el7_9.x86_64.rpm
nss-devel-3.53.1-3.el7_9.i686.rpm
nss-devel-3.53.1-3.el7_9.x86_64.rpm
nss-softokn-3.53.1-6.el7_9.i686.rpm
nss-softokn-3.53.1-6.el7_9.x86_64.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.i686.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.x86_64.rpm
nss-softokn-devel-3.53.1-6.el7_9.i686.rpm
nss-softokn-devel-3.53.1-6.el7_9.x86_64.rpm
nss-softokn-freebl-3.53.1-6.el7_9.i686.rpm
nss-softokn-freebl-3.53.1-6.el7_9.x86_64.rpm
nss-softokn-freebl-devel-3.53.1-6.el7_9.i686.rpm
nss-softokn-freebl-devel-3.53.1-6.el7_9.x86_64.rpm
nss-sysinit-3.53.1-3.el7_9.x86_64.rpm
nss-tools-3.53.1-3.el7_9.x86_64.rpm
nss-util-3.53.1-1.el7_9.i686.rpm
nss-util-3.53.1-1.el7_9.x86_64.rpm
nss-util-debuginfo-3.53.1-1.el7_9.i686.rpm
nss-util-debuginfo-3.53.1-1.el7_9.x86_64.rpm
nss-util-devel-3.53.1-1.el7_9.i686.rpm
nss-util-devel-3.53.1-1.el7_9.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
nss-debuginfo-3.53.1-3.el7_9.ppc.rpm
nss-debuginfo-3.53.1-3.el7_9.ppc64.rpm
nss-pkcs11-devel-3.53.1-3.el7_9.ppc.rpm
nss-pkcs11-devel-3.53.1-3.el7_9.ppc64.rpm
ppc64le:
nss-debuginfo-3.53.1-3.el7_9.ppc64le.rpm
nss-pkcs11-devel-3.53.1-3.el7_9.ppc64le.rpm
s390x:
nss-debuginfo-3.53.1-3.el7_9.s390.rpm
nss-debuginfo-3.53.1-3.el7_9.s390x.rpm
nss-pkcs11-devel-3.53.1-3.el7_9.s390.rpm
nss-pkcs11-devel-3.53.1-3.el7_9.s390x.rpm
x86_64:
nss-debuginfo-3.53.1-3.el7_9.i686.rpm
nss-debuginfo-3.53.1-3.el7_9.x86_64.rpm
nss-pkcs11-devel-3.53.1-3.el7_9.i686.rpm
nss-pkcs11-devel-3.53.1-3.el7_9.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
nspr-4.25.0-2.el7_9.src.rpm
nss-3.53.1-3.el7_9.src.rpm
nss-softokn-3.53.1-6.el7_9.src.rpm
nss-util-3.53.1-1.el7_9.src.rpm
x86_64:
nspr-4.25.0-2.el7_9.i686.rpm
nspr-4.25.0-2.el7_9.x86_64.rpm
nspr-debuginfo-4.25.0-2.el7_9.i686.rpm
nspr-debuginfo-4.25.0-2.el7_9.x86_64.rpm
nspr-devel-4.25.0-2.el7_9.i686.rpm
nspr-devel-4.25.0-2.el7_9.x86_64.rpm
nss-3.53.1-3.el7_9.i686.rpm
nss-3.53.1-3.el7_9.x86_64.rpm
nss-debuginfo-3.53.1-3.el7_9.i686.rpm
nss-debuginfo-3.53.1-3.el7_9.x86_64.rpm
nss-devel-3.53.1-3.el7_9.i686.rpm
nss-devel-3.53.1-3.el7_9.x86_64.rpm
nss-softokn-3.53.1-6.el7_9.i686.rpm
nss-softokn-3.53.1-6.el7_9.x86_64.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.i686.rpm
nss-softokn-debuginfo-3.53.1-6.el7_9.x86_64.rpm
nss-softokn-devel-3.53.1-6.el7_9.i686.rpm
nss-softokn-devel-3.53.1-6.el7_9.x86_64.rpm
nss-softokn-freebl-3.53.1-6.el7_9.i686.rpm
nss-softokn-freebl-3.53.1-6.el7_9.x86_64.rpm
nss-softokn-freebl-devel-3.53.1-6.el7_9.i686.rpm
nss-softokn-freebl-devel-3.53.1-6.el7_9.x86_64.rpm
nss-sysinit-3.53.1-3.el7_9.x86_64.rpm
nss-tools-3.53.1-3.el7_9.x86_64.rpm
nss-util-3.53.1-1.el7_9.i686.rpm
nss-util-3.53.1-1.el7_9.x86_64.rpm
nss-util-debuginfo-3.53.1-1.el7_9.i686.rpm
nss-util-debuginfo-3.53.1-1.el7_9.x86_64.rpm
nss-util-devel-3.53.1-1.el7_9.i686.rpm
nss-util-devel-3.53.1-1.el7_9.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
nss-debuginfo-3.53.1-3.el7_9.i686.rpm
nss-debuginfo-3.53.1-3.el7_9.x86_64.rpm
nss-pkcs11-devel-3.53.1-3.el7_9.i686.rpm
nss-pkcs11-devel-3.53.1-3.el7_9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2019-11719
https://access.redhat.com/security/cve/CVE-2019-11727
https://access.redhat.com/security/cve/CVE-2019-11756
https://access.redhat.com/security/cve/CVE-2019-17006
https://access.redhat.com/security/cve/CVE-2019-17023
https://access.redhat.com/security/cve/CVE-2020-6829
https://access.redhat.com/security/cve/CVE-2020-12400
https://access.redhat.com/security/cve/CVE-2020-12401
https://access.redhat.com/security/cve/CVE-2020-12402
https://access.redhat.com/security/cve/CVE-2020-12403
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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Zbhx
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Bug Fix(es):
* Container-native Virtualization 2.4.2 Images (BZ#1877407)
This advisory contains the following OpenShift Virtualization 2.4.2 images:
RHEL-7-CNV-2.4
=============kubevirt-ssp-operator-container-v2.4.2-2
RHEL-8-CNV-2.4
=============virt-cdi-controller-container-v2.4.2-1
virt-cdi-apiserver-container-v2.4.2-1
hostpath-provisioner-operator-container-v2.4.2-1
virt-cdi-uploadproxy-container-v2.4.2-1
virt-cdi-cloner-container-v2.4.2-1
virt-cdi-importer-container-v2.4.2-1
kubevirt-template-validator-container-v2.4.2-1
hostpath-provisioner-container-v2.4.2-1
virt-cdi-uploadserver-container-v2.4.2-1
virt-cdi-operator-container-v2.4.2-1
virt-controller-container-v2.4.2-1
kubevirt-cpu-model-nfd-plugin-container-v2.4.2-1
virt-api-container-v2.4.2-1
ovs-cni-marker-container-v2.4.2-1
kubevirt-cpu-node-labeller-container-v2.4.2-1
bridge-marker-container-v2.4.2-1
kubevirt-metrics-collector-container-v2.4.2-1
kubemacpool-container-v2.4.2-1
cluster-network-addons-operator-container-v2.4.2-1
ovs-cni-plugin-container-v2.4.2-1
kubernetes-nmstate-handler-container-v2.4.2-1
cnv-containernetworking-plugins-container-v2.4.2-1
virtio-win-container-v2.4.2-1
virt-handler-container-v2.4.2-1
virt-launcher-container-v2.4.2-1
cnv-must-gather-container-v2.4.2-1
virt-operator-container-v2.4.2-1
vm-import-controller-container-v2.4.2-1
hyperconverged-cluster-operator-container-v2.4.2-1
vm-import-operator-container-v2.4.2-1
kubevirt-vmware-container-v2.4.2-1
kubevirt-v2v-conversion-container-v2.4.2-1
kubevirt-kvm-info-nfd-plugin-container-v2.4.2-1
node-maintenance-operator-container-v2.4.2-1
hco-bundle-registry-container-v2.4.2-15
3. Bugs fixed (https://bugzilla.redhat.com/):
1856953 - CVE-2020-15586 golang: data race in certain net/http servers including ReverseProxy can lead to DoS
1867099 - CVE-2020-16845 golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
1869194 - HCO CR display name should contain "OpenShift Virtualization" instead of CNV
1869734 - OpenShift Virtualization does not appear in OperatorHub when filtering to "Disconnected"
1875383 - terminationGracePeriodSeconds should be updated in VMs created from common templates
1877407 - Container-native Virtualization 2.4.2 Images
5. 8) - aarch64, ppc64le, s390x, x86_64
3. (BZ#1854564)
* nss needs to comply to the new SP800-56A rev 3 requirements (BZ#1855825)
Enhancement(s):
* [RFE] nss should use AES for storage of keys (BZ#1723819)
4. [rhel-8.2.0.z]
6
VAR-201912-2007 | No CVE | Communication key leak vulnerability in JD Xiaojingyu smart platform |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Xiaojingyu Intelligent Platform integrates the original Jingdong Alpha platform and introduces Jingdong's artificial intelligence and big data capabilities. It not only focuses on the original smart hardware, smart home, and smart travel solutions, but also extends its IoT capabilities to Multiple scenes.
Jingdong Xiaojingyu Intelligent Platform has a communication key leakage vulnerability. An attacker can use this information to construct device instructions to control device behavior.
VAR-201912-0975 | CVE-2019-16327 | D-Link DIR-601 Authentication vulnerabilities in devices |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-601 B1 2.00NA devices are vulnerable to authentication bypass. They do not check for authentication at the server side and rely on client-side validation, which is bypassable. NOTE: this is an end-of-life product. D-Link DIR-601 The device contains an authentication vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-601 B1 is a wireless router from Taiwan D-Link.
The D-Link DIR-601 B1 2.00NA version has an authentication bypass vulnerability, which originates from the fact that the program is only on the client and fails to authenticate on the server. An attacker could use this vulnerability to bypass authentication and perform arbitrary actions
VAR-201912-2010 | No CVE | Denial of service vulnerability in ZLAN5102 and ZLAN5103 network cards |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
ZLAN5102 serial server is a protocol converter between RS232 / 485 and TCP / IP developed by Shanghai Zhuolan Information Technology Co., Ltd. The serial server can conveniently connect serial devices to Ethernet and the Internet, and realize the network upgrade of serial devices. ZLAN5103 is a new generation high-performance serial server developed by Shanghai Zhuolan based on ZLAN1003.
The ZLAN5102 and ZLAN5103 network cards have a denial of service vulnerability. Sending only three-way TCP handshake packets to port 80 of the device and no other packets will cause the device's network card to restart abnormally. An attacker could use the vulnerability to launch a denial of service attack.
VAR-201912-2011 | No CVE | ZLAN network card has a denial of service vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
ZLAN5103 can realize transparent data forwarding between RS232 / 485/422 and TCP / IP. Conveniently make serial devices connect to Ethernet and Internet, and realize the network upgrade of serial devices.
There is a denial of service vulnerability in ZLAN. Sending malformed RST packets to ZLAN5103 TCP 4196 port will cause denial of service on ZLAN5103 TCP 4196 and TCP 80 ports. The device needs to be powered off and restarted to recover. An attacker can use the vulnerability to launch a denial of service attack.
VAR-201912-1062 | CVE-2019-19996 | Intelbras IWR 3000N Device input validation vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered on Intelbras IWR 3000N 1.8.7 devices. A malformed login request allows remote attackers to cause a denial of service (reboot), as demonstrated by JSON misparsing of the \""} string to v1/system/login. Intelbras IWR 3000N The device contains an input validation vulnerability.Denial of service (DoS) May be in a state. Intelbras IWR 3000N is a wireless router from Intelbras in Poland.
There are security vulnerabilities in Intelbras IWR 3000N 1.8.7
VAR-201912-0974 | CVE-2019-16326 | D-Link DIR-601 Cross-site request forgery vulnerability in device |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
D-Link DIR-601 B1 2.00NA devices have CSRF because no anti-CSRF token is implemented. A remote attacker could exploit this in conjunction with CVE-2019-16327 to enable remote router management and device compromise. NOTE: this is an end-of-life product. D-Link DIR-601 The device contains a cross-site request forgery vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-601 B1 is a wireless router from Taiwan D-Link.
A cross-site request forgery vulnerability exists in D-Link DIR-601 B1 2.00NA. The vulnerability stems from a web application's insufficient verification that the request came from a trusted user. An attacker could use this vulnerability to send an unexpected request to the server through an affected client
VAR-201912-1061 | CVE-2019-19995 | Intelbras IWR 3000N Cross-Site Request Forgery Vulnerability |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
A CSRF issue was discovered on Intelbras IWR 3000N 1.8.7 devices, leading to complete control of the router, as demonstrated by v1/system/user. Intelbras IWR 3000N The device contains a cross-site request forgery vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Intelbras IWR 3000N is a wireless router from Intelbras in Poland.
Cross-site request forgery vulnerability exists in Intelbras IWR 3000N 1.8.7
VAR-201912-0054 | CVE-2019-5275 | USG9500 Vulnerable to out-of-bounds writing |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a heap buffer overflow when decoding a certificate, an attacker may exploit the vulnerability by a malicious certificate to perform a denial of service attack on the affected products. USG9500 Contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state