Vulnerability Detection Pipeline

Upcoming and New QIDs

Browse, filter by detection status, or search by CVE to get visibility into upcoming and new detections (QIDs) for all severities.

Detection Status

  • Under investigation: We are researching a detection and will publish one if it is feasible.
  • In development: We are coding a detection and will typically publish it within a few days.
  • Recently published: We have published the detection on the date indicated, and it will typically be available in the KnowledgeBase on shared platforms within a day.

Non-Qualys customers can audit their network for all published vulnerabilities by signing up for a Qualys Free Trial or Qualys Community Edition.

178 results
CVE
Title
Severity
  • Under Investigation

    EOL/Obsolete Software: Microsoft .Net Core Version 2.1 Detected

    Severity
    Urgent5
    Qualys ID
    106021
    Vendor Reference
    Dotnet-core
    CVSS Scores
    Base 9.8 / Temporal 9
    Description
    .NET Core is a modular, cross-platform, and open source software development framework that is used to build Windows, Web, and Mobile applications for Windows, Linux and OS X platforms.

    Technical support and service pack support for Microsoft .Net Core Version 2.1 ended on August 21, 2021.

    QID Detection Logic (Authenticated):
    This QID looks for the older versions of dotnet.dll to check if EOL .net core is installed or not.

    Consequence
    The system is at high risk of being exposed to security vulnerabilities. Since the vendor no longer provides updates, obsolete software is more prone to vulnerabilities.

    Solution
    Users are advised to obtain the latest version via Dotnet Core .

  • CVE-2020-25649+
    In Development

    McAfee Web Gateway Multiple Vulnerabilities(WP-3792, WP-4003, WP-4021, WP-4058, WP-4067)

    Severity
    Critical4
    Qualys ID
    730206
    Vendor Reference
    McAfee Web Gateway Update 10.2.3, McAfee Web Gateway Update 8.2.23, McAfee Web Gateway Update 9.2.14
    CVE Reference
    CVE-2020-25649, CVE-2021-2369, CVE-2021-2388, CVE-2021-3520, CVE-2021-3711, CVE-2021-3712, CVE-2021-30640
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    McAfee Web Gateway delivers comprehensive security for all aspects of web traffic in one high-performance appliance software architecture.
    For user-initiated web requests, McAfee Web Gateway first enforces an organization's internet use policy.

    Release 8.2.23, 9.2.14 and 10.2.3 includes updates addressing publicly disclosed CVEs, regardless of whether a CVE has been shown to impact customers. Affected Versions:
    McAfee Web Gateway (MWG) 10.2.x prior to 10.2.3
    McAfee Web Gateway (MWG) 9.2.x prior to 9.2.14
    McAfee Web Gateway (MWG) 8.2.x prior to 8.2.23

    QID Detection Logic :
    This QID retrieves McAfee Web Gateway version and checks to see if it's vulnerable.

    Consequence
    Successful exploitation of these vulnerabilities affects the Confidentiality, Integrity and Availability

    Solution
    McAfee MWG 8.2.24, 9.2.14 and 10.2.3 update releases address these vulnerabilities. Please visit McAfee Web Gateway Update 8.2.23, McAfee Web Gateway Update 9.2.14 and McAfee Web Gateway Update 10.2.3for more details.

    Patches
    McAfee Web Gateway Update 10.2.3, McAfee Web Gateway Update 8.2.23, McAfee Web Gateway Update 9.2.14
  • CVE-2020-36327+
    In Development

    Red Hat Update for rh-ruby27-ruby (RHSA-2021:3559)

    Severity
    Critical4
    Qualys ID
    239644
    Vendor Reference
    RHSA-2021:3559
    CVE Reference
    CVE-2020-36327, CVE-2021-31799, CVE-2021-31810, CVE-2021-32066
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: rh-ruby27-ruby (2.7.4).

    Security Fix(es): rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066)

    Affected Products:

    Red Hat Software Collections (for RHEL Server) 1 for RHEL 7.7 x86_64
    Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7.7 s390x
    Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7.7 ppc64le
    Red Hat Software Collections (for RHEL Server) 1 for RHEL 7 x86_64
    Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7 s390x
    Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7 ppc64le
    Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3559 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3559
  • CVE-2020-13672+
    In Development

    Fedora Security Update for drupal7 (FEDORA-2021-8093e197f4)

    Severity
    Critical4
    Qualys ID
    281914
    Vendor Reference
    FEDORA-2021-8093e197f4
    CVE Reference
    CVE-2020-13672, CVE-2020-36193, CVE-2020-28949, CVE-2021-32610, CVE-2020-28948
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Fedora has released a security update for drupal7 to fix the vulnerability.

    Affected OS:
    Fedora 34



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Fedora has issued updated packages to fix this vulnerability.

    For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
    Fedora 34 Update

    Patches
    Fedora 34 FEDORA-2021-8093e197f4
  • CVE-2021-34693+
    In Development

    Ubuntu Security Notification for Linux kernel (GCP) Vulnerabilities (USN-5073-2)

    Severity
    Critical4
    Qualys ID
    198506
    Vendor Reference
    USN-5073-2
    CVE Reference
    CVE-2021-34693, CVE-2021-3653, CVE-2021-3612, CVE-2021-3656, CVE-2021-38160
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    The kvm hypervisor implementation for amd processors in the linux kernel allowed a guest vm to disable restrictions on vmload/vmsave in a nested guest.
    The kvm hypervisor implementation for amd processors in the linux kernel did not properly prevent a guest vm from enabling avic in nested guest vms.
    The can broadcast manger (bcm) protocol implementation in the linux kernel did not properly initialize memory in some situations.
    The joystick device interface in the linux kernel did not properly validate data passed via an ioctl().the virtio console implementation in the linux kernel did not properly validate input lengths in some situations.

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    an attacker in a guest vm could use this to read or write portions of the host's physical memory. (
    Cve-2021-3656).
    An attacker in a guest vm could use this to write to portions of the host's physical memory. (
    Cve-2021-3653).
    A local attacker could use this to expose sensitive information (kernel memory) (cve-2021-34693).
    A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code on systems with a joystick device registered. (
    Cve-2021-3612).
    A local attacker could possibly use this to cause a denial of service (system crash) (cve-2021-38160).
    Solution
    Refer to Ubuntu advisory: USN-5073-2 for affected packages and patching details, or update with your package manager.
    Patches
    Ubuntu Linux USN-5073-2
  • CVE-2021-3781
    In Development

    Fedora Security Update for ghostscript (FEDORA-2021-256c80b4eb)

    Severity
    Critical4
    Qualys ID
    281911
    Vendor Reference
    FEDORA-2021-256c80b4eb
    CVE Reference
    CVE-2021-3781
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description
    Fedora has released a security update for ghostscript to fix the vulnerability.

    Affected OS:
    Fedora 34



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Fedora has issued updated packages to fix this vulnerability.

    For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
    Fedora 34 Update

    Patches
    Fedora 34 FEDORA-2021-256c80b4eb
  • CVE-2020-10619+
    In Development

    Advantech WebAccess/NMS Multiple Vulnerabilities (ICSA-20-098-01)

    Severity
    Urgent5
    Qualys ID
    590540
    Vendor Reference
    ICSA-20-098-01
    CVE Reference
    CVE-2020-10619, CVE-2020-10617, CVE-2020-10631, CVE-2020-10623, CVE-2020-10629, CVE-2020-10625, CVE-2020-10621, CVE-2020-10603
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description

    AFFECTED PRODUCTS
    The following versions of WebAccess/NMS, a network management system, are affected:
    WebAccess/NMS versions prior to 3.0.2

    QID Detection Logic (Authenticated)
    QID checks for the Vulnerable version using windows registry keys

    Consequence
    Successful exploitation of these vulnerabilities may allow an attacker to gain remote code execution, upload files, delete files, cause a denial-of-service condition, and create an admin account for the application.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section ICSA-20-098-01 for affected packages and patching details.

    Patches
    ICSA-20-098-01
  • CVE-2021-22941
    In Development

    Citrix ShareFile Storage Zone Unauthenticated Remote Code Execution (RCE) Vulnerability (CTX328123)

    Severity
    Urgent5
    Qualys ID
    375871
    Vendor Reference
    CTX328123
    CVE Reference
    CVE-2021-22941
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Citrix ShareFile is a secure file sharing and transfer service.

    A security issue has been identified in Citrix ShareFile storage zones controller which, if exploited, would allow an unauthenticated attacker to remotely compromise the storage zones controller.

    Affected Versions:
    Citrix ShareFile storage zones controller prior to 5.11.20

    NOTE : Customers using Citrix-managed storage zones in the cloud are not affected by this issue.

    QID Detection Logic (Authenticated):
    This QID detects vulnerable versions by fetching bin\StorageCenter.dll file versions from the HKLM\SOFTWARE\Citrix\StorageCenter\InstallDir registry

    Consequence
    Successful exploitation of this vulnerability allows full system compromise

    Solution
    Customers are advised to refer to CTX328123 for further details pertaining to this vulnerability.
    Patches
    CTX328123
  • CVE-2021-22714
    In Development

    Schneider Electric PowerLogic Buffer Overflow Vulnerability (SEVD-2021-068-02)

    Severity
    Critical4
    Qualys ID
    590539
    Vendor Reference
    SEVD-2021-068-02
    CVE Reference
    CVE-2021-22714
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description

    The PowerLogic metering products are revenue and power quality meters for utility and industrial electrical network monitoring.
    AFFECTED PRODUCTS
    Schneider Electric is aware of a vulnerability in its PowerLogic ION7400, PM8000 and ION9000 products:All versions prior to V3.0.0

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    Successful exploitation of this vulnerability could cause the meter to reboot or allow for remote code execution..
    Solution

    Customers are advised to refer to CERT MITIGATIONS section SEVD-2021-068-02 for affected packages and patching details.

    Patches
    SEVD-2021-068-02
  • CVE-2018-14621
    In Development

    Oracle Enterprise Linux Security Update for libtirpc (ELSA-2021-9449)

    Severity
    Critical4
    Qualys ID
    159392
    Vendor Reference
    ELSA-2021-9449
    CVE Reference
    CVE-2018-14621
    CVSS Scores
    Base 7.5 / Temporal 6
    Description
    Oracle Enterprise Linux has released a security update for libtirpc to fix the vulnerabilities.

    Affected Product:
    Oracle Linux 8

    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch. Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2021-9449.
    Patches
    Oracle Linux ELSA-2021-9449
  • CVE-2021-38647
    Recently Published

    Open Management Infrastructure (OMI) Remote Code Execution Vulnerability (OMIGOD)(Unauthenticated)

    Severity
    Urgent5
    Qualys ID
    730204
    Date Published
    September 20, 2021
    Vendor Reference
    CVE-2021-38647
    CVE Reference
    CVE-2021-38647
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Open Management Infrastructure (OMI) is an open source project to further the development of a production quality implementation of the DMTF CIM/WBEM standards. The OMI CIMOM is also designed to be portable and highly modular. In order to attain its small footprint.

    The vulnerability allows attacker to craft a malicious SOAP payload with no Authentication header specified which results in remote code execution with root privileges.

    Affected Software:

    Open Management Infrastructure versions prior to v1.6.8-1

    QID Detection Logic (Unauthenticated):
    This QID send a crafted HTTP POST request to "/wsman" endpoint to see if it executes Shell commands in order to identify vulnerable targets.

    Consequence
    Successful exploitation allows Remote Code Execution.

    Solution
    Customers are advised to refer to CVE-2021-38647 for more details pertaining to this vulnerability.

    Patches
    CVE-2021-38647
  • CVE-2021-3781
    Recently Published

    OpenSUSE Security Update for ghostscript (openSUSE-SU-2021:1273-1)

    Severity
    Urgent5
    Qualys ID
    751150
    Date Published
    September 20, 2021
    Vendor Reference
    openSUSE-SU-2021:1273-1
    CVE Reference
    CVE-2021-3781
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description
    OpenSUSE has released a security update for ghostscript to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.2


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:1273-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:1273-1
  • CVE-2021-32749
    Recently Published

    OpenSUSE Security Update for fail2ban (openSUSE-SU-2021:1274-1)

    Severity
    Critical4
    Qualys ID
    751147
    Date Published
    September 20, 2021
    Vendor Reference
    openSUSE-SU-2021:1274-1
    CVE Reference
    CVE-2021-32749
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description
    OpenSUSE has released a security update for fail2ban to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.2


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:1274-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:1274-1
  • CVE-2021-3612+
    In Development

    Ubuntu Security Notification for Linux kernel (HWE) Vulnerabilities (USN-5071-2)

    Severity
    Critical4
    Qualys ID
    198502
    Vendor Reference
    USN-5071-2
    CVE Reference
    CVE-2021-3612, CVE-2021-22543, CVE-2020-36311, CVE-2021-3653, CVE-2021-3656
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Usn-5071-1 fixed vulnerabilities in the linux kernel for ubuntu 20the kvm hypervisor implementation for amd processors in the linux kernel allowed a guest vm to disable restrictions on vmload/vmsave in a nested guest.
    The kvm hypervisor implementation for amd processors in the linux kernel did not properly prevent a guest vm from enabling avic in nested guest vms.
    The kvm hypervisor implementation for amd processors in the linux kernel did not ensure enough processing time was given to perform cleanups of large sev vms.
    The kvm hypervisor implementation in the linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability.
    The joystick device interface in the linux kernel did not properly validate data passed via an ioctl().

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    04 lts.
    This update provides the corresponding updates for the linux hardware enablement (hwe) kernel from ubuntu 20.04 lts for ubuntu 18.04 lts.
    An attacker in a guest vm could use this to read or write portions of the host's physical memory. (
    Cve-2021-3656).
    An attacker in a guest vm could use this to write to portions of the host's physical memory. (
    Cve-2021-3653).
    A local attacker could use this to cause a denial of service (soft lockup) (cve-2020-36311).
    An attacker who could start and control a vm could possibly use this to expose sensitive information or execute arbitrary code. (
    Cve-2021-22543).
    A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code on systems with a joystick device registered. (
    Cve-2021-3612).
    Solution
    Refer to Ubuntu advisory: USN-5071-2 for affected packages and patching details, or update with your package manager.
    Patches
    Ubuntu Linux USN-5071-2
  • CVE-2021-38493
    Recently Published

    CentOS Security Update for thunderbird (CESA-2021:3494)

    Severity
    Critical4
    Qualys ID
    257114
    Date Published
    September 20, 2021
    Vendor Reference
    CESA-2021:3494
    CVE Reference
    CVE-2021-38493
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description
    CentOS has released security update for thunderbird security update to fix the vulnerabilities.

    Affected Products:

    centos 7


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Successful exploitation of this vulnerability could lead to security breach or could affect integrity, availability and confidentiality.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch. Refer to CentOS advisory >centos 7 for updates and patch information.
    Patches
    centos 7 CESA-2021:3494
  • CVE-2021-38493
    Recently Published

    CentOS Security Update for firefox (CESA-2021:3498)

    Severity
    Critical4
    Qualys ID
    257113
    Date Published
    September 20, 2021
    Vendor Reference
    CESA-2021:3498
    CVE Reference
    CVE-2021-38493
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description
    CentOS has released security update for firefox security update to fix the vulnerabilities.

    Affected Products:

    centos 7


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Successful exploitation of this vulnerability could lead to security breach or could affect integrity, availability and confidentiality.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch. Refer to CentOS advisory >centos 7 for updates and patch information.
    Patches
    centos 7 CESA-2021:3498
  • CVE-2021-3781
    Recently Published

    SUSE Enterprise Linux Security Update for ghostscript (SUSE-SU-2021:3044-1)

    Severity
    Urgent5
    Qualys ID
    751136
    Date Published
    September 20, 2021
    Vendor Reference
    SUSE-SU-2021:3044-1
    CVE Reference
    CVE-2021-3781
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    This update for ghostscript fixes the following issues: security issue fixed: - cve-2021-3781: fixed a trivial -dsafer bypass command injection (bsc#1190381) also a hardening fix was added: - link as position independent executable (bsc#1184123)

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:3044-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:3044-1
  • CVE-2021-3781
    Recently Published

    OpenSUSE Security Update for ghostscript (openSUSE-SU-2021:3044-1)

    Severity
    Urgent5
    Qualys ID
    751139
    Date Published
    September 20, 2021
    Vendor Reference
    openSUSE-SU-2021:3044-1
    CVE Reference
    CVE-2021-3781
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description
    OpenSUSE has released a security update for ghostscript to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.3


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:3044-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:3044-1
  • CVE-2021-29989+
    Recently Published

    Amazon Linux Security Advisory for thunderbird: ALAS2-2021-1709

    Severity
    Critical4
    Qualys ID
    352834
    Date Published
    September 20, 2021
    Vendor Reference
    ALAS2-2021-1709
    CVE Reference
    CVE-2021-29989, CVE-2021-29985, CVE-2021-29984, CVE-2021-29980, CVE-2021-30547, CVE-2021-29988, CVE-2021-29969, CVE-2021-29976, CVE-2021-29970, CVE-2021-29986
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description

    If thunderbird was configured to use starttls for an imap connection, and an attacker injected imap server responses prior to the completion of the starttls handshake, then thunderbird didn't ignore the injected data.
    This could have resulted in thunderbird showing incorrect information, for example the attacker could have tricked thunderbird to show folders that didn't exist on the imap server.
    This vulnerability affects thunderbird < 78.12. (
    ( CVE-2021-29969) a malicious webpage could have triggered a use-after-free, memory corruption, and a potentially exploitable crash. *
    This bug could only be triggered when accessibility was enabled.*.
    This vulnerability affects thunderbird < 78.12, firefox esr < 78.12, and firefox < 90. (
    ( CVE-2021-29970) mozilla developers reported memory safety bugs present in code shared between firefox and thunderbird.
    Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
    ( CVE-2021-29976) uninitialized memory in a canvas object could have caused an incorrect free() leading to memory corruption and a potentially exploitable crash.
    This vulnerability affects thunderbird < 78.13, thunderbird < 91, firefox esr < 78.13, and firefox < 91. (
    ( CVE-2021-29980) instruction reordering resulted in a sequence of instructions that would cause an object to be incorrectly considered during garbage collection.
    This led to memory corruption and a potentially exploitable crash.
    ( CVE-2021-29984) a use-after-free vulnerability in media channels could have led to memory corruption and a potentially exploitable crash.
    ( CVE-2021-29985) a suspected race condition when calling getaddrinfo led to memory corruption and a potentially exploitable crash. *
    Note: this issue only affected linux operating systems.
    Other operating systems are unaffected.*
    ( CVE-2021-29986) firefox incorrectly treated an inline list-item element as a block element, resulting in an out of bounds read or memory corruption, and a potentially exploitable crash.
    ( CVE-2021-29988) mozilla developers reported memory safety bugs present in firefox 90 and firefox esr 78.12.
    This vulnerability affects thunderbird < 78.13, firefox esr < 78.13, and firefox < 91. (
    ( CVE-2021-29989) out of bounds write in angle in google chrome prior to 91.0.4472.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted html page. (
    ( CVE-2021-30547)



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Please refer to Amazon advisory: ALAS2-2021-1709 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux 2 ALAS2-2021-1709
  • CVE-2021-31291
    Recently Published

    Amazon Linux Security Advisory for exiv2: ALAS2-2021-1701

    Severity
    Critical4
    Qualys ID
    352842
    Date Published
    September 20, 2021
    Vendor Reference
    ALAS2-2021-1701
    CVE Reference
    CVE-2021-31291
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description

    A flaw was found in exiv2.
    A flawed bounds checking in the jp2image.cpp:dowritemetadata function leads to a heap-based buffer overflow.
    This flaw allows an attacker who can provide a malicious image to an application using the exiv2 library, to write data out of bounds and potentially execute code.
    The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (
    ( CVE-2021-31291)



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Please refer to Amazon advisory: ALAS2-2021-1701 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux 2 ALAS2-2021-1701
  • CVE-2021-38205+
    Recently Published

    OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:1271-1)

    Severity
    Critical4
    Qualys ID
    751137
    Date Published
    September 20, 2021
    Vendor Reference
    openSUSE-SU-2021:1271-1
    CVE Reference
    CVE-2021-38205, CVE-2021-38204, CVE-2021-38198, CVE-2021-3739, CVE-2021-3743, CVE-2021-34556, CVE-2021-38160, CVE-2021-3753, CVE-2021-3656, CVE-2021-3732, CVE-2021-3759, CVE-2021-38207, CVE-2021-3653, CVE-2021-35477, CVE-2021-3640
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    OpenSUSE has released a security update for the Linux Kernel to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.2


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:1271-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:1271-1
  • CVE-2020-36193
    Recently Published

    OpenSUSE Security Update for Hypertext Preprocessor7-pear (PHP7-pear) (openSUSE-SU-2021:1267-1)

    Severity
    Critical4
    Qualys ID
    751138
    Date Published
    September 20, 2021
    Vendor Reference
    openSUSE-SU-2021:1267-1
    CVE Reference
    CVE-2020-36193
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    OpenSUSE has released a security update for php7-pear to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.2


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:1267-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:1267-1
  • CVE-2021-33582
    Recently Published

    Red Hat Update for cyrus-imapd (RHSA-2021:3546)

    Severity
    Critical4
    Qualys ID
    239643
    Date Published
    September 20, 2021
    Vendor Reference
    RHSA-2021:3546
    CVE Reference
    CVE-2021-33582
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    The Cyrus IMAP server provides access to personal mail, system-wide bulletin boards, news-feeds, calendar and contacts through the IMAP, JMAP, NNTP, CalDAV and CardDAV protocols.

    Security Fix(es): cyrus-imapd: Denial of service via string hashing algorithm collisions (CVE-2021-33582)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3546 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3546
  • CVE-2021-40085
    Recently Published

    Red Hat Update for Red Hat OpenStack Platform 16.2 (openstack-neutron) (RHSA-2021:3488)

    Severity
    Critical4
    Qualys ID
    239640
    Date Published
    September 20, 2021
    Vendor Reference
    RHSA-2021:3488
    CVE Reference
    CVE-2021-40085
    CVSS Scores
    Base / Temporal
    Description
    Neutron is a virtual network service for OpenStack. Just like OpenStackNova provides an API to dynamically request and configure virtualservers, Neutron provides an API to dynamically request and configurevirtual networks. These networks connect "interfaces" from otherOpenStack services (e.g., virtual NICs from Nova VMs). The NeutronAPI supports extensions to provide advanced network capabilities(e.g., QoS, ACLs, network, monitoring, etc.).

    Security Fix(es): arbitrary dnsmasq reconfiguration via extra_dhcp_opts (CVE-2021-40085)

    Affected Products:

    Red Hat OpenStack 16.2 x86_64
    Red Hat OpenStack for IBM Power 16.2 ppc64le

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3488 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3488
  • CVE-2021-30475
    Recently Published

    OpenSUSE Security Update for libaom (openSUSE-SU-2021:1254-1)

    Severity
    Critical4
    Qualys ID
    751130
    Date Published
    September 16, 2021
    Vendor Reference
    openSUSE-SU-2021:1254-1
    CVE Reference
    CVE-2021-30475
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    OpenSUSE has released a security update for libaom to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.2


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:1254-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:1254-1
  • CVE-2021-32800+
    Recently Published

    OpenSUSE Security Update for nextcloud (openSUSE-SU-2021:1253-1)

    Severity
    Critical4
    Qualys ID
    751131
    Date Published
    September 16, 2021
    Vendor Reference
    openSUSE-SU-2021:1253-1
    CVE Reference
    CVE-2021-32800, CVE-2021-32766, CVE-2021-32801, CVE-2021-32802
    CVSS Scores
    Base 9.3 / Temporal 8.1
    Description
    OpenSUSE has released a security update for nextcloud to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.2


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:1253-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:1253-1
  • CVE-2020-36193
    Recently Published

    OpenSUSE Security Update for Hypertext Preprocessor7-pear (PHP7-pear) (openSUSE-SU-2021:3018-1)

    Severity
    Critical4
    Qualys ID
    751135
    Date Published
    September 16, 2021
    Vendor Reference
    openSUSE-SU-2021:3018-1
    CVE Reference
    CVE-2020-36193
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    OpenSUSE has released a security update for php7-pear to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.3

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:3018-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:3018-1
  • CVE-2021-26439
    In Development

    Microsoft Edge for Android Information Disclosure Vulnerability

    Severity
    Critical4
    Qualys ID
    630723
    Vendor Reference
    CVE-2021-26439
    CVE Reference
    CVE-2021-26439
    CVSS Scores
    Base / Temporal
    Description
    Microsoft Edge for Android Information Disclosure Vulnerability
    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to CVE-2021-26439 to address this issue and obtain more information.
    Patches
    Android CVE-2021-26439
  • CVE-2021-38575
    Recently Published

    Red Hat Update for edk2 (RHSA-2021:3066)

    Severity
    Critical4
    Qualys ID
    239636
    Date Published
    September 16, 2021
    Vendor Reference
    RHSA-2021:3066
    CVE Reference
    CVE-2021-38575
    CVSS Scores
    Base / Temporal
    Description
    EDK (Embedded Development Kit)
    is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.

    Security Fix(es): edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe (BZ#1956284)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 8 x86_64
    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
    Red Hat Enterprise Linux Server - AUS 8.4 x86_64
    Red Hat Enterprise Linux Server - TUS 8.4 x86_64
    Red Hat Enterprise Linux for ARM 64 8 aarch64
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3066 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3066
  • CVE-2021-38575
    Recently Published

    Red Hat Update for edk2 (RHSA-2021:3172)

    Severity
    Critical4
    Qualys ID
    239635
    Date Published
    September 16, 2021
    Vendor Reference
    RHSA-2021:3172
    CVE Reference
    CVE-2021-38575
    CVSS Scores
    Base / Temporal
    Description
    EDK (Embedded Development Kit)
    is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.

    Security Fix(es): edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe (BZ#1956284)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3172 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3172
  • CVE-2021-40176+
    In Development

    Zoho ManageEngine Log360 Multiple Vulnerabilities

    Severity
    Critical4
    Qualys ID
    375848
    Vendor Reference
    Zoho Manageengine Log 360 Release Notes
    CVE Reference
    CVE-2021-40176, CVE-2021-40177
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Zoho ManageEngine Log360 is an integrated solution that combines EventLog Analyzer, ADAudit Plus, and Cloud Security Plus into a single console to help manage network security, Active Directory auditing, and public cloud management.

    Zoho ManageEngine Log360 before Build 5225 allows stored XSS.

    Zoho ManageEngine Log360 before Build 5225 allows remote code execution via BCP file overwrite.

    Affected Versions:
    Zoho ManageEngine Log360 before Build 5225

    QID Detection Logic (Authenticated):
    This QID checks for vulnerable version of Zoho ManageEngine Log360 by checking the build number in product.conf file.

    Consequence
    Successful exploitation of the vulnerability may allow an attacker to execute arbitrary code remotely

    Solution

    Vendor has released patch, download latest version of Zoho ManageEngine Log360 from here.

    Patches
    NA
  • CVE-2021-35223
    In Development

    SolarWinds Serv-U Remote Code Execution Vulnerability

    Severity
    Critical4
    Qualys ID
    730195
    Vendor Reference
    Serv-U 15.2.4 Security Advisory
    CVE Reference
    CVE-2021-35223
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    SolarWinds Serv-U Managed File Transfer Server is a versatile, easy-to-deploy solution that integrates well into existing infrastructure. It allows us to meet all our compliance requirements and ensures peace of mind for file transfers.

    CVE-2021-35223: An attacker can abuse the FTP command SITE EXEC for command line obfuscation to conceal the payload which can launch remote code execution (RCE) from the Serv-U Server..

    Affected Versions:
    SolarWinds Serv-U prior to 15.2.4

    QID Detection Logic(UnAuthenticated):
    This QID checks the banner to detect if the device is running vulnerable SolarWinds Serv-U version or not.

    Consequence
    Successful exploitation of this vulnerability may allow an attacker to execute arbitrary command on the target system.

    Solution
    Customers are advised to install patches available on the vendor's website. For more information about patch and fixes visit Serv-U 15.2.4 Security Advisory.
    Patches
    Serv-U 15.2.4 Security Advisory
  • CVE-2021-39829+
    In Development

    Adobe Framemaker Arbitrary Multiple Vulnerabilities (APSB21-74)

    Severity
    Critical4
    Qualys ID
    375856
    Vendor Reference
    APSB21-74
    CVE Reference
    CVE-2021-39829, CVE-2021-39830, CVE-2021-39831, CVE-2021-39832, CVE-2021-39833, CVE-2021-39834, CVE-2021-39835, CVE-2021-40697
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description

    Adobe FrameMaker is a document processor designed for writing and editing large or complex documents, including structured documents.

    Affected Versions:
    Adobe Framemaker following releases:
    2019 Releases: Prior to 2019 Update 8 (hotfix)
    Summer 2020 releases: Prior to 2020 Release Update 3

    QID Detection Logic:(Authenticated)
    This QID detects file versions of Adobe Framemaker (FrameMaker.exe).

    Consequence
    Successful exploitation of this vulnerability allows attackers to execute the arbitrary code.
    Solution
    The vendor has released Adobe Framemaker patch version 2020.0.2. Please visit APSB21-74 for more details.
    Patches
    apsb21-74
  • CVE-2021-40085
    Recently Published

    Red Hat Update for Red Hat OpenStack Platform 16.1 (openstack-neutron) (RHSA-2021:3481)

    Severity
    Critical4
    Qualys ID
    239634
    Date Published
    September 20, 2021
    Vendor Reference
    RHSA-2021:3481
    CVE Reference
    CVE-2021-40085
    CVSS Scores
    Base / Temporal
    Description
    Neutron is a virtual network service for Openstack, and a part of Netstack.Just like OpenStack Nova provides an API to dynamically request andconfigure virtual servers, Neutron provides an API to dynamically requestand configure virtual networks. These networks connect "interfaces" fromother OpenStack services (e.g., virtual NICs from Nova VMs). The NeutronAPI supports extensions to provide advanced network capabilities (e.g.,QoS, ACLs, network, monitoring, etc.)

    Security Fix(es): arbitrary dnsmasq reconfiguration via extra_dhcp_opts (CVE-2021-40085)

    Affected Products:

    Red Hat OpenStack 16.1 x86_64
    Red Hat OpenStack for IBM Power 16.1 ppc64le

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3481 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3481
  • CVE-2021-3052
    Recently Published

    Palo Alto Networks PAN-OS Reflected Cross-Site Scripting (XSS) in Web Interface (PAN-150337)

    Severity
    Urgent5
    Qualys ID
    730193
    Date Published
    September 20, 2021
    Vendor Reference
    PAN-150337
    CVE Reference
    CVE-2021-3052
    CVSS Scores
    Base 8 / Temporal 7.2
    Description
    PAN OS is the software that runs all Palo Alto Networks next-generation firewalls.

    A reflected cross-site scripting (XSS) vulnerability in the Palo Alto Network PAN-OS web interface enables an authenticated network-based attacker to mislead another authenticated PAN-OS administrator to click on a specially crafted link that performs arbitrary actions in the PAN-OS web interface as the targeted authenticated administrator. Affected Versions:
    PAN-OS 8.1 versions earlier than PAN-OS 8.1.20
    PAN-OS 9.0 versions earlier than PAN-OS 9.0.14
    PAN-OS 9.1 versions earlier than PAN-OS 9.1.10
    PAN-OS 10.0 versions earlier than PAN-OS 10.0.2
    QID Detection Logic (Authenticated):
    This QID looks for the vulnerable version of PAN-OS via XML API.

    Consequence

    A reflected cross-site scripting (XSS) vulnerability in the Palo Alto Network PAN-OS web interface enables an authenticated network-based attacker to mislead another authenticated PAN-OS administrator to click on a specially crafted link that performs arbitrary actions in the PAN-OS web interface as the targeted authenticated administrator.

    Solution

    Refer to PAN-150337 for more information about patching this vulnerability.Workaround:
    Enable signatures for Unique Threat IDs 91573, 91574, 91575, 91576 on traffic destined for the web interface to block attacks against CVE-2021-3052. This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.

    Patches
    PAN-150337
  • CVE-2021-3054
    Recently Published

    Palo Alto Networks PAN-OS Unsigned Code Execution During Plugin Installation Race Condition Vulnerability (PAN-138727)

    Severity
    Urgent5
    Qualys ID
    730191
    Date Published
    September 20, 2021
    Vendor Reference
    PAN-138727
    CVE Reference
    CVE-2021-3054
    CVSS Scores
    Base 7.2 / Temporal 6.5
    Description
    PAN OS is the software that runs all Palo Alto Networks next-generation firewalls.

    A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permission to upload plugins to execute arbitrary code with root user privileges. Affected Versions:
    PAN-OS 8.1 versions earlier than PAN-OS 8.1.20
    PAN-OS 9.0 versions earlier than PAN-OS 9.0.14
    PAN-OS 9.1 versions earlier than PAN-OS 9.1.11
    PAN-OS 10.0 versions earlier than PAN-OS 10.0.7
    PAN-OS 10.1 versions earlier than PAN-OS 10.1.2
    QID Detection Logic (Authenticated):
    This QID looks for the vulnerable version of PAN-OS via XML API.

    NOTE:This issue does not affect Prisma Access.

    Consequence

    A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permission to upload plugins to execute arbitrary code with root user privileges.

    Solution

    Refer to PAN-138727 for more information about patching this vulnerability.Workaround:
    Enable signatures for Unique Threat ID 91572 on traffic processed by the firewall to block attacks against CVE-2021-3054. This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.

    Patches
    PAN-138727
  • CVE-2021-3053
    Recently Published

    Palo Alto Networks PAN-OS Exceptional Condition Denial-of-Service Vulnerability (PAN-158723)

    Severity
    Urgent5
    Qualys ID
    730192
    Date Published
    September 16, 2021
    Vendor Reference
    PAN-158723
    CVE Reference
    CVE-2021-3053
    CVSS Scores
    Base 7.5 / Temporal 6.7
    Description
    PAN OS is the software that runs all Palo Alto Networks next-generation firewalls.

    An improper handling of exceptional conditions vulnerability exists in the Palo Alto Networks PAN-OS dataplane that enables an unauthenticated network-based attacker to send specifically crafted traffic through the firewall that causes the service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode. Affected Versions:
    PAN-OS 8.1 versions earlier than PAN-OS 8.1.20
    PAN-OS 9.0 versions earlier than PAN-OS 9.0.14
    PAN-OS 9.1 versions earlier than PAN-OS 9.1.9
    PAN-OS 10.0 versions earlier than PAN-OS 10.0.5
    QID Detection Logic (Authenticated):
    This QID looks for the vulnerable version of PAN-OS via XML API.

    NOTE:This issue is applicable only if GTP security is configured on the firewall.

    Consequence

    An improper handling of exceptional conditions vulnerability exists in the Palo Alto Networks PAN-OS dataplane that enables an unauthenticated network-based attacker to send specifically crafted traffic through the firewall that causes the service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode.

    Solution

    Refer to PAN-158723 for more information about patching this vulnerability.Workaround:
    Enable signatures for Unique Threat ID 91593 on traffic processed by the firewall to block attacks against CVE-2021-3053.

    Patches
    PAN-158723
  • CVE-2021-3055
    Recently Published

    Palo Alto Networks PAN-OS XML External Entity (XXE) Reference Vulnerability in the PAN-OS Web Interface (PAN-166241)

    Severity
    Urgent5
    Qualys ID
    730190
    Date Published
    September 16, 2021
    Vendor Reference
    PAN-166241
    CVE Reference
    CVE-2021-3055
    CVSS Scores
    Base 6.5 / Temporal 5.9
    Description
    PAN OS is the software that runs all Palo Alto Networks next-generation firewalls.

    An improper restriction of XML external entity (XXE) reference vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to read any arbitrary file from the file system and send a specifically crafted request to the firewall that causes the service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode. Affected Versions:
    PAN-OS 8.1 versions earlier than PAN-OS 8.1.20
    PAN-OS 9.0 versions earlier than PAN-OS 9.0.14
    PAN-OS 9.1 versions earlier than PAN-OS 9.1.10
    PAN-OS 10.0 versions earlier than PAN-OS 10.0.6
    QID Detection Logic (Authenticated):
    This QID looks for the vulnerable version of PAN-OS via XML API.

    Consequence

    An improper restriction of XML external entity (XXE) reference vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to read any arbitrary file from the file system and send a specifically crafted request to the firewall that causes the service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode.

    Solution

    Refer to PAN-166241 for more information about patching this vulnerability.Workaround:
    Enable signatures for Unique Threat ID 91588 on traffic destined for the web interface to block attacks against CVE-2021-3055. This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.

    Patches
    PAN-166241
  • CVE-2020-10188
    Recently Published

    Palo Alto Networks PAN-OS Telnet Remote-Code-Execution (RCE) Vulnerability (PAN-158262)

    Severity
    Critical4
    Qualys ID
    730194
    Date Published
    September 16, 2021
    Vendor Reference
    PAN-158262
    CVE Reference
    CVE-2020-10188
    CVSS Scores
    Base 9.8 / Temporal 8.8
    Description
    PAN OS is the software that runs all Palo Alto Networks next-generation firewalls.

    A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code. The Telnet-based administrative management service is disabled by default and this issue is not exploitable if this service is disabled. This issue does not impact SSH or HTTPS management interfaces. This issue does not affect Prisma Access. Affected Versions:
    PAN-OS 8.1 versions earlier than PAN-OS 8.1.20
    PAN-OS 9.0 versions earlier than PAN-OS 9.0.14
    PAN-OS 9.1 versions earlier than PAN-OS 9.1.9
    PAN-OS 10.0 versions earlier than PAN-OS 10.0.6
    QID Detection Logic (Authenticated):
    This QID looks for the vulnerable version of PAN-OS via XML API.

    NOTE:This issue is exploitable only if the Telnet service is enabled and is accessible to attackers.

    Consequence

    A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code.The Telnet-based administrative management service is disabled by default and this issue is not exploitable if this service is disabled.This issue does not impact SSH or HTTPS management interfaces. This issue does not affect Prisma Access.

    Solution

    Refer to PAN-158262 for more information about patching this vulnerability.

    Patches
    PAN-158262
  • CVE-2019-5318+
    In Development

    HPE ArubaOS Multiple Security Vulnerabilities (ARUBA-PSA-2021-016)

    Severity
    Critical4
    Qualys ID
    43857
    Vendor Reference
    ARUBA-PSA-2021-016
    CVE Reference
    CVE-2019-5318, CVE-2021-37716, CVE-2021-37717, CVE-2021-37718, CVE-2021-37719, CVE-2021-37720, CVE-2021-37721, CVE-2021-37722, CVE-2021-37723, CVE-2021-37724, CVE-2021-37725, CVE-2021-37728, CVE-2021-37729, CVE-2021-37731, CVE-2021-37733
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Aruba Networks provides data networking solutions for enterprises and businesses worldwide.

    CVE-2021-37716: Buffer Overflow Vulnerabilities in the PAPI protocol.
    Affected Versions:
    - ArubaOS 8.3.0.x: 8.3.0.14 and below.
    - ArubaOS 8.5.0.x: 8.5.0.11 and below.
    - ArubaOS 8.6.0.x: 8.6.0.7 and below.
    - ArubaOS 8.7.x.x: 8.7.1.1 and below.

    CVE-2021-37717, CVE-2021-37718: Authenticated Remote Command Execution in ArubaOS Web-based Management User Interface.
    Affected Versions:
    - ArubaOS 8.3.0.x: 8.3.0.15 and below.
    - ArubaOS 8.5.0.x: 8.5.0.11 and below.
    - ArubaOS 8.6.0.x: 8.6.0.6 and below.
    - ArubaOS 8.7.x.x: 8.7.1.3 and below.

    CVE-2021-37719, CVE-2021-37720, CVE-2021-37721, CVE-2021-37722: Authenticated Remote Command Execution in ArubaOS Command Line Interface.
    Affected Versions:
    - ArubaOS 6.4.4.x: 6.4.4.24 and below.
    - ArubaOS 6.5.4.x: 6.5.4.19 and below.
    - ArubaOS 8.3.0.x: 8.3.0.15 and below.
    - ArubaOS 8.5.0.x: 8.5.0.12 and below.
    - ArubaOS 8.6.0.x: 8.6.0.8 and below.
    - ArubaOS 8.7.x.x: 8.7.1.3 and below.

    CVE-2021-37723, CVE-2021-37724: Authenticated Remote Command Execution in Mobility Conductor ArubaOS Command Line Interface.
    Affected Versions:
    - ArubaOS 8.3.0.x: 8.3.0.15 and below.
    - ArubaOS 8.5.0.x: 8.5.0.11 and below.
    - ArubaOS 8.6.0.x: 8.6.0.7 and below.
    - ArubaOS 8.7.x.x: 8.7.1.1 and below.

    CVE-2021-37725: ArubaOS Cross-Site Request Forgery in ArubaOS Web-based Management User Interface Resulting in File Removal.
    Affected Versions:
    - ArubaOS 8.3.0.x: 8.3.0.14 and below.
    - ArubaOS 8.5.0.x: 8.5.0.11 and below.
    - ArubaOS 8.6.0.x: 8.6.0.7 and below.
    - ArubaOS 8.7.x.x: 8.7.1.1 and below.
    - ArubaOS 8.8.0.x: 8.8.0.0.

    CVE-2019-5318: Lack of CSRF Protections in RAPConsole.
    Affected Versions:
    - ArubaOS 6.x.x.x: all versions.
    - ArubaOS 8.x.x.x: all versions prior to 8.8.0.0.

    CVE-2021-37728: Authenticated Remote Path Traversal leading to Denial of Service in ArubaOS Command Line Interface.
    Affected Versions:
    - ArubaOS 8.5.0.x: 8.5.0.12 and below.
    - ArubaOS 8.6.0.x: 8.6.0.10 and below.
    - ArubaOS 8.7.x.x: 8.7.1.3 and below.
    - ArubaOS 8.8.0.x: 8.8.0.0 and below.

    CVE-2021-37729: Authenticated Remote Path Traversal leading to Denial of Service in ArubaOS Web-based Management User Interface.
    Affected Versions:
    - ArubaOS 6.4.4.x: 6.4.4.24 and below.
    - ArubaOS 6.5.4.x: 6.5.4.18 and below.
    - ArubaOS 8.3.0.x: 8.3.0.15 and below.
    - ArubaOS 8.5.0.x: 8.5.0.11 and below.
    - ArubaOS 8.6.0.x: 8.6.0.8 and below.
    - ArubaOS 8.7.x.x: 8.7.1.2 and below.

    CVE-2021-37731: Authenticated Local Path Traversal Leading to Arbitrary File Read and Write in ArubaOS Web-based Management User Interface and ArubaOS Command Line Interface.
    Affected Versions:
    - ArubaOS 8.3.0.x: 8.3.0.15 and below.
    - ArubaOS 8.5.0.x: 8.5.0.11 and below.
    - ArubaOS 8.6.0.x: 8.6.0.6 and below.
    - ArubaOS 8.7.x.x: 8.7.1.0 and below.

    CVE-2021-37733: Authenticated Remote Path Traversal in ArubaOS Command Line Interface Allows for Arbitrary File Read.
    Affected Versions:
    - ArubaOS 8.3.0.x: 8.3.0.15 and below.
    - ArubaOS 8.5.0.x: 8.5.0.10 and below.
    - ArubaOS 8.6.0.x: 8.6.0.6 and below.
    - ArubaOS 8.7.x.x: 8.7.1.0 and below.

    QID Detection Logic (Unauthenticated):
    This QID gets the vulnerable ArubaOS version via SNMP.

    Consequence
    Successful exploitation of these vulnerabilities may allow an attacker to execute arbitrary code on the target system

    Solution
    Please refer to ARUBA-PSA-2021-016 for more information about patching these vulnerabilities.Workaround:
    For CVE-2021-37719, CVE-2021-37720, CVE-2021-37721, CVE-2021-37722, CVE-2021-37728, CVE-2021-37733: Block access to the ArubaOS Command Line Interface from all untrusted users.
    For CVE-2021-37717, CVE-2021-37718, CVE-2021-37729: Block access to the ArubaOS web-based management interface from all untrusted users.
    For CVE-2021-37723, CVE-2021-37724: Block access to the Mobility Conductor Command Line Interface from all untrusted users.
    For CVE-2021-37716: Enabling the Enhanced PAPI Security feature where available will prevent exploitation of these vulnerabilities.
    For CVE-2019-5318: The RAPConsole or Local Debug homepage can be reached by users in a split or bridge role.This can be prevented by configuring an ACL to restrict access to the Local Debug (LD) homepage which effectively prevents this issue. Instructions on how to implement this ACL can be found at https://www.arubanetworks.com/techdocs/ArubaOS_86_Web_Help/Content/arubaos-solutions/rap/rest-local-deb.htm
    For CVE-2021-37731: Exploitation requires physical access.Controllers in strictly controlled physical environments are at low risk.
    Patches
    ARUBA-PSA-2021-016
  • CVE-2021-30608+
    In Development

    Fedora Security Update for chromium (FEDORA-2021-78b9d84299)

    Severity
    Critical4
    Qualys ID
    281895
    Vendor Reference
    FEDORA-2021-78b9d84299
    CVE Reference
    CVE-2021-30608, CVE-2021-30573, CVE-2021-30611, CVE-2021-30618, CVE-2021-30617, CVE-2021-30576, CVE-2021-30598, CVE-2021-30600, CVE-2021-30607, CVE-2021-30594, CVE-2021-30589, CVE-2021-30586, CVE-2021-30569, CVE-2021-30587, CVE-2021-30592, CVE-2021-30606, CVE-2021-30610, CVE-2021-30619, CVE-2021-30585, CVE-2021-30601, CVE-2021-30591, CVE-2021-30574, CVE-2021-30565, CVE-2021-30612, CVE-2021-30583, CVE-2021-30622, CVE-2021-30568, CVE-2021-30590, CVE-2021-30584, CVE-2021-30621, CVE-2021-30577, CVE-2021-30620, CVE-2021-30609, CVE-2021-30616, CVE-2021-30566, CVE-2021-30567, CVE-2021-30588, CVE-2021-30613, CVE-2021-30581, CVE-2021-30604, CVE-2021-30572, CVE-2021-30602, CVE-2021-30615, CVE-2021-30614, CVE-2021-30593, CVE-2021-30582, CVE-2021-30623, CVE-2021-30603, CVE-2021-30596, CVE-2021-30579, CVE-2021-30578, CVE-2021-30575, CVE-2021-30599, CVE-2021-30597, CVE-2021-30580, CVE-2021-30571, CVE-2021-30624
    CVSS Scores
    Base 9.6 / Temporal 8.3
    Description
    Fedora has released a security update for chromium to fix the vulnerability.

    Affected OS:
    Fedora 33




    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Fedora has issued updated packages to fix this vulnerability.

    For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
    Fedora 33 Update

    Patches
    Fedora 33 FEDORA-2021-78b9d84299
  • CVE-2021-30608+
    In Development

    Fedora Security Update for chromium (FEDORA-2021-6225d60814)

    Severity
    Critical4
    Qualys ID
    281894
    Vendor Reference
    FEDORA-2021-6225d60814
    CVE Reference
    CVE-2021-30608, CVE-2021-30573, CVE-2021-30611, CVE-2021-30618, CVE-2021-30617, CVE-2021-30576, CVE-2021-30598, CVE-2021-30600, CVE-2021-30607, CVE-2021-30594, CVE-2021-30589, CVE-2021-30586, CVE-2021-30569, CVE-2021-30587, CVE-2021-30592, CVE-2021-30606, CVE-2021-30610, CVE-2021-30619, CVE-2021-30585, CVE-2021-30601, CVE-2021-30591, CVE-2021-30574, CVE-2021-30565, CVE-2021-30612, CVE-2021-30583, CVE-2021-30622, CVE-2021-30568, CVE-2021-30590, CVE-2021-30584, CVE-2021-30621, CVE-2021-30577, CVE-2021-30620, CVE-2021-30609, CVE-2021-30616, CVE-2021-30566, CVE-2021-30567, CVE-2021-30588, CVE-2021-30613, CVE-2021-30581, CVE-2021-30604, CVE-2021-30572, CVE-2021-30602, CVE-2021-30615, CVE-2021-30614, CVE-2021-30593, CVE-2021-30582, CVE-2021-30623, CVE-2021-30603, CVE-2021-30596, CVE-2021-30579, CVE-2021-30578, CVE-2021-30575, CVE-2021-30599, CVE-2021-30597, CVE-2021-30580, CVE-2021-30571, CVE-2021-30624
    CVSS Scores
    Base 9.6 / Temporal 8.3
    Description
    Fedora has released a security update for chromium to fix the vulnerability.

    Affected OS:
    Fedora 34




    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Fedora has issued updated packages to fix this vulnerability.

    For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
    Fedora 34 Update

    Patches
    Fedora 34 FEDORA-2021-6225d60814
  • In Development

    Fedora Security Update for firefox (FEDORA-2021-09ba2aa171)

    Severity
    Urgent5
    Qualys ID
    281891
    Vendor Reference
    FEDORA-2021-09ba2aa171
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description
    Fedora has released a security update for firefox to fix the vulnerability.

    Affected OS:
    Fedora 34




    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Fedora has issued updated packages to fix this vulnerability.

    For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
    Fedora 34 Update

    Patches
    Fedora 34 FEDORA-2021-09ba2aa171
  • CVE-2021-23406
    In Development

    Node.js Pac-Resolver Module Remote Code Execution Vulnerability

    Severity
    Critical4
    Qualys ID
    375841
    Vendor Reference
    CVE-2021-23406
    CVE Reference
    CVE-2021-23406
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    The Node.js pac-resolver module could allow a remote attacker to execute arbitrary code on the system, and it occurs when used with untrusted input, due to unsafe PAC file handling

    Affected Versions:
    pac-resolver before 5.0.0
    QID Detection Logic:
    This authenticated QID retrieves vulnerable pac-resolver versions by running npm view pac-resolver | grep 'version:'.

    Consequence
    An attacker can exploit this issue to execute arbitrary code with in the context of the affected application resulting into Remote Code Execution.
    Solution
    Customers are advised to upgrade to Node.js pac-resolver 5.0.0 or the latest versions to remediate this vulnerability.
    Patches
    CVE-2021-23406
  • CVE-2021-3597+
    Recently Published

    Red Hat Update for Red Hat JBoss Enterprise Application Platform 7.3.9 (RHSA-2021:3466)

    Severity
    Critical4
    Qualys ID
    239610
    Date Published
    September 16, 2021
    Vendor Reference
    RHSA-2021:3466
    CVE Reference
    CVE-2021-3597, CVE-2021-3644, CVE-2021-3690, CVE-2021-28170, CVE-2021-29425
    CVSS Scores
    Base 5.3 / Temporal 4.6
    Description
    This release of Red Hat JBoss Enterprise Application Platform 7.3.9 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.8, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.9 Release Notes for information about the most significant bug fixes and enhancements included in this release.

    Security Fix(es): undertow: buffer leak on incoming websocket PONG message may lead to DoS (CVE-2021-3690) undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS (CVE-2021-3597) jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate (CVE-2021-28170) apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 (CVE-2021-29425) wildfly-core: Invalid Sensitivity Classification of Vault Expression (CVE-2021-3644)

    Affected Products:

    JBoss Enterprise Application Platform 7.3 for RHEL 6 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3466 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3466
  • In Development

    EOL/Obsolete Software: Mongo Database 3.2.x Detected

    Severity
    Urgent5
    Qualys ID
    106020
    Vendor Reference
    MongoDB End of Life
    CVSS Scores
    Base 9.8 / Temporal 9
    Description
    MongoDB is an open-source document database and NoSQL database. EOL dates:
    MongoDB 3.2.x End of Life Date September 2018

    QID Detection Logic:(Authenticated)
    This QID checks for vulnerable version of MongoDB installed on the target.

    Consequence
    The system is at high risk of being exposed to security vulnerabilities. Since the vendor no longer provides updates, obsolete software is more vulnerable to viruses and other attacks.
    Solution
    Customer are advised to update MongoDb to the latest versions.
    For more information visit MongoDB SERVER
  • In Development

    Fedora Security Update for libguestfs (FEDORA-2021-38d1b07839)

    Severity
    Critical4
    Qualys ID
    281884
    Vendor Reference
    FEDORA-2021-38d1b07839
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description
    Fedora has released a security update for libguestfs to fix the vulnerability.

    Affected OS:
    Fedora 33




    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Fedora has issued updated packages to fix this vulnerability.

    For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
    Fedora 33 Update

    Patches
    Fedora 33 FEDORA-2021-38d1b07839
  • CVE-2021-38173
    Recently Published

    Debian Security Update for btrbk (DLA 2755-1)

    Severity
    Critical4
    Qualys ID
    178785
    Date Published
    September 20, 2021
    Vendor Reference
    DLA 2755-1
    CVE Reference
    CVE-2021-38173
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Debian has released security update for btrbk to fix the vulnerabilities.


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Successful exploitation of this vulnerability could lead to security breach or could affect integrity, availability and confidentiality.
    Solution
    Refer to Debian security advisory DLA 2755-1 for updates and patch information.
    Patches
    Debian DLA 2755-1
  • CVE-2021-40153
    Recently Published

    Debian Security Update for squashfs-tools (DSA 4967-1)

    Severity
    Critical4
    Qualys ID
    178783
    Date Published
    September 20, 2021
    Vendor Reference
    DSA 4967-1
    CVE Reference
    CVE-2021-40153
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Debian has released security update for squashfs-tools to fix the vulnerabilities.


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Successful exploitation of this vulnerability could lead to security breach or could affect integrity, availability and confidentiality.
    Solution
    Refer to Debian security advisory DSA 4967-1 for updates and patch information.
    Patches
    Debian DSA 4967-1
  • CVE-2021-30860
    Recently Published

    Apple macOS Security Update 2021-005 Catalina (HT212805)

    Severity
    Urgent5
    Qualys ID
    375851
    Date Published
    September 15, 2021
    Vendor Reference
    HT212805
    CVE Reference
    CVE-2021-30860
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    An integer overflow was addressed with improved input validation vulnerability addressed in Apple macOS.

    CVE-2021-30860: An integer overflow was addressed with improved input validation
    Affected versions:
    Apple macOS Security Update 2021-005 Catalina.

    QID Detection Logic (Authenticated):
    This QID looks for the missing security patches from Catalina

    Consequence
    Successful exploitation could allow an attacker to processing a maliciously crafted PDF may lead to arbitrary code execution.

    Solution
    The vendor has released these fixes: Security Update 2021-005 Catalina.
    The updates can be downloaded from Apple Downloads.

    For more information regarding the update can be found at HT212805.

    Patches
    HT212805
  • CVE-2021-30632
    Recently Published

    Microsoft Edge Based On Chromium Prior to 93.0.961.47 Multiple Vulnerabilities

    Severity
    Critical4
    Qualys ID
    375861
    Date Published
    September 15, 2021
    Vendor Reference
    Edge (chromium based) 93.0.961.47
    CVE Reference
    CVE-2021-30632
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Microsoft Edge is a cross-platform web browser developed by Microsoft.

    CVE-2021-38669 Microsoft Edge (Chromium-based)
    Affected Versions:
    Microsoft Edge Based On Chromium versions before 93.0.961.47

    QID Detection Logic: (authenticated)
    Operating System: Windows
    The install path is checked via registry "HKLM\SOFTWARE\Clients\StartMenuInternet\Microsoft Edge\shell\open\command". The version is checked via file msedge.exe.

    Operating System: MacOS
    The QID checks for the version of Microsoft Edge Based On Chromium app.

    Consequence
    Successful exploitation of these vulnerabilities may allow an attacker to execute arbitrary code on the target system.
    Solution
    Customers are advised to upgrade to version 93.0.961.47 or later
    Patches
    Edge (chromium based) 93.0.961.47
  • CVE-2021-30625+
    Recently Published

    Google Chrome Prior To 93.0.4577.82 Multiple Vulnerabilities

    Severity
    Critical4
    Qualys ID
    375846
    Date Published
    September 15, 2021
    Vendor Reference
    Google Chrome 93.0.4577.82
    CVE Reference
    CVE-2021-30625, CVE-2021-30626, CVE-2021-30627, CVE-2021-30628, CVE-2021-30629, CVE-2021-30630, CVE-2021-30631, CVE-2021-30632, CVE-2021-30633
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Google Chrome is a web browser for multiple platforms developed by Google.

    Affected Versions:
    Google Chrome Prior to 93.0.4577.82

    QID Detection Logic(Authenticated):
    This QID checks for vulnerable versions of Google Chrome on Windows, MAC OS, and Linux OS.

    Consequence
    Successful exploitation of these vulnerabilities may allow an attacker to execute arbitrary code on the target system.
    Solution
    Customers are advised to upgrade to latest version 93.0.4577.82
    For further details refer to Google Chrome 93.0.4577.82
    Patches
    Google Chrome 93.0.4577.82
  • CVE-2021-30860+
    Recently Published

    Apple MacOS Big Sur 11.6 Not Installed (HT212804)

    Severity
    Critical4
    Qualys ID
    375855
    Date Published
    September 15, 2021
    Vendor Reference
    HT212804
    CVE Reference
    CVE-2021-30860, CVE-2021-30858
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    macOS Big Sur (version 11) is the 17th and current major release of macOS, Apple Inc.'s operating system for Macintosh computers, and is the successor to macOS Catalina (version 10.15).

    Affected Versions:
    Apple MacOS Big Sur version before 11.6

    QID Detection Logic:
    This QID checks for vulnerable version of Big sur.

    Consequence
    Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
    Solution
    The updates can be downloaded from Apple Downloads.

    For more information regarding the update can be found at HT212804.

    Patches
    HT212804
  • CVE-2021-39820+
    Recently Published

    Adobe InDesign Arbitrary Code Execution Vulnerability (APSB21-73)

    Severity
    Critical4
    Qualys ID
    375850
    Date Published
    September 15, 2021
    Vendor Reference
    APSB21-73
    CVE Reference
    CVE-2021-39820, CVE-2021-39821, CVE-2021-39822
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description

    Adobe InDesign is a desktop publishing software application.

    Affected Versions:
    Adobe InDesign Prior to 16.4 for macOS and Windows OS

    QID Detection Logic (Authenticated):
    This checks for vulnerable versions of InDesign.

    Consequence
    Successful exploitation could lead to arbitrary code execution in the context of the current user.

    Solution
    The vendor has released 16.4 version to fix the vulnerabilities. Please refer to Adobe advisory APSB21-73 for details.
    Patches
    APSB21-73
  • CVE-2021-38625+
    Recently Published

    Microsoft Windows Kernel Elevation of Privilege Vulnerability September 2021

    Severity
    Critical4
    Qualys ID
    91818
    Date Published
    September 15, 2021
    Vendor Reference
    KB5005606, KB5005618
    CVE Reference
    CVE-2021-38625, CVE-2021-38626
    CVSS Scores
    Base 8.3 / Temporal 7.2
    Description
    Microsoft releases the security update for Windows September 2021

    The KB Articles associated with the update:
    KB5005606
    KB5005618

    This QID checks for the file version of ntoskrnl.exe

    The following versions of ntoskrnl.exe with their corresponding KBs are verified:
    KB5005606
    KB5005618

    Consequence
    Successful Exploit could compromise Confidentiality, Integrity and Availability

    Solution
    Please refer to the KB5005606
    KB5005618
    Patches
    KB5005606, KB5005618
  • CVE-2021-38644
    Recently Published

    Microsoft MPEG-2 Video Extension Remote Code Execution (RCE) Vulnerability

    Severity
    Critical4
    Qualys ID
    91820
    Date Published
    September 15, 2021
    Vendor Reference
    CVE-2021-38644
    CVE Reference
    CVE-2021-38644
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    A remote code execution vulnerability exists in the way that Microsoft MPEG-2 Video extensions handles objects in memory.

    Affected Product:
    MPEG-2 Video Extension before version 1.0.42152.0

    QID detection Logic:
    The gets the version of HMPEG2VideoExtension by querying wmi class Win32_InstalledStoreProgram.

    Consequence
    An attacker who successfully exploited this vulnerability can compromise confidentiality, integrity and availability of the system

    Solution
    Users are advised to check CVE-2021-38644 for more information.

    Patches
    CVE-2021-38644
  • CVE-2021-38661
    Recently Published

    Microsoft Windows Codecs Library HEVC Video Extensions Remote Code Execution (RCE) Vulnerability - September 2021

    Severity
    Critical4
    Qualys ID
    91819
    Date Published
    September 15, 2021
    Vendor Reference
    CVE-2021-38661
    CVE Reference
    CVE-2021-38661
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory.

    Affected Product:
    "HEVC from Device Manufacturer" media codec before version 1.0.42091.0

    QID detection Logic:
    The gets the version of HEVCVideoExtension by querying wmi class Win32_InstalledStoreProgram.

    Consequence
    An attacker who successfully exploited this vulnerability can compromise confidentiality, integrity and availability of the system

    Solution
    Users are advised to check CVE-2021-38661 for more information.

    Patches
    CVE-2021-38661
  • CVE-2021-38667+
    Recently Published

    Microsoft Windows Security Update for September 2021

    Severity
    Critical4
    Qualys ID
    91816
    Date Published
    September 15, 2021
    Vendor Reference
    KB5005565, KB5005566, KB5005568, KB5005569, KB5005573, KB5005606, KB5005607, KB5005613, KB5005615, KB5005618, KB5005623, KB5005627, KB5005633
    CVE Reference
    CVE-2021-38667, CVE-2021-38639, CVE-2021-38638, CVE-2021-38637, CVE-2021-26435, CVE-2021-40447, CVE-2021-38671, CVE-2021-36965, CVE-2021-36967, CVE-2021-36974, CVE-2021-36972, CVE-2021-36966, CVE-2021-36969, CVE-2021-36973, CVE-2021-36962, CVE-2021-36961, CVE-2021-36964, CVE-2021-36963, CVE-2021-36959, CVE-2021-36968, CVE-2021-36975, CVE-2021-38636, CVE-2021-38635, CVE-2021-38633, CVE-2021-38629, CVE-2021-38628, CVE-2021-38634, CVE-2021-38632, CVE-2021-38630, CVE-2021-38624, CVE-2021-36955, CVE-2021-36954, CVE-2021-36960, CVE-2021-36958
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Microsoft releases the security update for Windows September 2021

    The KB Articles associated with the update:
    KB5005613
    KB5005627
    KB5005623
    KB5005607
    KB5005633
    KB5005615
    KB5005606
    KB5005618
    KB5005573
    KB5005569
    KB5005565
    KB5005566
    KB5005568

    This QID checks for the file version of ntoskrnl.exe

    The following versions of ntoskrnl.exe with their corresponding KBs are verified:
    KB5005627
    KB5005613
    KB5005623
    KB5005607
    KB5005633
    KB5005615
    KB5005606
    KB5005618
    KB5005573
    KB5005569
    KB5005565
    KB5005566
    KB5005568

    Consequence
    Successful exploit could compromise Confidentiality, Integrity and Availability

    Solution
    Please refer to theKB5005613
    KB5005627
    KB5005623
    KB5005607
    KB5005633
    KB5005615
    KB5005606
    KB5005618
    KB5005573
    KB5005569
    KB5005565
    KB5005566
    KB5005568
    Patches
    KB5005565, KB5005566, KB5005568, KB5005569, KB5005573, KB5005606, KB5005607, KB5005613, KB5005615, KB5005618, KB5005623, KB5005627, KB5005633
  • CVE-2021-33582
    Recently Published

    Red Hat Update for cyrus-imapd (RHSA-2021:3492)

    Severity
    Critical4
    Qualys ID
    239633
    Date Published
    September 15, 2021
    Vendor Reference
    RHSA-2021:3492
    CVE Reference
    CVE-2021-33582
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    The Cyrus IMAP server provides access to personal mail, system-wide bulletin boards, news-feeds, calendar and contacts through the IMAP, JMAP, NNTP, CalDAV and CardDAV protocols.

    Security Fix(es): cyrus-imapd: Denial of service via string hashing algorithm collisions (CVE-2021-33582)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 8 x86_64
    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
    Red Hat Enterprise Linux Server - AUS 8.4 x86_64
    Red Hat Enterprise Linux for IBM z Systems 8 s390x
    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
    Red Hat Enterprise Linux for Power, little endian 8 ppc64le
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
    Red Hat Enterprise Linux Server - TUS 8.4 x86_64
    Red Hat Enterprise Linux for ARM 64 8 aarch64
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3492 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3492
  • CVE-2021-33582
    Recently Published

    Red Hat Update for cyrus-imapd (RHSA-2021:3493)

    Severity
    Critical4
    Qualys ID
    239632
    Date Published
    September 15, 2021
    Vendor Reference
    RHSA-2021:3493
    CVE Reference
    CVE-2021-33582
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    The Cyrus IMAP server provides access to personal mail, system-wide bulletin boards, news-feeds, calendar and contacts through the IMAP, JMAP, NNTP, CalDAV and CardDAV protocols.

    Security Fix(es): cyrus-imapd: Denial of service via string hashing algorithm collisions (CVE-2021-33582)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
    Red Hat Enterprise Linux Server - AUS 8.2 x86_64
    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
    Red Hat Enterprise Linux Server - TUS 8.2 x86_64
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3493 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3493
  • CVE-2021-38493
    Recently Published

    Red Hat Update for thunderbird (RHSA-2021:3494)

    Severity
    Critical4
    Qualys ID
    239631
    Date Published
    September 15, 2021
    Vendor Reference
    RHSA-2021:3494
    CVE Reference
    CVE-2021-38493
    CVSS Scores
    Base / Temporal
    Description
    Mozilla Thunderbird is a standalone mail and newsgroup client.This update upgrades Thunderbird to version 78.14.0.

    Security Fix(es): Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 (CVE-2021-38493)

    Affected Products:

    Red Hat Enterprise Linux Server 7 x86_64
    Red Hat Enterprise Linux Workstation 7 x86_64
    Red Hat Enterprise Linux Desktop 7 x86_64
    Red Hat Enterprise Linux for Power, little endian 7 ppc64le

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3494 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3494
  • CVE-2021-38493
    Recently Published

    Red Hat Update for thunderbird (RHSA-2021:3495)

    Severity
    Critical4
    Qualys ID
    239630
    Date Published
    September 15, 2021
    Vendor Reference
    RHSA-2021:3495
    CVE Reference
    CVE-2021-38493
    CVSS Scores
    Base / Temporal
    Description
    Mozilla Thunderbird is a standalone mail and newsgroup client.This update upgrades Thunderbird to version 78.14.0.

    Security Fix(es): Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 (CVE-2021-38493)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3495 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3495
  • CVE-2021-38493
    Recently Published

    Red Hat Update for firefox (RHSA-2021:3496)

    Severity
    Critical4
    Qualys ID
    239629
    Date Published
    September 15, 2021
    Vendor Reference
    RHSA-2021:3496
    CVE Reference
    CVE-2021-38493
    CVSS Scores
    Base / Temporal
    Description
    Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.This update upgrades Firefox to version 78.14.0 ESR.

    Security Fix(es): Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 (CVE-2021-38493)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
    Red Hat Enterprise Linux Server - AUS 8.2 x86_64
    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
    Red Hat Enterprise Linux Server - TUS 8.2 x86_64
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3496 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3496
  • CVE-2021-38493
    Recently Published

    Red Hat Update for firefox (RHSA-2021:3497)

    Severity
    Critical4
    Qualys ID
    239628
    Date Published
    September 15, 2021
    Vendor Reference
    RHSA-2021:3497
    CVE Reference
    CVE-2021-38493
    CVSS Scores
    Base / Temporal
    Description
    Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.This update upgrades Firefox to version 78.14.0 ESR.

    Security Fix(es): Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 (CVE-2021-38493)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 8 x86_64
    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
    Red Hat Enterprise Linux Server - AUS 8.4 x86_64
    Red Hat Enterprise Linux for IBM z Systems 8 s390x
    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
    Red Hat Enterprise Linux for Power, little endian 8 ppc64le
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
    Red Hat Enterprise Linux Server - TUS 8.4 x86_64
    Red Hat Enterprise Linux for ARM 64 8 aarch64
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3497 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3497
  • CVE-2021-38493
    Recently Published

    Red Hat Update for firefox (RHSA-2021:3498)

    Severity
    Critical4
    Qualys ID
    239627
    Date Published
    September 15, 2021
    Vendor Reference
    RHSA-2021:3498
    CVE Reference
    CVE-2021-38493
    CVSS Scores
    Base / Temporal
    Description
    Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.This update upgrades Firefox to version 78.14.0 ESR.

    Security Fix(es): Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 (CVE-2021-38493)

    Affected Products:

    Red Hat Enterprise Linux Server 7 x86_64
    Red Hat Enterprise Linux Workstation 7 x86_64
    Red Hat Enterprise Linux Desktop 7 x86_64
    Red Hat Enterprise Linux for IBM z Systems 7 s390x
    Red Hat Enterprise Linux for Power, big endian 7 ppc64
    Red Hat Enterprise Linux for Power, little endian 7 ppc64le

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3498 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3498
  • CVE-2021-38493
    Recently Published

    Red Hat Update for thunderbird (RHSA-2021:3499)

    Severity
    Critical4
    Qualys ID
    239626
    Date Published
    September 15, 2021
    Vendor Reference
    RHSA-2021:3499
    CVE Reference
    CVE-2021-38493
    CVSS Scores
    Base / Temporal
    Description
    Mozilla Thunderbird is a standalone mail and newsgroup client.This update upgrades Thunderbird to version 78.14.0.

    Security Fix(es): Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 (CVE-2021-38493)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 8 x86_64
    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
    Red Hat Enterprise Linux Server - AUS 8.4 x86_64
    Red Hat Enterprise Linux for IBM z Systems 8 s390x
    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
    Red Hat Enterprise Linux for Power, little endian 8 ppc64le
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
    Red Hat Enterprise Linux Server - TUS 8.4 x86_64
    Red Hat Enterprise Linux for ARM 64 8 aarch64
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3499 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3499
  • CVE-2021-38493
    Recently Published

    Red Hat Update for thunderbird (RHSA-2021:3500)

    Severity
    Critical4
    Qualys ID
    239625
    Date Published
    September 15, 2021
    Vendor Reference
    RHSA-2021:3500
    CVE Reference
    CVE-2021-38493
    CVSS Scores
    Base / Temporal
    Description
    Mozilla Thunderbird is a standalone mail and newsgroup client.This update upgrades Thunderbird to version 78.14.0.

    Security Fix(es): Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 (CVE-2021-38493)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
    Red Hat Enterprise Linux Server - AUS 8.2 x86_64
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
    Red Hat Enterprise Linux Server - TUS 8.2 x86_64
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3500 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3500
  • CVE-2021-38493
    Recently Published

    Red Hat Update for firefox (RHSA-2021:3501)

    Severity
    Critical4
    Qualys ID
    239624
    Date Published
    September 15, 2021
    Vendor Reference
    RHSA-2021:3501
    CVE Reference
    CVE-2021-38493
    CVSS Scores
    Base / Temporal
    Description
    Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.This update upgrades Firefox to version 78.14.0 ESR.

    Security Fix(es): Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 (CVE-2021-38493)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3501 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3501
  • CVE-2021-40085
    Recently Published

    Red Hat Update for Red Hat OpenStack Platform 10.0 (openstack-neutron) (RHSA-2021:3502)

    Severity
    Critical4
    Qualys ID
    239623
    Date Published
    September 15, 2021
    Vendor Reference
    RHSA-2021:3502
    CVE Reference
    CVE-2021-40085
    CVSS Scores
    Base / Temporal
    Description
    Neutron is a virtual network service for OpenStack. Just like OpenStackNova provides an API to dynamically request and configure virtualservers, Neutron provides an API to dynamically request and configurevirtual networks. These networks connect "interfaces" from otherOpenStack services (e.g., virtual NICs from Nova VMs). The NeutronAPI supports extensions to provide advanced network capabilities(e.g., QoS, ACLs, network, monitoring, etc.).

    Security Fix(es): arbitrary dnsmasq reconfiguration via extra_dhcp_opts (CVE-2021-40085)

    Affected Products:

    Red Hat OpenStack 10 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3502 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3502
  • CVE-2021-40085
    Recently Published

    Red Hat Update for Red Hat OpenStack Platform 13.0 (openstack-neutron) (RHSA-2021:3503)

    Severity
    Critical4
    Qualys ID
    239622
    Date Published
    September 15, 2021
    Vendor Reference
    RHSA-2021:3503
    CVE Reference
    CVE-2021-40085
    CVSS Scores
    Base / Temporal
    Description
    Neutron is a virtual network service for OpenStack. Just like OpenStackNova provides an API to dynamically request and configure virtualservers, Neutron provides an API to dynamically request and configurevirtual networks. These networks connect "interfaces" from otherOpenStack services (e.g., virtual NICs from Nova VMs). The NeutronAPI supports extensions to provide advanced network capabilities(e.g., QoS, ACLs, network, monitoring, etc.).

    Security Fix(es): arbitrary dnsmasq reconfiguration via extra_dhcp_opts (CVE-2021-40085)

    Affected Products:

    Red Hat OpenStack 13 - Extended Life Cycle Support 13 x86_64
    Red Hat OpenStack 13 for IBM Power - Extended Life Cycle Support 13 ppc64le

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3503 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3503
  • CVE-2021-38655+
    Recently Published

    Microsoft Office and Microsoft Office Services and Web Apps Security Update September 2021

    Severity
    Critical4
    Qualys ID
    110390
    Date Published
    September 15, 2021
    Vendor Reference
    KB4484103, KB4484108, KB5001958, KB5001997, KB5001999, KB5002003, KB5002005, KB5002007, KB5002009, KB5002014, Office Click-2-Run, Office MacOS 2019
    CVE Reference
    CVE-2021-38655, CVE-2021-38650, CVE-2021-38654, CVE-2021-38653, CVE-2021-38658, CVE-2021-38646, CVE-2021-38660, CVE-2021-38657, CVE-2021-38656, CVE-2021-38659
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Microsoft has released September 2021 security updates to fix multiple security vulnerabilities.

    This security update contains the following:

    MacOS Release Notes
    Office Click-2-Run and Office 365 Release Notes
    KB5001999
    KB4484103
    KB5002005
    KB5001997
    KB4484108
    KB5002007
    KB5001958
    KB5002003
    KB5002014
    KB5002009
    KB5002014

    QID Detection Logic:
    This authenticated QID checks the file versions from the Microsoft advisory with the versions on the affected office system.

    Note: Office click-2-run and Office 365 installations need to be updated manually or need to be set to automatic update. There is no direct download for the patch.

    Consequence
    Successful exploitation allows an attacker to execute code remotely.

    Solution
    Refer to Microsoft Security Guidance for more details pertaining to this vulnerability.

    MacOS Release Notes
    Office Click-2-Run and Office 365 Release Notes
    KB5001999
    KB4484103
    KB5002005
    KB5001997
    KB4484108
    KB5002007
    KB5001958
    KB5002003
    KB5002014
    KB5002009
    KB5002014

    Patches
    Microsoft Office and Microsoft Office Services and Web Apps Security Update September 2021
  • CVE-2021-30475
    Recently Published

    OpenSUSE Security Update for libaom (openSUSE-SU-2021:3005-1)

    Severity
    Critical4
    Qualys ID
    751124
    Date Published
    September 15, 2021
    Vendor Reference
    openSUSE-SU-2021:3005-1
    CVE Reference
    CVE-2021-30475
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    OpenSUSE has released a security update for libaom to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.3



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:3005-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:3005-1
  • CVE-2021-31535
    Recently Published

    Amazon Linux Security Advisory for libX11: AL2012-2021-348

    Severity
    Critical4
    Qualys ID
    352824
    Date Published
    September 15, 2021
    CVE Reference
    CVE-2021-31535
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Package updates are available for amazon linux that fix the following vulnerabilities:
    cve-2021-31535: 1961822: cve-2021-31535 libx11: missing request length checks a missing validation flaw was found in libx11.
    This flaw allows an attacker to inject x11 protocol commands on x clients, and in some cases, also bypass, authenticate (via injection of control characters), or potentially execute arbitrary code with permissions of the application compiled with libx11.
    The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Administrators are advised to apply the appropriate software updates.
    Patches
    Amazon Linux Bare Metal AL2012-2021-348
  • CVE-2021-23017
    Recently Published

    Amazon Linux Security Advisory for nginx: AL2012-2021-344

    Severity
    Critical4
    Qualys ID
    352820
    Date Published
    September 15, 2021
    CVE Reference
    CVE-2021-23017
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Package updates are available for amazon linux that fix the following vulnerabilities:
    cve-2021-23017: a flaw was found in nginx.
    An off-by-one error while processing dns responses allows a network attacker to write a dot character out of bounds in a heap allocated buffer which can allow overwriting the least significant byte of next heap chunk metadata likely leading to a remote code execution in certain circumstances.
    The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    1963121: cve-2021-23017 nginx: off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Administrators are advised to apply the appropriate software updates.
    Patches
    Amazon Linux Bare Metal AL2012-2021-344
  • CVE-2019-10208+
    Recently Published

    Amazon Linux Security Advisory for postgresql9: AL2012-2021-345

    Severity
    Critical4
    Qualys ID
    352821
    Date Published
    September 15, 2021
    CVE Reference
    CVE-2019-10208, CVE-2020-25695
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Package updates are available for amazon linux that fix the following vulnerabilities:
    cve-2020-25695: a flaw was found in postgresql.
    An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary sql functions under the identity of a superuser.
    The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    1894425: cve-2020-25695 postgresql: multiple features escape "security restricted operation" sandbox cve-2019-10208: a flaw was discovered in postgresql where arbitrary sql statements can be executed given a suitable security definer function.
    An attacker, with execute permission on the function, can execute arbitrary sql as the owner of the function.
    1734416: cve-2019-10208 postgresql: type in pg_temp executes arbitrary sql during security definer execution


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Administrators are advised to apply the appropriate software updates.
    Patches
    Amazon Linux Bare Metal AL2012-2021-345
  • CVE-2021-0129+
    Recently Published

    Amazon Linux Security Advisory for kmod-mlx5: ALAC2012-2021-032

    Severity
    Critical4
    Qualys ID
    352833
    Date Published
    September 15, 2021
    CVE Reference
    CVE-2021-0129, CVE-2021-3564, CVE-2021-33034, CVE-2020-25671, CVE-2020-24587, CVE-2020-25670, CVE-2020-25672, CVE-2020-26558, CVE-2020-26139, CVE-2020-26147, CVE-2021-22555, CVE-2020-25673, CVE-2021-3587, CVE-2021-31916, CVE-2021-33909, CVE-2020-24588, CVE-2021-29650, CVE-2021-3573, CVE-2020-24586, CVE-2021-32399
    CVSS Scores
    Base 7.8 / Temporal 7
    Description
    Package updates are available for amazon linux that fix the following vulnerabilities:
    cve-2021-3587: cve-2021-3573: cve-2021-3564: cve-2021-33909: cve-2021-33034: cve-2021-32399: cve-2021-31916: cve-2021-29650: cve-2021-22555: cve-2021-0129: cve-2020-26558: cve-2020-26147: cve-2020-26139: cve-2020-25673: cve-2020-25672: cve-2020-25671: cve-2020-25670: cve-2020-24588: cve-2020-24587: cve-2020-24586:


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Administrators are advised to apply the appropriate software updates.
    Patches
    Amazon Linux Bare Metal ALAC2012-2021-032
  • CVE-2021-0129+
    Recently Published

    Amazon Linux Security Advisory for kmod-sfc: ALAC2012-2021-031

    Severity
    Critical4
    Qualys ID
    352832
    Date Published
    September 15, 2021
    CVE Reference
    CVE-2021-0129, CVE-2021-3564, CVE-2021-33034, CVE-2020-25671, CVE-2020-24587, CVE-2020-25670, CVE-2020-25672, CVE-2020-26558, CVE-2020-26139, CVE-2020-26147, CVE-2021-22555, CVE-2020-25673, CVE-2021-3587, CVE-2021-31916, CVE-2021-33909, CVE-2020-24588, CVE-2021-29650, CVE-2021-3573, CVE-2020-24586, CVE-2021-32399
    CVSS Scores
    Base 7.8 / Temporal 7
    Description
    Package updates are available for amazon linux that fix the following vulnerabilities:
    cve-2021-3587: cve-2021-3573: cve-2021-3564: cve-2021-33909: cve-2021-33034: cve-2021-32399: cve-2021-31916: cve-2021-29650: cve-2021-22555: cve-2021-0129: cve-2020-26558: cve-2020-26147: cve-2020-26139: cve-2020-25673: cve-2020-25672: cve-2020-25671: cve-2020-25670: cve-2020-24588: cve-2020-24587: cve-2020-24586:


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Administrators are advised to apply the appropriate software updates.
    Patches
    Amazon Linux Bare Metal ALAC2012-2021-031
  • CVE-2021-0129+
    Recently Published

    Amazon Linux Security Advisory for kernel: ALAC2012-2021-030

    Severity
    Critical4
    Qualys ID
    352831
    Date Published
    September 15, 2021
    CVE Reference
    CVE-2021-0129, CVE-2021-3564, CVE-2021-33034, CVE-2020-25671, CVE-2020-24587, CVE-2020-25670, CVE-2020-25672, CVE-2020-26558, CVE-2020-26139, CVE-2020-26147, CVE-2021-22555, CVE-2020-25673, CVE-2021-3587, CVE-2021-31916, CVE-2021-33909, CVE-2020-24588, CVE-2021-29650, CVE-2021-3573, CVE-2020-24586, CVE-2021-32399
    CVSS Scores
    Base 7.8 / Temporal 7
    Description
    Package updates are available for amazon linux that fix the following vulnerabilities:
    cve-2021-3587: cve-2021-3573: cve-2021-3564: cve-2021-33909: cve-2021-33034: cve-2021-32399: cve-2021-31916: cve-2021-29650: cve-2021-22555: cve-2021-0129: cve-2020-26558: cve-2020-26147: cve-2020-26139: cve-2020-25673: cve-2020-25672: cve-2020-25671: cve-2020-25670: cve-2020-24588: cve-2020-24587: cve-2020-24586:


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Administrators are advised to apply the appropriate software updates.
    Patches
    Amazon Linux Bare Metal ALAC2012-2021-030
  • CVE-2021-33909
    Recently Published

    Amazon Linux Security Advisory for kmod-mlx5: ALAC2012-2021-029

    Severity
    Critical4
    Qualys ID
    352830
    Date Published
    September 15, 2021
    CVE Reference
    CVE-2021-33909
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Package updates are available for amazon linux that fix the following vulnerabilities:
    cve-2021-33909:


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Administrators are advised to apply the appropriate software updates.
    Patches
    Amazon Linux Bare Metal ALAC2012-2021-029
  • CVE-2021-33909
    Recently Published

    Amazon Linux Security Advisory for kmod-sfc: ALAC2012-2021-028

    Severity
    Critical4
    Qualys ID
    352829
    Date Published
    September 15, 2021
    CVE Reference
    CVE-2021-33909
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Package updates are available for amazon linux that fix the following vulnerabilities:
    cve-2021-33909:


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Administrators are advised to apply the appropriate software updates.
    Patches
    Amazon Linux Bare Metal ALAC2012-2021-028
  • CVE-2021-33909
    Recently Published

    Amazon Linux Security Advisory for kernel: ALAC2012-2021-027

    Severity
    Critical4
    Qualys ID
    352828
    Date Published
    September 15, 2021
    CVE Reference
    CVE-2021-33909
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Package updates are available for amazon linux that fix the following vulnerabilities:
    cve-2021-33909:


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Administrators are advised to apply the appropriate software updates.
    Patches
    Amazon Linux Bare Metal ALAC2012-2021-027
  • CVE-2021-3472
    Recently Published

    Amazon Linux Security Advisory for xorg-x11-server: AL2012-2021-346

    Severity
    Critical4
    Qualys ID
    352822
    Date Published
    September 15, 2021
    CVE Reference
    CVE-2021-3472
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Package updates are available for amazon linux that fix the following vulnerabilities:
    cve-2021-3472: a flaw was found in xorg-x11-server.
    An interger underflow can occur in xserver which can lead to a local privilege escalation.
    The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    1944167: cve-2021-3472 xorg-x11-server: xchangefeedbackcontrol integer underflow leads to privilege escalation


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Administrators are advised to apply the appropriate software updates.
    Patches
    Amazon Linux Bare Metal AL2012-2021-346
  • CVE-2021-3653+
    Recently Published

    Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5073-1)

    Severity
    Critical4
    Qualys ID
    198497
    Date Published
    September 15, 2021
    Vendor Reference
    USN-5073-1
    CVE Reference
    CVE-2021-3653, CVE-2021-3612, CVE-2021-3656, CVE-2021-38160, CVE-2021-34693
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    The kvm hypervisor implementation for amd processors in the linux kernel allowed a guest vm to disable restrictions on vmload/vmsave in a nested guest.
    The kvm hypervisor implementation for amd processors in the linux kernel did not properly prevent a guest vm from enabling avic in nested guest vms.
    The can broadcast manger (bcm) protocol implementation in the linux kernel did not properly initialize memory in some situations.
    The joystick device interface in the linux kernel did not properly validate data passed via an ioctl().the virtio console implementation in the linux kernel did not properly validate input lengths in some situations.


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    an attacker in a guest vm could use this to read or write portions of the host's physical memory. (
    Cve-2021-3656).
    An attacker in a guest vm could use this to write to portions of the host's physical memory. (
    Cve-2021-3653).
    A local attacker could use this to expose sensitive information (kernel memory) (cve-2021-34693).
    A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code on systems with a joystick device registered. (
    Cve-2021-3612).
    A local attacker could possibly use this to cause a denial of service (system crash) (cve-2021-38160).
    Solution
    Refer to Ubuntu advisory: USN-5073-1 for affected packages and patching details, or update with your package manager.
    Patches
    Ubuntu Linux USN-5073-1
  • CVE-2021-38207+
    Recently Published

    Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5070-1)

    Severity
    Critical4
    Qualys ID
    198491
    Date Published
    September 15, 2021
    Vendor Reference
    USN-5070-1
    CVE Reference
    CVE-2021-38207, CVE-2021-3612, CVE-2021-3653, CVE-2021-22543, CVE-2021-38198, CVE-2021-38200, CVE-2020-26541, CVE-2021-3656, CVE-2021-38206, CVE-2021-34693
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    The kvm hypervisor implementation for amd processors in the linux kernel allowed a guest vm to disable restrictions on vmload/vmsave in a nested guest.
    The kvm hypervisor implementation for amd processors in the linux kernel did not properly prevent a guest vm from enabling avic in nested guest vms.
    The linux kernel did not properly enforce certain types of entries in the secure boot forbidden signature database (aka dbx) protection mechanism.
    The kvm hypervisor implementation in the linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability.
    The can broadcast manger (bcm) protocol implementation in the linux kernel did not properly initialize memory in some situations.
    The joystick device interface in the linux kernel did not properly validate data passed via an ioctl().the kvm hypervisor implementation in the linux kernel did not properly compute the access permissions for shadow pages in some situations.
    The perf subsystem in the linux kernel for the powerpc architecture contained a null pointer dereference in some situations.
    The mac80211 subsystem in the linux kernel contained a null pointer dereference in some situations.
    The xilinx ll temac device driver in the linux kernel did not properly calculate the number of buffers to be used in certain situations.

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    an attacker in a guest vm could use this to read or write portions of the host's physical memory. (
    Cve-2021-3656).
    An attacker in a guest vm could use this to write to portions of the host's physical memory. (
    Cve-2021-3653).
    An attacker could use this to bypass uefi secure boot restrictions. (
    Cve-2020-26541).
    An attacker who could start and control a vm could possibly use this to expose sensitive information or execute arbitrary code. (
    Cve-2021-22543).
    A local attacker could use this to expose sensitive information (kernel memory) (cve-2021-34693).
    A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code on systems with a joystick device registered. (
    Cve-2021-3612).
    A local attacker could use this to cause a denial of service. (
    Cve-2021-38198).
    An attacker could use this to cause a denial of service (system crash) (cve-2021-38200).
    A physically proximate attacker could possibly use this to cause a denial of service (system crash) (cve-2021-38206).
    A remote attacker could use this to cause a denial of service (system crash) (cve-2021-38207).
    Solution
    Refer to Ubuntu advisory: USN-5070-1 for affected packages and patching details, or update with your package manager.
    Patches
    Ubuntu Linux USN-5070-1
  • CVE-2021-3653+
    Recently Published

    Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5071-1)

    Severity
    Critical4
    Qualys ID
    198487
    Date Published
    September 15, 2021
    Vendor Reference
    USN-5071-1
    CVE Reference
    CVE-2021-3653, CVE-2021-3612, CVE-2021-22543, CVE-2020-36311, CVE-2021-3656
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    The kvm hypervisor implementation for amd processors in the linux kernel allowed a guest vm to disable restrictions on vmload/vmsave in a nested guest.
    The kvm hypervisor implementation for amd processors in the linux kernel did not properly prevent a guest vm from enabling avic in nested guest vms.
    The kvm hypervisor implementation for amd processors in the linux kernel did not ensure enough processing time was given to perform cleanups of large sev vms.
    The kvm hypervisor implementation in the linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability.
    The joystick device interface in the linux kernel did not properly validate data passed via an ioctl().

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    an attacker in a guest vm could use this to read or write portions of the host's physical memory. (
    Cve-2021-3656).
    An attacker in a guest vm could use this to write to portions of the host's physical memory. (
    Cve-2021-3653).
    A local attacker could use this to cause a denial of service (soft lockup) (cve-2020-36311).
    An attacker who could start and control a vm could possibly use this to expose sensitive information or execute arbitrary code. (
    Cve-2021-22543).
    A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code on systems with a joystick device registered. (
    Cve-2021-3612).
    Solution
    Refer to Ubuntu advisory: USN-5071-1 for affected packages and patching details, or update with your package manager.
    Patches
    Ubuntu Linux USN-5071-1
  • CVE-2020-13692
    Recently Published

    Amazon Linux Security Advisory for postgresql-jdbc: AL2012-2021-350

    Severity
    Critical4
    Qualys ID
    352826
    Date Published
    September 15, 2021
    CVE Reference
    CVE-2020-13692
    CVSS Scores
    Base 7.7 / Temporal 6.7
    Description
    Package updates are available for amazon linux that fix the following vulnerabilities:
    cve-2020-13692: a flaw was found in postgresql jdbc in versions prior to 42.2.13.
    An xml external entity (xxe) weakness was found in postgresql jdbc.
    The highest threat from this vulnerability is to data confidentiality and system availability.
    1852985: cve-2020-13692 postgresql-jdbc: xml external entity (xxe) vulnerability in pgsqlxml


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Administrators are advised to apply the appropriate software updates.
    Patches
    Amazon Linux Bare Metal AL2012-2021-350
  • CVE-2021-25217
    Recently Published

    Amazon Linux Security Advisory for dhcp: AL2012-2021-343

    Severity
    Critical4
    Qualys ID
    352819
    Date Published
    September 15, 2021
    CVE Reference
    CVE-2021-25217
    CVSS Scores
    Base 7.4 / Temporal 6.4
    Description
    Package updates are available for amazon linux that fix the following vulnerabilities:
    cve-2021-25217: a flaw was found in the dynamic host configuration protocol (dhcp).
    There is a discrepancy between the code that handles encapsulated option information in leases transmitted "on the wire" and the code which reads and parses lease information after it has been written to disk storage.
    This flaw allows an attacker to deliberately cause a situation where dhcpd while running in dhcpv4 or dhcpv6 mode, or the dhclient attempts to read a stored lease that contains option information, to trigger a stack-based buffer overflow in the option parsing code for colon-separated hex digits values.
    The highest threat from this vulnerability is to data confidentiality and integrity as well as service availability.
    1963258: cve-2021-25217 dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Administrators are advised to apply the appropriate software updates.
    Patches
    Amazon Linux Bare Metal AL2012-2021-343
  • CVE-2021-35267+
    Recently Published

    OpenSUSE Security Update for ntfs-3g_ntfsprogs (openSUSE-SU-2021:1244-1)

    Severity
    Critical4
    Qualys ID
    751127
    Date Published
    September 15, 2021
    Vendor Reference
    openSUSE-SU-2021:1244-1
    CVE Reference
    CVE-2021-35267, CVE-2021-39252, CVE-2021-39257, CVE-2021-33289, CVE-2021-35269, CVE-2021-39256, CVE-2021-39261, CVE-2021-35268, CVE-2021-39253, CVE-2021-33287, CVE-2021-39251, CVE-2021-39263, CVE-2021-33285, CVE-2021-33286, CVE-2021-35266, CVE-2019-9755, CVE-2021-39259, CVE-2021-39260, CVE-2021-39262, CVE-2021-39255, CVE-2021-39258
    CVSS Scores
    Base 7 / Temporal 6.1
    Description
    OpenSUSE has released a security update for ntfs-3g_ntfsprogs to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.2



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:1244-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:1244-1
  • CVE-2021-39365
    Recently Published

    SUSE Enterprise Linux Security Update for grilo (SUSE-SU-2021:3003-1)

    Severity
    Critical4
    Qualys ID
    751117
    Date Published
    September 15, 2021
    Vendor Reference
    SUSE-SU-2021:3003-1
    CVE Reference
    CVE-2021-39365
    CVSS Scores
    Base 5.9 / Temporal 5.2
    Description
    This update for grilo fixes the following issues: - cve-2021-39365: fixed missing tls certificate verification (bsc#1189839).


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:3003-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:3003-1
  • CVE-2021-3746
    Recently Published

    OpenSUSE Security Update for libtpms (openSUSE-SU-2021:3004-1)

    Severity
    Critical4
    Qualys ID
    751126
    Date Published
    September 15, 2021
    Vendor Reference
    openSUSE-SU-2021:3004-1
    CVE Reference
    CVE-2021-3746
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description
    OpenSUSE has released a security update for libtpms to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.3



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:3004-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:3004-1
  • CVE-2021-22898
    Recently Published

    Amazon Linux Security Advisory for curl: AL2012-2021-347

    Severity
    Critical4
    Qualys ID
    352823
    Date Published
    September 15, 2021
    CVE Reference
    CVE-2021-22898
    CVSS Scores
    Base 3.1 / Temporal 2.7
    Description
    Package updates are available for amazon linux that fix the following vulnerabilities:
    cve-2021-22898: a vulnerability was found in curl where a flaw in the option parser for sending new_env variables libcurl can pass uninitialized data from a stack-based buffer to the server.
    This issue leads to potentially revealing sensitive internal information to the server using a clear-text network protocol.
    The highest threat from this vulnerability is to confidentiality.
    1964887: cve-2021-22898 curl: telnet stack contents disclosure


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Administrators are advised to apply the appropriate software updates.
    Patches
    Amazon Linux Bare Metal AL2012-2021-347
  • CVE-2021-3597+
    Recently Published

    Red Hat Update for Red Hat JBoss Enterprise Application Platform 7.3.9 (RHSA-2021:3467)

    Severity
    Critical4
    Qualys ID
    239609
    Date Published
    September 15, 2021
    Vendor Reference
    RHSA-2021:3467
    CVE Reference
    CVE-2021-3597, CVE-2021-3644, CVE-2021-3690, CVE-2021-28170, CVE-2021-29425
    CVSS Scores
    Base 5.3 / Temporal 4.6
    Description
    This release of Red Hat JBoss Enterprise Application Platform 7.3.9 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.8, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.9 Release Notes for information about the most significant bug fixes and enhancements included in this release.

    Security Fix(es): undertow: buffer leak on incoming websocket PONG message may lead to DoS (CVE-2021-3690) undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS (CVE-2021-3597) jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate (CVE-2021-28170) apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 (CVE-2021-29425) wildfly-core: Invalid Sensitivity Classification of Vault Expression (CVE-2021-3644)

    Affected Products:

    JBoss Enterprise Application Platform 7.3 for RHEL 7 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3467 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3467
  • CVE-2021-3597+
    Recently Published

    Red Hat Update for Red Hat JBoss Enterprise Application Platform 7.3.9 (RHSA-2021:3468)

    Severity
    Critical4
    Qualys ID
    239608
    Date Published
    September 15, 2021
    Vendor Reference
    RHSA-2021:3468
    CVE Reference
    CVE-2021-3597, CVE-2021-3644, CVE-2021-3690, CVE-2021-28170, CVE-2021-29425
    CVSS Scores
    Base 5.3 / Temporal 4.6
    Description
    This release of Red Hat JBoss Enterprise Application Platform 7.3.9 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.8, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.9 Release Notes for information about the most significant bug fixes and enhancements included in this release.

    Security Fix(es): undertow: buffer leak on incoming websocket PONG message may lead to DoS (CVE-2021-3690) undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS (CVE-2021-3597) jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate (CVE-2021-28170) apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 (CVE-2021-29425) wildfly-core: Invalid Sensitivity Classification of Vault Expression (CVE-2021-3644)

    Affected Products:

    JBoss Enterprise Application Platform 7.3 for RHEL 8 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3468 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3468
  • CVE-2019-18218
    Recently Published

    SUSE Enterprise Linux Security Update for file (SUSE-SU-2021:2930-1)

    Severity
    Critical4
    Qualys ID
    751081
    Date Published
    September 15, 2021
    Vendor Reference
    SUSE-SU-2021:2930-1
    CVE Reference
    CVE-2019-18218
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    This update for file fixes the following issues: - cve-2019-18218: fixed heap-based buffer overflow in cdf_read_property_info in cdf.c (bsc#1154661).

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2930-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:2930-1
  • CVE-2020-22022+
    Recently Published

    SUSE Enterprise Linux Security Update for ffmpeg (SUSE-SU-2021:2929-1)

    Severity
    Critical4
    Qualys ID
    751079
    Date Published
    September 15, 2021
    Vendor Reference
    SUSE-SU-2021:2929-1
    CVE Reference
    CVE-2020-22022, CVE-2020-22023, CVE-2020-22019, CVE-2020-22048, CVE-2020-22031, CVE-2020-20451, CVE-2020-21697, CVE-2020-22017, CVE-2020-22026, CVE-2020-22049, CVE-2020-22021, CVE-2020-22039, CVE-2020-22054, CVE-2021-38114, CVE-2020-22016, CVE-2020-22020, CVE-2020-22043, CVE-2020-21041, CVE-2019-17539, CVE-2020-22033, CVE-2020-22044, CVE-2020-22025, CVE-2020-20448, CVE-2020-21688, CVE-2020-22038, CVE-2020-22046, CVE-2020-22015, CVE-2020-22032, CVE-2020-22034, CVE-2019-9721, CVE-2020-13904
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    This update for ffmpeg fixes the following issues: - cve-2019-9721: fixed a denial of service in the subtitle decoder in handle_open_brace from libavcodec/htmlsubtitles.c (bsc#1129714).
    - cve-2020-22046: fixed a denial of service vulnerability due to a memory leak in the avpriv_float_dsp_allocl function in libavutil/float_dsp.c (bsc#1186849).
    - cve-2020-22048: fixed a denial of service vulnerability due to a memory leak in the ff_frame_pool_get function in framepool.c (bsc#1186859).
    - cve-2020-22049: fixed a denial of service vulnerability caused by a memory leak in the wtvfile_open_sector function in wtvdec.c (bsc#1186861).
    - cve-2020-22054: fixed a denial of service vulnerability due to a memory leak in the av_dict_set function in dict.c (bsc#1186863).
    - cve-2020-13904: fixed use-after-free via a crafted extinf duration in an m3u8 file (bsc#1172640).
    - cve-2020-21041: fixed buffer overflow vulnerability via apng_do_inverse_blend in libavcodec/pngenc.c (bsc#1186406).
    - cve-2019-17539: fixed null pointer dereference in avcodec_open2 in libavcodec/utils.c (bsc# 1154065).
    - cve-2020-22026: fixed buffer overflow vulnerability in config_input() at libavfilter/af_tremolo.c (bsc#1186583).
    - cve-2020-22021: fixed buffer overflow vulnerability in filter_edges function in libavfilter/vf_yadif.c (bsc#1186586).
    - cve-2020-22020: fixed buffer overflow vulnerability in build_diff_map() in libavfilter/vf_fieldmatch.c (bsc#1186587).
    - cve-2020-22015: fixed buffer overflow vulnerability in mov_write_video_tag() due to the out of bounds in libavformat/movenc.c (bsc#1186596).
    - cve-2020-22016: fixed a heap-based buffer overflow vulnerability at libavcodec/get_bits.h when writing .mov files (bsc#1186598).
    - cve-2020-22017: fixed a heap-based buffer overflow vulnerability in ff_fill_rectangle() in libavfilter/drawutils.c (bsc#1186600).
    - cve-2020-22022: fixed a heap-based buffer overflow vulnerability in filter_frame at libavfilter/vf_fieldorder.c (bsc#1186603).
    - cve-2020-22023: fixed a heap-based buffer overflow vulnerability in filter_frame at libavfilter/vf_bitplanenoise.c (bsc#1186604) - cve-2020-22025: fixed a heap-based buffer overflow vulnerability in gaussian_blur at libavfilter/vf_edgedetect.c (bsc#1186605).
    - cve-2020-22031: fixed a heap-based buffer overflow vulnerability at libavfilter/vf_w3fdif.c in filter16_complex_low() (bsc#1186613).
    - cve-2020-22032: fixed a heap-based buffer overflow vulnerability at libavfilter/vf_edgedetect.c in gaussian_blur() (bsc#1186614).
    - cve-2020-22034: fixed a heap-based buffer overflow vulnerability at libavfilter/vf_floodfill.c (bsc#1186616).
    - cve-2020-20451: fixed denial of service issue due to resource management errors via fftools/cmdutils.c (bsc#1186658).
    - cve-2020-20448: fixed divide by zero issue via libavcodec/ratecontrol.c (bsc#1186660).
    - cve-2020-22038: fixed denial of service vulnerability due to a memory leak in the ff_v4l2_m2m_create_context function in v4l2_m2m.c (bsc#1186757).
    - cve-2020-22039: fixed denial of service vulnerability due to a memory leak in the inavi_add_ientry function (bsc#1186758).
    - cve-2020-22043: fixed denial of service vulnerability due to a memory leak at the fifo_alloc_common function in libavutil/fifo.c (bsc#1186762).
    - cve-2020-22044: fixed denial of service vulnerability due to a memory leak in the url_open_dyn_buf_internal function in libavformat/aviobuf.c (bsc#1186763).
    - cve-2020-21688: fixed a heap-use-after-free in the av_freep function in libavutil/mem.c (bsc#1189348).
    - cve-2021-38114: fixed a not checked return value of the init_vlc function (bsc#1189142).

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2929-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:2929-1
  • CVE-2019-19977
    Recently Published

    SUSE Enterprise Linux Security Update for libesmtp (SUSE-SU-2021:2917-1)

    Severity
    Critical4
    Qualys ID
    751073
    Date Published
    September 15, 2021
    Vendor Reference
    SUSE-SU-2021:2917-1
    CVE Reference
    CVE-2019-19977
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    This update for libesmtp fixes the following issues: - cve-2019-19977: fix stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2917-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:2917-1
  • CVE-2018-1311
    Recently Published

    SUSE Enterprise Linux Security Update for xerces-c (SUSE-SU-2021:2920-1)

    Severity
    Critical4
    Qualys ID
    751082
    Date Published
    September 15, 2021
    Vendor Reference
    SUSE-SU-2021:2920-1
    CVE Reference
    CVE-2018-1311
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description
    This update for xerces-c fixes the following issues: - cve-2018-1311: fixed use-after-free inside xml parser during the scanning of external dtds (bsc#1159552).

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2920-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:2920-1
  • CVE-2021-0089+
    Recently Published

    SUSE Enterprise Linux Security Update for xen (SUSE-SU-2021:2924-1)

    Severity
    Critical4
    Qualys ID
    751083
    Date Published
    September 15, 2021
    Vendor Reference
    SUSE-SU-2021:2924-1
    CVE Reference
    CVE-2021-0089, CVE-2021-20255, CVE-2021-28694, CVE-2021-28696, CVE-2021-28698, CVE-2021-28690, CVE-2021-3594, CVE-2021-28699, CVE-2021-28693, CVE-2021-3592, CVE-2021-28700, CVE-2021-28692, CVE-2021-28695, CVE-2021-3595, CVE-2021-28697
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    This update for xen fixes the following issues: security issues fixed: - cve-2021-28693: xen/arm: boot modules are not scrubbed (bsc#1186428) - cve-2021-28692: xen: inappropriate x86 iommu timeout detection / handling (bsc#1186429) - cve-2021-0089: xen: speculative code store bypass (bsc#1186433) - cve-2021-28690: xen: x86: tsx async abort protections not restored after s3 (bsc#1186434) - cve-2021-20255: fixed stack overflow via infinite recursion in eepro100 (bsc#1182654) - cve-2021-28694,cve-2021-28695,cve-2021-28696: iommu page mapping issues on x86 (xsa-378)(bsc#1189373).
    - cve-2021-28697: grant table v2 status pages may remain accessible after de-allocation (xsa-379)(bsc#1189376).
    - cve-2021-28698: long running loops in grant table handling (xsa-380)(bsc#1189378).
    - cve-2021-28699: inadequate grant-v2 status frames array bounds check (xsa-382)(bsc#1189380).
    - cve-2021-28700: no memory limit for dom0less domus (xsa-383)(bsc#1189381).
    - cve-2021-3592: slirp: invalid pointer initialization may lead to information disclosure (bootp)(bsc#1187369).
    - cve-2021-3594: slirp: invalid pointer initialization may lead to information disclosure (udp)(bsc#1187378).
    - cve-2021-3595: slirp: invalid pointer initialization may lead to information disclosure (tftp)(bsc#1187376).
    other issues fixed: - fixed "panic on cpu 0: io-apic + timer doesnt work!" (
    Bsc#1180491) - fixed an issue with xencommons, where file format expecations by fillup did not allign (bsc#1185682) - upstream bug fixes (bsc#1027519) - dom0 hangs when pinning cpus for dom0 with hvm guest (bsc#1179246).
    - fixed xen sles11sp4 guest hangs on cluster (bsc#1188050).
    - fixed pvhvm sles12 sp5 - nmi watchdog cpu stuck (bsc#1180846).
    - core cannot be opened when using xl dump-core of vm with ptf (bsc#1183243) - prevent superpage allocation in the lapic and acpi_info range (bsc#1189882).

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2924-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:2924-1
  • CVE-2021-28698+
    Recently Published

    SUSE Enterprise Linux Security Update for xen (SUSE-SU-2021:2925-1)

    Severity
    Critical4
    Qualys ID
    751074
    Date Published
    September 15, 2021
    Vendor Reference
    SUSE-SU-2021:2925-1
    CVE Reference
    CVE-2021-28698, CVE-2021-28692, CVE-2021-28695, CVE-2021-28694, CVE-2021-28690, CVE-2021-28697, CVE-2021-28699, CVE-2021-28696, CVE-2021-28693, CVE-2021-28700, CVE-2021-0089
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    This update for xen fixes the following issues: security issues fixed: - cve-2021-28693: xen/arm: boot modules are not scrubbed (bsc#1186428) - cve-2021-28692: xen: inappropriate x86 iommu timeout detection / handling (bsc#1186429) - cve-2021-0089: xen: speculative code store bypass (bsc#1186433) - cve-2021-28690: xen: x86: tsx async abort protections not restored after s3 (bsc#1186434) - cve-2021-28694,cve-2021-28695,cve-2021-28696: iommu page mapping issues on x86 (xsa-378)(bsc#1189373).
    - cve-2021-28697: grant table v2 status pages may remain accessible after de-allocation (xsa-379)(bsc#1189376).
    - cve-2021-28698: long running loops in grant table handling (xsa-380)(bsc#1189378).
    - cve-2021-28699: inadequate grant-v2 status frames array bounds check (xsa-382)(bsc#1189380).
    - cve-2021-28700: no memory limit for dom0less domus (xsa-383)(bsc#1189381).
    Other issues fixed: - fixed "panic on cpu 0: io-apic + timer doesn't work!" (
    Bsc#1180491) - upstream bug fixes (bsc#1027519) - dom0 hangs when pinning cpus for dom0 with hvm guest (bsc#1179246).
    - fixed xen sles11sp4 guest hangs on cluster (bsc#1188050).
    - fixed pvhvm sles12 sp5 - nmi watchdog cpu stuck (bsc#1180846).
    - core cannot be opened when using xl dump-core of vm with ptf (bsc#1183243).
    - prevent superpage allocation in the lapic and acpi_info range (bsc#1189882).

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2925-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:2925-1
  • CVE-2020-36193
    Recently Published

    SUSE Enterprise Linux Security Update for Hypertext Preprocessor (PHP72) (SUSE-SU-2021:2926-1)

    Severity
    Critical4
    Qualys ID
    751075
    Date Published
    September 15, 2021
    Vendor Reference
    SUSE-SU-2021:2926-1
    CVE Reference
    CVE-2020-36193
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    This update for php72 fixes the following issues: - cve-2020-36193: fixed archive_tar directory traversal due to inadequate checking of symbolic links (bsc#1189591).

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2926-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:2926-1
  • CVE-2021-20299+
    Recently Published

    SUSE Enterprise Linux Security Update for openexr (SUSE-SU-2021:2913-1)

    Severity
    Critical4
    Qualys ID
    751072
    Date Published
    September 15, 2021
    Vendor Reference
    SUSE-SU-2021:2913-1
    CVE Reference
    CVE-2021-20299, CVE-2021-20300, CVE-2021-20304, CVE-2021-20303, CVE-2021-3476, CVE-2021-20302, CVE-2021-20298
    CVSS Scores
    Base 5.3 / Temporal 4.6
    Description
    This update for openexr fixes the following issues: - cve-2021-20298 [bsc#1188460]: fixed out-of-memory in b44compressor - cve-2021-20299 [bsc#1188459]: fixed null-dereference read in imf_2_5:header:operator - cve-2021-20300 [bsc#1188458]: fixed integer-overflow in imf_2_5:hufuncompress - cve-2021-20302 [bsc#1188462]: fixed floating-point-exception in imf_2_5:precalculatetileinfot - cve-2021-20303 [bsc#1188457]: fixed heap-buffer-overflow in imf_2_5::copyintoframebuffer - cve-2021-20304 [bsc#1188461]: fixed undefined-shift in imf_2_5:hufdecode

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2913-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:2913-1
  • CVE-2021-37035+
    Recently Published

    Google Android August 2021 Security Patch Missing for Huawei EMUI

    Severity
    Urgent5
    Qualys ID
    610368
    Date Published
    September 14, 2021
    Vendor Reference
    August 2021
    CVE Reference
    CVE-2021-37035, CVE-2021-37034, CVE-2021-37033, CVE-2021-37032, CVE-2021-37031, CVE-2021-37030, CVE-2021-37029
    CVSS Scores
    Base / Temporal
    Description
    Android is a mobile operating system based on a modified version of the Linux kernel and other open source software, designed primarily for touchscreen mobile devices such as smartphones and tablets.

    Following security issues were discovered:
    CVE-2021-37035,CVE-2021-37034,CVE-2021-37033,CVE-2021-37032,CVE-2021-37031,CVE-2021-37030,CVE-2021-37029

    Affected Devices :
    HUAWEI P series: P30 Pro, P30, P20 Pro, P20
    HUAWEI Mate series: Mate 20 X, Mate 20 Pro, Mate 20, Mate 20 RS, Mate 10 Pro, Mate 10, PORSCHE DESIGN HUAWEI Mate RS

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Refer to HUAWEI Security advisory August 2021 to address this issue and obtain more information.
    Patches
    Android August 2021
  • CVE-2021-30860+
    Recently Published

    Apple iOS 14.8 and iPadOS 14.8 Security Update Missing

    Severity
    Urgent5
    Qualys ID
    610367
    Date Published
    September 14, 2021
    Vendor Reference
    HT212807
    CVE Reference
    CVE-2021-30860, CVE-2021-30858
    CVSS Scores
    Base / Temporal
    Description
    iOS is a mobile operating system created and developed by Apple Inc.

    Following security issues are observed :
    An integer overflow was addressed with improved input validation. CVE-2021-30860
    A use after free issue was addressed with improved memory management. CVE-2021-30858

    Affected Devices
    iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation)

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Refer to Apple advisory HT212807 for patching details.
    Patches
    iOS HT212807
  • CVE-2021-1972+
    Recently Published

    Google Android September 2021 Security Patch Missing for Samsung

    Severity
    Urgent5
    Qualys ID
    610366
    Date Published
    September 14, 2021
    Vendor Reference
    SMR-September-2021
    CVE Reference
    CVE-2021-1972, CVE-2021-1976, CVE-2021-0687, CVE-2021-28375, CVE-2020-14381, CVE-2021-0582, CVE-2021-0578, CVE-2021-0579, CVE-2021-0580, CVE-2021-0581, CVE-2021-30261, CVE-2021-30260, CVE-2021-1939, CVE-2021-1947, CVE-2021-1904, CVE-2021-0639, CVE-2019-10581, CVE-2021-0518, CVE-2021-0595, CVE-2021-0683, CVE-2021-0684, CVE-2021-0685, CVE-2021-0688, CVE-2021-0686, CVE-2021-0689, CVE-2021-0690, CVE-2021-0598, CVE-2021-0692, CVE-2021-0428, CVE-2021-0644, CVE-2021-0682, CVE-2021-0693, CVE-2021-0565, CVE-2021-0556, CVE-2021-0562, CVE-2021-0566, CVE-2021-0536, CVE-2021-0537, CVE-2021-0538, CVE-2021-0539, CVE-2021-0547, CVE-2021-0548, CVE-2021-0553, CVE-2021-0549, CVE-2021-0552, CVE-2021-0691
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Android is a mobile operating system based on a modified version of the Linux kernel and other open source software, designed primarily for touchscreen mobile devices such as smartphones and tablets.

    Following security issues were discovered:
    CVE-2021-1972, CVE-2021-1976, CVE-2021-0687,CVE-2021-28375, CVE-2020-14381, CVE-2021-0582, CVE-2021-0578, CVE-2021-0579, CVE-2021-0580, CVE-2021-0581, CVE-2021-30261, CVE-2021-30260, CVE-2021-1939, CVE-2021-1947, CVE-2021-1904, CVE-2021-0639, CVE-2019-10581, CVE-2021-0518, CVE-2021-0595, CVE-2021-0683, CVE-2021-0684, CVE-2021-0685, CVE-2021-0688, CVE-2021-0686, CVE-2021-0689, CVE-2021-0690, CVE-2021-0598, CVE-2021-0692, CVE-2021-0428, CVE-2021-0644, CVE-2021-0682, CVE-2021-0693,CVE-2021-0565, CVE-2021-0556, CVE-2021-0562, CVE-2021-0566, CVE-2021-0536, CVE-2021-0537, CVE-2021-0538, CVE-2021-0539, CVE-2021-0547, CVE-2021-0548, CVE-2021-0553, CVE-2021-0549, CVE-2021-0552, CVE-2021-0691

    Affected Products :
    G series (G5, G6, G7, G8), V series(V10, V20, V30, V35, V40, V50) , Q Series(Q6, Q8) , X Series(X300, X400, X500, X cam), CV Series(CV1, CV3, CV5, CV7, CV1S, CV7AS), MH(K40, K50, Q60, Q70)

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Refer to Samsung Security advisory SMR-September-2021 to address this issue and obtain more information.
    Patches
    Android SMR-September-2021
  • CVE-2021-1972+
    Recently Published

    Google Android September 2021 Security Patch Missing for LGE

    Severity
    Urgent5
    Qualys ID
    610365
    Date Published
    September 14, 2021
    Vendor Reference
    SMR-September-2021
    CVE Reference
    CVE-2021-1972, CVE-2021-1976, CVE-2021-1916, CVE-2021-1919, CVE-2021-1920, CVE-2021-0687
    CVSS Scores
    Base / Temporal
    Description
    Android is a mobile operating system based on a modified version of the Linux kernel and other open source software, designed primarily for touchscreen mobile devices such as smartphones and tablets.

    Following security issues were discovered:
    CVE-2021-1972,CVE-2021-1976,CVE-2021-1916,CVE-2021-1919,CVE-2021-1920,CVE-2021-0687,CVE-2020-14381,CVE-2021-28375,CVE-2021-057,CVE-2021-057,CVE-2021-0578,CVE-2021-0579,CVE-2021-0580,CVE-2021-0581,CVE-2021-0582,CVE-2021-0639,CVE-2021-1904,CVE-2021-1939,CVE-2021-1947,CVE-2021-1978,CVE-2021-1914,CVE-2021-30260,CVE-2021-30261,CVE-2019-10581,CVE-2021-0595,CVE-2021-0683,CVE-2021-0684,CVE-2021-0685,CVE-2021-0688,CVE-2021-0686,CVE-2021-0689,CVE-2021-0690,CVE-2021-0598,CVE-2021-0692,CVE-2021-0428,CVE-2021-0644,CVE-2021-0682,CVE-2021-0693,CVE-2021-0691

    Affected Products :
    G series (G5, G6, G7, G8), V series(V10, V20, V30, V35, V40, V50) , Q Series(Q6, Q8) , X Series(X300, X400, X500, X cam), CV Series(CV1, CV3, CV5, CV7, CV1S, CV7AS), MH(K40, K50, Q60, Q70)

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Refer to LGE Security advisory SMR-September-2021 to address this issue and obtain more information.
    Patches
    Android SMR-September-2021
  • CVE-2021-3491+
    Recently Published

    Google Pixel Android September 2021 Security Patch Missing

    Severity
    Urgent5
    Qualys ID
    610362
    Date Published
    September 14, 2021
    Vendor Reference
    Pixel Update Bulletin September2021
    CVE Reference
    CVE-2021-3491, CVE-2021-0869, CVE-2021-1960, CVE-2021-1961, CVE-2021-1962, CVE-2021-1963, CVE-2021-1957, CVE-2021-1956, CVE-2021-1958
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Android is a mobile operating system based on a modified version of the Linux kernel and other open source software, designed primarily for touchscreen mobile devices such as smartphones and tablets.

    Following security issues were discovered:
    CVE-2021-3491,CVE-2021-0869,CVE-2021-1960,CVE-2021-1961,CVE-2021-1962,CVE-2021-1963,CVE-2021-1957,CVE-2021-1956,CVE-2021-1958

    Affected Products :
    Pixel 4 XL, Pixel 4, Pixel 3a XL, Pixel 3a, Pixel 3 XL, Pixel 3, Pixel 2 XL, Pixel 2

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Refer to Google Pixel advisory Google Pixel Android September2021 to address this issue and obtain more information.
    Patches
    Android September 2021
  • CVE-2021-1976+
    Recently Published

    Google Android September 2021 Security Patch Missing for Huawei EMUI

    Severity
    Urgent5
    Qualys ID
    610364
    Date Published
    September 14, 2021
    Vendor Reference
    September 2021
    CVE Reference
    CVE-2021-1976, CVE-2021-1972, CVE-2021-0591, CVE-2021-0593, CVE-2021-0640, CVE-2021-0641, CVE-2021-0642, CVE-2021-0646, CVE-2021-0584, CVE-2021-1939, CVE-2021-1947, CVE-2021-1904, CVE-2021-1978, CVE-2021-0579, CVE-2021-0580, CVE-2021-0581, CVE-2021-0582, CVE-2021-0578
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Android is a mobile operating system based on a modified version of the Linux kernel and other open source software, designed primarily for touchscreen mobile devices such as smartphones and tablets.

    Following security issues were discovered:
    CVE-2021-1976, CVE-2021-1972,CVE-2021-0591, CVE-2021-0593, CVE-2021-0640, CVE-2021-0641, CVE-2021-0642, CVE-2021-0646, CVE-2021-0584, CVE-2021-1939, CVE-2021-1947, CVE-2021-1904, CVE-2021-1978, CVE-2021-0579, CVE-2021-0580, CVE-2021-0581, CVE-2021-0582, CVE-2021-0578

    Affected Devices :
    HUAWEI P series: P30 Pro, P30, P20 Pro, P20
    HUAWEI Mate series: Mate 20 X, Mate 20 Pro, Mate 20, Mate 20 RS, Mate 10 Pro, Mate 10, PORSCHE DESIGN HUAWEI Mate RS

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Refer to HUAWEI Security advisory September 2021 to address this issue and obtain more information.
    Patches
    Android September 2021
  • CVE-2021-0636+
    Recently Published

    Google Android Devices September 2021 Security Patch Missing

    Severity
    Critical4
    Qualys ID
    610363
    Date Published
    September 14, 2021
    Vendor Reference
    Android Security Bulletin September2021
    CVE Reference
    CVE-2021-0636, CVE-2021-0598, CVE-2021-1909, CVE-2021-30294, CVE-2021-0635, CVE-2021-0595, CVE-2021-1946, CVE-2021-30290, CVE-2021-30295, CVE-2021-1941, CVE-2021-1948, CVE-2021-0691, CVE-2021-0690, CVE-2021-0693, CVE-2021-0692, CVE-2021-0695, CVE-2021-1886, CVE-2021-1935, CVE-2021-1934, CVE-2021-1933, CVE-2021-1889, CVE-2021-0644, CVE-2021-1888, CVE-2021-1952, CVE-2021-1974, CVE-2021-1890, CVE-2021-0682, CVE-2021-0683, CVE-2021-0680, CVE-2021-0681, CVE-2021-0686, CVE-2021-0687, CVE-2021-0684, CVE-2021-0685, CVE-2021-0688, CVE-2021-0689, CVE-2021-1971, CVE-2021-1923, CVE-2021-0428
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Android is a mobile operating system based on a modified version of the Linux kernel and other open source software, designed primarily for touchscreen mobile devices such as smartphones and tablets.

    Following security issues were discovered:
    CVE-2021-0636,CVE-2021-0598,CVE-2021-1909,CVE-2021-30294,CVE-2021-0635,CVE-2021-0595,CVE-2021-1946,CVE-2021-30290,CVE-2021-30295,CVE-2021-1941,CVE-2021-1948,CVE-2021-0691,CVE-2021-0690,CVE-2021-0693,CVE-2021-0692,CVE-2021-0695,CVE-2021-1886,CVE-2021-1935,CVE-2021-1934,CVE-2021-1933,CVE-2021-1889,CVE-2021-0644,CVE-2021-1888,CVE-2021-1952,CVE-2021-1974,CVE-2021-1890,CVE-2021-0682,CVE-2021-0683,CVE-2021-0680,CVE-2021-0681,CVE-2021-0686,CVE-2021-0687,CVE-2021-0684,CVE-2021-0685,CVE-2021-0688,CVE-2021-0689,CVE-2021-1971,CVE-2021-1923,CVE-2021-0428

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Refer to Google advisory Google Android September2021 to address this issue and obtain more information.
    Patches
    Android September 2021
  • Recently Published

    Grafana Anonymous Access Enabled Detected

    Severity
    Urgent5
    Qualys ID
    730185
    Date Published
    September 13, 2021
    CVSS Scores
    Base 9.8 / Temporal 9
    Description

    Grafana is an open-source, general-purpose dashboard and graph composer, which runs as a web application.

    QID Detection Logic:(Unauthenticated):
    This QID sends HTTP GET requests to / and check anonymous users can log in without credentials

    Consequence

    A remote attacker could access Grafana to perform malicious activities.

    Solution

    Customers are advised to disable Anonymous access.

  • CVE-2020-36328
    Recently Published

    Amazon Linux Security Advisory for libwebp: ALAS-2021-1530

    Severity
    Critical4
    Qualys ID
    352805
    Date Published
    September 13, 2021
    Vendor Reference
    ALAS-2021-1530
    CVE Reference
    CVE-2020-36328
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description

    A flaw was found in libwebp in versions before 1.0.1.
    A heap-based buffer overflow in function webpdecodergbinto is possible due to an invalid check for buffer size.
    The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (
    ( CVE-2020-36328)




    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Please refer to Amazon advisory: ALAS-2021-1530 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux ALAS-2021-1530
  • CVE-2021-37576
    Recently Published

    Red Hat Update for kpatch-patch (RHSA-2021:3436)

    Severity
    Critical4
    Qualys ID
    239621
    Date Published
    September 13, 2021
    Vendor Reference
    RHSA-2021:3436
    CVE Reference
    CVE-2021-37576
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

    Security Fix(es): kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)

    Affected Products:

    Red Hat Enterprise Linux for Power, little endian 8 ppc64le
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3436 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3436
  • CVE-2021-3609+
    Recently Published

    Red Hat Update for kpatch-patch (RHSA-2021:3442)

    Severity
    Critical4
    Qualys ID
    239616
    Date Published
    September 13, 2021
    Vendor Reference
    RHSA-2021:3442
    CVE Reference
    CVE-2021-3609, CVE-2021-3715, CVE-2021-37576
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

    Security Fix(es): kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609) kernel: use-after-free in route4_change()
    in net/sched/cls_route.c (CVE-2021-3715) kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3442 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3442
  • CVE-2021-0512+
    Recently Published

    Red Hat Update for kpatch-patch (RHSA-2021:3443)

    Severity
    Critical4
    Qualys ID
    239615
    Date Published
    September 13, 2021
    Vendor Reference
    RHSA-2021:3443
    CVE Reference
    CVE-2021-0512, CVE-2021-3715, CVE-2021-37576
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

    Security Fix(es): kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers()
    of hid-input.c (CVE-2021-0512) kernel: use-after-free in route4_change()
    in net/sched/cls_route.c (CVE-2021-3715) kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
    Red Hat Enterprise Linux Server - AUS 8.2 x86_64
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
    Red Hat Enterprise Linux Server - TUS 8.2 x86_64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3443 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3443
  • CVE-2021-3609+
    Recently Published

    Red Hat Update for kernel (RHSA-2021:3444)

    Severity
    Critical4
    Qualys ID
    239614
    Date Published
    September 13, 2021
    Vendor Reference
    RHSA-2021:3444
    CVE Reference
    CVE-2021-3609, CVE-2021-3715, CVE-2021-37576
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    The kernel packages contain the Linux kernel, the core of any Linux operating system.

    Security Fix(es): kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609) kernel: use-after-free in route4_change()
    in net/sched/cls_route.c (CVE-2021-3715) kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64
    Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64
    Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le
    Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3444 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3444
  • CVE-2021-0512+
    Recently Published

    Red Hat Update for kernel-rt (RHSA-2021:3445)

    Severity
    Critical4
    Qualys ID
    239613
    Date Published
    September 13, 2021
    Vendor Reference
    RHSA-2021:3445
    CVE Reference
    CVE-2021-0512, CVE-2021-3715
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

    Security Fix(es): kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers()
    of hid-input.c (CVE-2021-0512) kernel: use-after-free in route4_change()
    in net/sched/cls_route.c (CVE-2021-3715)

    Affected Products:

    Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64
    Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3445 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3445
  • CVE-2021-0512+
    Recently Published

    Red Hat Update for kernel (RHSA-2021:3446)

    Severity
    Critical4
    Qualys ID
    239612
    Date Published
    September 13, 2021
    Vendor Reference
    RHSA-2021:3446
    CVE Reference
    CVE-2021-0512, CVE-2021-3715, CVE-2021-37576
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    The kernel packages contain the Linux kernel, the core of any Linux operating system.

    Security Fix(es): kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers()
    of hid-input.c (CVE-2021-0512) kernel: use-after-free in route4_change()
    in net/sched/cls_route.c (CVE-2021-3715) kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
    Red Hat Enterprise Linux Server - AUS 8.2 x86_64
    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
    Red Hat Enterprise Linux Server - TUS 8.2 x86_64
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64
    Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64
    Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le
    Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3446 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3446
  • CVE-2021-37576+
    Recently Published

    Red Hat Update for kernel (RHSA-2021:3447)

    Severity
    Critical4
    Qualys ID
    239611
    Date Published
    September 13, 2021
    Vendor Reference
    RHSA-2021:3447
    CVE Reference
    CVE-2021-37576, CVE-2021-38201
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    The kernel packages contain the Linux kernel, the core of any Linux operating system.

    Security Fix(es): kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576) kernel: slab-out-of-bounds access in xdr_set_page_base()
    in net/sunrpc/xdr.c (CVE-2021-38201)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
    Red Hat Enterprise Linux Server - AUS 8.4 x86_64
    Red Hat Enterprise Linux for IBM z Systems 8 s390x
    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
    Red Hat Enterprise Linux for Power, little endian 8 ppc64le
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
    Red Hat Virtualization Host 4 for RHEL 8 x86_64
    Red Hat Enterprise Linux for x86_64 8 x86_64
    Red Hat Enterprise Linux Server - TUS 8.4 x86_64
    Red Hat Enterprise Linux for ARM 64 8 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64
    Red Hat CodeReady Linux Builder for x86_64 8 x86_64
    Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
    Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
    Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
    Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
    Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:3447 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:3447
  • CVE-2020-13692
    Recently Published

    Amazon Linux Security Advisory for postgresql-jdbc: ALAS-2021-1533

    Severity
    Critical4
    Qualys ID
    352802
    Date Published
    September 13, 2021
    Vendor Reference
    ALAS-2021-1533
    CVE Reference
    CVE-2020-13692
    CVSS Scores
    Base 7.7 / Temporal 6.7
    Description

    A flaw was found in postgresql jdbc in versions prior to 42.2.13.
    An xml external entity (xxe) weakness was found in postgresql jdbc.
    The highest threat from this vulnerability is to data confidentiality and system availability. (
    ( CVE-2020-13692)




    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Please refer to Amazon advisory: ALAS-2021-1533 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux ALAS-2021-1533
  • CVE-2021-27219
    Recently Published

    Amazon Linux Security Advisory for glib2: ALAS-2021-1526

    Severity
    Critical4
    Qualys ID
    352809
    Date Published
    September 13, 2021
    Vendor Reference
    ALAS-2021-1526
    CVE Reference
    CVE-2021-27219
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description

    An issue was discovered in gnome glib before 2.66.6 and 2.67.x before 2.67.3.
    The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits.
    The overflow could potentially lead to memory corruption. (
    ( CVE-2021-27219)




    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Please refer to Amazon advisory: ALAS-2021-1526 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux ALAS-2021-1526
  • CVE-2021-2388+
    Recently Published

    Amazon Linux Security Advisory for java-1.8.0-openjdk: ALAS-2021-1528

    Severity
    Critical4
    Qualys ID
    352807
    Date Published
    September 13, 2021
    Vendor Reference
    ALAS-2021-1528
    CVE Reference
    CVE-2021-2388, CVE-2021-2369, CVE-2021-2341
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description

    Vulnerability in the java se, oracle graalvm enterprise edition product of oracle java se (component: networking).
    Supported versions that are affected are java se: 7u301, 8u291, 11.0.11, 16.0.1; oracle graalvm enterprise edition: 20.3.2 and 21.1.0.
    Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise java se, oracle graalvm enterprise edition.
    Successful attacks require human interaction from a person other than the attacker.
    Successful attacks of this vulnerability can result in unauthorized read access to a subset of java se, oracle graalvm enterprise edition accessible data.
    Note: this vulnerability applies to java deployments, typically in clients running sandboxed java web start applications or sandboxed java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the java sandbox for security.
    This vulnerability does not apply to java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
    Cvss 3.1 base score 3.1 (confidentiality impacts).
    Cvss vector: (cvss:3.1/av:n/ac:h/pr:n/ui:r/s:u/c:l/i:n/a:n). (
    ( CVE-2021-2341) vulnerability in the java se, oracle graalvm enterprise edition product of oracle java se (component: library).
    Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise java se, oracle graalvm enterprise edition.
    Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of java se, oracle graalvm enterprise edition accessible data.
    Cvss 3.1 base score 4.3 (integrity impacts).
    Cvss vector: (cvss:3.1/av:n/ac:l/pr:n/ui:r/s:u/c:n/i:l/a:n). (
    ( CVE-2021-2369) vulnerability in the java se, oracle graalvm enterprise edition product of oracle java se (component: hotspot).
    Supported versions that are affected are java se: 8u291, 11.0.11, 16.0.1; oracle graalvm enterprise edition: 20.3.2 and 21.1.0.
    Successful attacks of this vulnerability can result in takeover of java se, oracle graalvm enterprise edition.
    Cvss 3.1 base score 7.5 (confidentiality, integrity and availability impacts).
    Cvss vector: (cvss:3.1/av:n/ac:h/pr:n/ui:r/s:u/c:h/i:h/a:h). (
    ( CVE-2021-2388)




    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Please refer to Amazon advisory: ALAS-2021-1528 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux ALAS-2021-1528
  • CVE-2021-28091
    Recently Published

    Amazon Linux Security Advisory for lasso: ALAS-2021-1529

    Severity
    Critical4
    Qualys ID
    352806
    Date Published
    September 13, 2021
    Vendor Reference
    ALAS-2021-1529
    CVE Reference
    CVE-2021-28091
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description

    An xml signature wrapping (xsw) vulnerability was found in lasso.
    This flaw allows an attacker to modify a valid saml response to include an unsigned saml assertion, which may be used to impersonate another valid user recognized by the service using lasso.
    The highest threat from this vulnerability is to data confidentiality and integrity as well as service availability. (
    ( CVE-2021-28091)




    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Please refer to Amazon advisory: ALAS-2021-1529 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux ALAS-2021-1529
  • CVE-2020-15078
    Recently Published

    Amazon Linux Security Advisory for Open Virtual Private Network (OpenVPN): ALAS-2021-1531

    Severity
    Critical4
    Qualys ID
    352804
    Date Published
    September 13, 2021
    Vendor Reference
    ALAS-2021-1531
    CVE Reference
    CVE-2020-15078
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description

    Openvpn 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks. ( cve-2020-15078)


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Please refer to Amazon advisory: ALAS-2021-1531 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux ALAS-2021-1531
  • CVE-2021-40490
    Recently Published

    Amazon Linux Security Advisory for kernel-livepatch: ALAS2LIVEPATCH-2021-060

    Severity
    Critical4
    Qualys ID
    352815
    Date Published
    September 13, 2021
    Vendor Reference
    ALAS2LIVEPATCH-2021-060
    CVE Reference
    CVE-2021-40490
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description




    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Please refer to Amazon advisory: ALAS2LIVEPATCH-2021-060 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux 2 ALAS2LIVEPATCH-2021-060
  • CVE-2021-40490
    Recently Published

    Amazon Linux Security Advisory for kernel-livepatch: ALAS2LIVEPATCH-2021-061

    Severity
    Critical4
    Qualys ID
    352814
    Date Published
    September 13, 2021
    Vendor Reference
    ALAS2LIVEPATCH-2021-061
    CVE Reference
    CVE-2021-40490
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description




    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Please refer to Amazon advisory: ALAS2LIVEPATCH-2021-061 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux 2 ALAS2LIVEPATCH-2021-061
  • CVE-2021-40490
    Recently Published

    Amazon Linux Security Advisory for kernel-livepatch: ALAS2LIVEPATCH-2021-062

    Severity
    Critical4
    Qualys ID
    352813
    Date Published
    September 13, 2021
    Vendor Reference
    ALAS2LIVEPATCH-2021-062
    CVE Reference
    CVE-2021-40490
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description




    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Please refer to Amazon advisory: ALAS2LIVEPATCH-2021-062 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux 2 ALAS2LIVEPATCH-2021-062
  • CVE-2021-40490
    Recently Published

    Amazon Linux Security Advisory for kernel-livepatch: ALAS2LIVEPATCH-2021-063

    Severity
    Critical4
    Qualys ID
    352812
    Date Published
    September 13, 2021
    Vendor Reference
    ALAS2LIVEPATCH-2021-063
    CVE Reference
    CVE-2021-40490
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description




    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Please refer to Amazon advisory: ALAS2LIVEPATCH-2021-063 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux 2 ALAS2LIVEPATCH-2021-063
  • CVE-2021-40490
    Recently Published

    Amazon Linux Security Advisory for kernel-livepatch: ALAS2LIVEPATCH-2021-064

    Severity
    Critical4
    Qualys ID
    352811
    Date Published
    September 13, 2021
    Vendor Reference
    ALAS2LIVEPATCH-2021-064
    CVE Reference
    CVE-2021-40490
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description




    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Please refer to Amazon advisory: ALAS2LIVEPATCH-2021-064 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux 2 ALAS2LIVEPATCH-2021-064
  • CVE-2019-3887+
    Recently Published

    CBL-Mariner Linux Security Update for kernel 5.10.60.1

    Severity
    Critical4
    Qualys ID
    900321
    Date Published
    September 13, 2021
    Vendor Reference
    CBL-Mariner Linux
    CVE Reference
    CVE-2019-3887, CVE-1999-0656, CVE-1999-0524, CVE-2018-16880, CVE-2011-0640, CVE-2010-0298, CVE-2010-4563, CVE-2021-27365, CVE-2019-3016, CVE-2008-4609, CVE-2019-3819, CVE-2021-27363, CVE-2021-27364, CVE-2007-4998, CVE-2020-35499, CVE-2018-1000026, CVE-2010-0309
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description

    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.

    Affected OS: CBL Mariner

    Affected Versions: kernel 5.10.60.1 - less than 5.10.60.1-3.cm1

    QID Detection Logic(Authenticated):
    This QID checks for vulnerable versions of package name.

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Successful exploitation of this vulnerability could lead to security breach or could affect integrity, availability and confidentiality.
    Solution
    CBL-Mariner has issued updated packages to fix this vulnerability.

    For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:

    Patches
    CBL-Mariner Linux CBL-Mariner Linux
  • CVE-2021-29649+
    Recently Published

    CBL-Mariner Linux Security Update for kernel 5.10.60.1

    Severity
    Critical4
    Qualys ID
    900320
    Date Published
    September 13, 2021
    Vendor Reference
    CBL-Mariner Linux
    CVE Reference
    CVE-2021-29649, CVE-2021-30002, CVE-2021-28375, CVE-2021-28950, CVE-2020-35508, CVE-2020-27170, CVE-2021-29647, CVE-2021-28964, CVE-2021-29650, CVE-2021-29648, CVE-2020-16120, CVE-2021-29646, CVE-2020-27171, CVE-2021-29266, CVE-2021-28951, CVE-2021-28972, CVE-2021-29264, CVE-2021-29265, CVE-2021-28971, CVE-2021-28660, CVE-2021-28952
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description

    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.

    Affected OS: CBL Mariner

    Affected Versions: kernel 5.10.60.1 - less than 5.10.60.1-4.cm1

    QID Detection Logic(Authenticated):
    This QID checks for vulnerable versions of package name.

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Successful exploitation of this vulnerability could lead to security breach or could affect integrity, availability and confidentiality.
    Solution
    CBL-Mariner has issued updated packages to fix this vulnerability.

    For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:

    Patches
    CBL-Mariner Linux CBL-Mariner Linux
  • CVE-2021-38203+
    Recently Published

    CBL-Mariner Linux Security Update for kernel 5.10.60.1

    Severity
    Critical4
    Qualys ID
    900319
    Date Published
    September 13, 2021
    Vendor Reference
    CBL-Mariner Linux
    CVE Reference
    CVE-2021-38203, CVE-2021-32399, CVE-2021-31829, CVE-2021-33624, CVE-2021-38206, CVE-2021-33034, CVE-2021-28691, CVE-2021-30178, CVE-2021-38209, CVE-2021-38198, CVE-2021-38208, CVE-2021-38205, CVE-2021-38204, CVE-2021-35039, CVE-2021-38166, CVE-2021-3573, CVE-2021-29155, CVE-2021-38202, CVE-2021-31916, CVE-2021-34556, CVE-2021-3483, CVE-2021-38199, CVE-2021-33909, CVE-2021-38201, CVE-2021-29657, CVE-2021-33200, CVE-2021-3506, CVE-2021-3501, CVE-2021-34693, CVE-2021-33033, CVE-2021-23133, CVE-2021-23134, CVE-2021-3564, CVE-2021-3655, CVE-2020-25672, CVE-2020-25639, CVE-2021-3679, CVE-2021-38200, CVE-2021-38207, CVE-2021-37576, CVE-2021-38160, CVE-2021-35477, CVE-2021-29154
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description

    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.

    Affected OS: CBL Mariner

    Affected Versions: kernel 5.10.60.1 - less than 5.10.60.1-1.cm1

    QID Detection Logic(Authenticated):
    This QID checks for vulnerable versions of package name.

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Successful exploitation of this vulnerability could lead to security breach or could affect integrity, availability and confidentiality.
    Solution
    CBL-Mariner has issued updated packages to fix this vulnerability.

    For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:

    Patches
    CBL-Mariner Linux CBL-Mariner Linux
  • CVE-2021-37159+
    Recently Published

    CBL-Mariner Linux Security Update for kernel 5.10.60.1

    Severity
    Critical4
    Qualys ID
    900318
    Date Published
    September 13, 2021
    Vendor Reference
    CBL-Mariner Linux
    CVE Reference
    CVE-2021-37159, CVE-2016-9795, CVE-2021-20194, CVE-2021-32078
    CVSS Scores
    Base 7.8 / Temporal 7.1
    Description

    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.

    Affected OS: CBL Mariner

    Affected Versions: kernel 5.10.60.1 - less than or equal 5.10.60.1-9999.cm1

    QID Detection Logic(Authenticated):
    This QID checks for vulnerable versions of package name.

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Successful exploitation of this vulnerability could lead to security breach or could affect integrity, availability and confidentiality.
    Solution
    CBL-Mariner has issued updated packages to fix this vulnerability.

    For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:

  • CVE-2021-22543
    Recently Published

    Amazon Linux Security Advisory for kernel: ALAS2-2021-1699

    Severity
    Critical4
    Qualys ID
    352799
    Date Published
    September 13, 2021
    Vendor Reference
    ALAS2-2021-1699
    CVE Reference
    CVE-2021-22543
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description

    A flaw was found in the linux kernel's kvm implementation, where improper handing of the vm_io|vm_pfnmap vmas in kvm bypasses ro checks and leads to pages being freed while still accessible by the vmm and guest.
    This flaw allows users who can start and control a vm to read/write random pages of memory, resulting in local privilege escalation.
    The highest threat from this vulnerability is to confidentiality, integrity, and system availability. (
    ( CVE-2021-22543)



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Please refer to Amazon advisory: ALAS2-2021-1699 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux 2 ALAS2-2021-1699
  • CVE-2019-11043
    Recently Published

    Gentoo Linux Hypertext Preprocessor (PHP) Arbitrary code execution Vulnerability (GLSA 201910-01)

    Severity
    Critical4
    Qualys ID
    710123
    Date Published
    September 13, 2021
    Vendor Reference
    GLSA 201910-01
    CVE Reference
    CVE-2019-11043
    CVSS Scores
    Base 9.8 / Temporal 8.8
    Description
    Gentoo Linux is a Linux distribution

    A vulnerability in PHP might allow an attacker to execute arbitrary code.

    Affected Package(s): dev-lang/php

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    The Vendor has released security update to fix the vulnerability. For more information please visit GLSA 201910-01 for updates and patch information.
    Patches
    Gentoo GLSA 201910-01
  • CVE-2021-30563+
    Recently Published

    Gentoo Linux Chromium, Google Chrome Multiple Vulnerabilities (GLSA 202107-49)

    Severity
    Critical4
    Qualys ID
    710046
    Date Published
    September 13, 2021
    Vendor Reference
    GLSA 202107-49
    CVE Reference
    CVE-2021-30563, CVE-2021-30560, CVE-2021-30564, CVE-2021-30559, CVE-2021-30561, CVE-2021-30541, CVE-2021-30562
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Gentoo Linux is a Linux distribution

    Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the arbitrary execution of code.

    Affected Package(s): www-client/google-chrome-{VERSION}

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    The Vendor has released security update to fix the vulnerability. For more information please visit GLSA 202107-49 for updates and patch information.
    Patches
    Gentoo GLSA 202107-49
  • CVE-2021-32635
    Recently Published

    Gentoo Linux Singularity Remote code execution (GLSA 202107-50)

    Severity
    Critical4
    Qualys ID
    710045
    Date Published
    September 13, 2021
    Vendor Reference
    GLSA 202107-50
    CVE Reference
    CVE-2021-32635
    CVSS Scores
    Base 6.3 / Temporal 5.5
    Description
    Gentoo Linux is a Linux distribution

    A vulnerability in Singularity could result in remote code execution.

    Affected Package(s): sys-cluster/singularity-{VERSION}


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    The Vendor has released security update to fix the vulnerability. For more information please visit GLSA 202107-50 for updates and patch information.
    Patches
    Gentoo GLSA 202107-50
  • CVE-2021-26084
    Recently Published

    Confluence Server Webwork Object-Graph Navigation Language (OGNL) Injection Vulnerabilty (CONFSERVER-67940) (Authenticated Check)

    Severity
    Critical4
    Qualys ID
    375839
    Date Published
    September 9, 2021
    Vendor Reference
    CONFSERVER-67940
    CVE Reference
    CVE-2021-26084
    CVSS Scores
    Base 9.8 / Temporal 8.8
    Description
    An OGNL injection vulnerability exists in Confluence Server that could allow an authenticated user, and in some instances unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance.

    Affected versions:
    Confluence Server prior to version 6.13.23
    Confluence Server version 6.14.0 to 7.4.11
    Confluence Server version 7.5.0 to 7.11.5
    Confluence Server version 7.12.0 to 7.12.5
    Note: We do not support EAP and beta versions.

    QID Detection Logic(Authenticated):
    Windows: QID looks for vulnerable version of Confluence Server by searching in registry key "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" for 32-bit and "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" for 64-bit.

    Consequence
    Successful exploitation of the vulnerability will allow an authenticated use and is some cases an unauthenticated user to execute arbitrary code.

    Solution
    Customers are advised to refer to upgrade to Atlassian Confluence Server or later versions to remediate this vulnerability.

    Patches
    CONFSERVER-67940
  • CVE-2021-40539
    Recently Published

    Zoho ManageEngine ADSelfService Plus Remote Code Execution Vulnerability

    Severity
    Critical4
    Qualys ID
    375840
    Date Published
    September 9, 2021
    Vendor Reference
    ADSelfService Plus
    CVE Reference
    CVE-2021-40539
    CVSS Scores
    Base 8.3 / Temporal 7.2
    Description
    ManageEngine ADSelfService Plus is a secure, web-based, end-user password reset management and single sign-on solution that helps domain users to perform self-service password reset, self-service account unlock, employee self-update of personal details (e.g., mobile numbers and photos) in Microsoft Windows Active Directory.

    Zoho ManageEngine ADSelfService Plus has Authentication Bypass Vulnerability

    Affected Version:
    Zoho ManageEngineADSelfService Plus upto build 6113

    QID Detection Logic (Authenticated):
    Checks for vulnerable version of ManageEngine ADSelfService Plus upto build 6113

    Consequence
    This vulnerability allows an attacker to gain unauthorized access to the product through REST API endpoints by sending a specially crafted request. This would allow the attacker to carry out subsequent attacks resulting in RCE.

    Solution
    The vendor has released a patch.
    Customers are advised to visit release-notes for updates pertaining this vulnerability.
    Patches
    ADSelfService Plus
  • CVE-2019-19977
    Recently Published

    OpenSUSE Security Update for libesmtp (openSUSE-SU-2021:1235-1)

    Severity
    Critical4
    Qualys ID
    751114
    Date Published
    September 9, 2021
    Vendor Reference
    openSUSE-SU-2021:1235-1
    CVE Reference
    CVE-2019-19977
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    OpenSUSE has released a security update for libesmtp to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.2



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:1235-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:1235-1
  • CVE-2019-25031+
    Recently Published

    EulerOS Security Update for unbound (EulerOS-SA-2021-2351)

    Severity
    Critical4
    Qualys ID
    670593
    Date Published
    September 9, 2021
    Vendor Reference
    EulerOS-SA-2021-2351
    CVE Reference
    CVE-2019-25031, CVE-2019-25032, CVE-2019-25033, CVE-2019-25034, CVE-2019-25035, CVE-2019-25036, CVE-2019-25037, CVE-2019-25038, CVE-2019-25039, CVE-2019-25040, CVE-2019-25041, CVE-2019-25042
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Euler has released a security update for unbound to fix the vulnerabilities.

    Affected OS: EulerOS V2.0SP5

    Consequence
    An arbitrary attacker may exploit this vulnerability to compromise the system.
    Solution
    The Vendor has released a security update to fix the vulnerability. For more information please visit EulerOS-SA-2021-2351
    Patches
    EulerOS-SA-2021-2351
  • CVE-2021-23017
    Recently Published

    EulerOS Security Update for nginx (EulerOS-SA-2021-2340)

    Severity
    Critical4
    Qualys ID
    670582
    Date Published
    September 9, 2021
    Vendor Reference
    EulerOS-SA-2021-2340
    CVE Reference
    CVE-2021-23017
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Euler has released a security update for nginx to fix the vulnerabilities.

    Affected OS: EulerOS V2.0SP5

    Consequence
    An arbitrary attacker may exploit this vulnerability to compromise the system.
    Solution
    The Vendor has released a security update to fix the vulnerability. For more information please visit EulerOS-SA-2021-2340
    Patches
    EulerOS-SA-2021-2340
  • CVE-2020-36331+
    Recently Published

    EulerOS Security Update for libwebp (EulerOS-SA-2021-2338)

    Severity
    Critical4
    Qualys ID
    670580
    Date Published
    September 9, 2021
    Vendor Reference
    EulerOS-SA-2021-2338
    CVE Reference
    CVE-2020-36331, CVE-2018-25009, CVE-2018-25011, CVE-2018-25012, CVE-2018-25013, CVE-2018-25014, CVE-2020-36328, CVE-2020-36329, CVE-2020-36330
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Euler has released a security update for libwebp to fix the vulnerabilities.

    Affected OS: EulerOS V2.0SP5

    Consequence
    An arbitrary attacker may exploit this vulnerability to compromise the system.
    Solution
    The Vendor has released a security update to fix the vulnerability. For more information please visit EulerOS-SA-2021-2338
    Patches
    EulerOS-SA-2021-2338
  • CVE-2021-33574
    Recently Published

    EulerOS Security Update for glibc (EulerOS-SA-2021-2330)

    Severity
    Critical4
    Qualys ID
    670572
    Date Published
    September 9, 2021
    Vendor Reference
    EulerOS-SA-2021-2330
    CVE Reference
    CVE-2021-33574
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Euler has released a security update for glibc to fix the vulnerabilities.

    Affected OS: EulerOS V2.0SP5

    Consequence
    An arbitrary attacker may exploit this vulnerability to compromise the system.
    Solution
    The Vendor has released a security update to fix the vulnerability. For more information please visit EulerOS-SA-2021-2330
    Patches
    EulerOS-SA-2021-2330
  • CVE-2021-3537+
    Recently Published

    EulerOS Security Update for libxml2 (EulerOS-SA-2021-2339)

    Severity
    Critical4
    Qualys ID
    670581
    Date Published
    September 9, 2021
    Vendor Reference
    EulerOS-SA-2021-2339
    CVE Reference
    CVE-2021-3537, CVE-2021-3517, CVE-2021-3518, CVE-2021-3541
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Euler has released a security update for libxml2 to fix the vulnerabilities.

    Affected OS: EulerOS V2.0SP5

    Consequence
    An arbitrary attacker may exploit this vulnerability to compromise the system.
    Solution
    The Vendor has released a security update to fix the vulnerability. For more information please visit EulerOS-SA-2021-2339
    Patches
    EulerOS-SA-2021-2339
  • CVE-2020-27153
    Recently Published

    EulerOS Security Update for bluez (EulerOS-SA-2021-2321)

    Severity
    Critical4
    Qualys ID
    670563
    Date Published
    September 9, 2021
    Vendor Reference
    EulerOS-SA-2021-2321
    CVE Reference
    CVE-2020-27153
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Euler has released a security update for bluez to fix the vulnerabilities.

    Affected OS: EulerOS V2.0SP5

    Consequence
    An arbitrary attacker may exploit this vulnerability to compromise the system.
    Solution
    The Vendor has released a security update to fix the vulnerability. For more information please visit EulerOS-SA-2021-2321
    Patches
    EulerOS-SA-2021-2321
  • CVE-2020-25670+
    Recently Published

    EulerOS Security Update for kernel (EulerOS-SA-2021-2336)

    Severity
    Critical4
    Qualys ID
    670578
    Date Published
    September 9, 2021
    Vendor Reference
    EulerOS-SA-2021-2336
    CVE Reference
    CVE-2020-25670, CVE-2020-25671, CVE-2020-14416, CVE-2021-28950, CVE-2020-36322, CVE-2020-28374, CVE-2021-33033, CVE-2021-23134, CVE-2021-31916, CVE-2021-32399, CVE-2021-3573
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description
    Euler has released a security update for kernel to fix the vulnerabilities.

    Affected OS: EulerOS V2.0SP5

    Consequence
    An arbitrary attacker may exploit this vulnerability to compromise the system.
    Solution
    The Vendor has released a security update to fix the vulnerability. For more information please visit EulerOS-SA-2021-2336
    Patches
    EulerOS-SA-2021-2336
  • CVE-2021-28698+
    Recently Published

    OpenSUSE Security Update for xen (openSUSE-SU-2021:1236-1)

    Severity
    Critical4
    Qualys ID
    751111
    Date Published
    September 9, 2021
    Vendor Reference
    openSUSE-SU-2021:1236-1
    CVE Reference
    CVE-2021-28698, CVE-2021-0089, CVE-2021-28696, CVE-2021-28694, CVE-2021-28697, CVE-2021-28700, CVE-2021-28693, CVE-2021-28692, CVE-2021-28690, CVE-2021-28699, CVE-2021-28695
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    OpenSUSE has released a security update for xen to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.2



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:1236-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:1236-1
  • CVE-2021-35269+
    Recently Published

    SUSE Enterprise Linux Security Update for ntfs-3g_ntfsprogs (SUSE-SU-2021:2965-1)

    Severity
    Critical4
    Qualys ID
    751107
    Date Published
    September 9, 2021
    Vendor Reference
    SUSE-SU-2021:2965-1
    CVE Reference
    CVE-2021-35269, CVE-2021-35267, CVE-2021-39258, CVE-2021-39253, CVE-2021-39262, CVE-2021-39256, CVE-2021-39263, CVE-2021-39251, CVE-2021-33285, CVE-2021-39259, CVE-2021-39261, CVE-2021-35266, CVE-2021-33286, CVE-2021-39252, CVE-2021-33287, CVE-2017-0358, CVE-2021-39260, CVE-2021-33289, CVE-2021-35268, CVE-2019-9755, CVE-2021-39257, CVE-2021-39255
    CVSS Scores
    Base 7.8 / Temporal 7
    Description
    This update for ntfs-3g_ntfsprogs fixes the following issues: update to version 2021.8.22 (bsc#1189720): * signalled support of utime_omit to external libfuse2 * updated the repository change in the readme * fixed vulnerability threats caused by maliciously tampered ntfs partitions * security fixes: cve-2021-33285, cve-2021-33286, cve-2021-33287, cve-2021-33289, cve-2021-35266, cve-2021-35267, cve-2021-35268, cve-2021-35269, cve-2021-39251, cve-2021-39252, cve-2021-39253, cve_2021-39254, cve-2021-39255, cve-2021-39256, cve-2021-39257, cve-2021-39258, cve-2021-39259, cve-2021-39260, cve-2021-39261, cve-2021-39262, cve-2021-39263.


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2965-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:2965-1
  • CVE-2021-2388+
    Recently Published

    OpenSUSE Security Update for java-11-openJava Development Toolkit (openSUSE-SU-2021:1233-1)

    Severity
    Critical4
    Qualys ID
    751115
    Date Published
    September 9, 2021
    Vendor Reference
    openSUSE-SU-2021:1233-1
    CVE Reference
    CVE-2021-2388, CVE-2021-2341, CVE-2021-2369
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    OpenSUSE has released a security update for java-11-openjdk to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.2



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:1233-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:1233-1
  • CVE-2021-33193
    Recently Published

    OpenSUSE Security Update for apache2 (openSUSE-SU-2021:1234-1)

    Severity
    Critical4
    Qualys ID
    751110
    Date Published
    September 9, 2021
    Vendor Reference
    openSUSE-SU-2021:1234-1
    CVE Reference
    CVE-2021-33193
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    OpenSUSE has released a security update for apache2 to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.2



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:1234-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:1234-1
  • CVE-2021-38491+
    Recently Published

    Mozilla Firefox Multiple Vulnerabilities (MFSA2021-38)

    Severity
    Critical4
    Qualys ID
    375833
    Date Published
    September 9, 2021
    Vendor Reference
    MFSA2021-38
    CVE Reference
    CVE-2021-38491, CVE-2021-38492, CVE-2021-38493, CVE-2021-38494
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Firefox is a free and open-source web browser developed for Windows, OS X, and Linux, with a mobile version for Android.

    Affected Products:
    Prior to Firefox 92

    QID Detection Logic (Authenticated):
    This checks for vulnerable version of Firefox browser

    Consequence
    Successful exploitation of this vulnerability could compromise confidentiality, integrity and availability

    Solution
    Vendor has released fix to address these vulnerabilities. Refer to MFSA2021-38
    Patches
    MFSA2021-38
  • CVE-2021-39252+
    Recently Published

    OpenSUSE Security Update for ntfs-3g_ntfsprogs (openSUSE-SU-2021:2971-1)

    Severity
    Critical4
    Qualys ID
    751113
    Date Published
    September 9, 2021
    Vendor Reference
    openSUSE-SU-2021:2971-1
    CVE Reference
    CVE-2021-39252, CVE-2021-39257, CVE-2021-39258, CVE-2021-33287, CVE-2021-39255, CVE-2021-35266, CVE-2021-35269, CVE-2021-33286, CVE-2021-39262, CVE-2021-39259, CVE-2021-39251, CVE-2021-39261, CVE-2021-39260, CVE-2021-33289, CVE-2019-9755, CVE-2021-39253, CVE-2021-33285, CVE-2021-35268, CVE-2021-35267, CVE-2021-39256, CVE-2021-39263
    CVSS Scores
    Base 7 / Temporal 6.1
    Description
    OpenSUSE has released a security update for ntfs-3g_ntfsprogs to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.3



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:2971-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:2971-1
  • CVE-2021-36012+
    Recently Published

    Magento Multiple Security Vulnerabilities (APSB21-64)

    Severity
    Critical4
    Qualys ID
    730180
    Date Published
    September 9, 2021
    Vendor Reference
    APSB21-64
    CVE Reference
    CVE-2021-36012, CVE-2021-36026, CVE-2021-36027, CVE-2021-36036, CVE-2021-36029, CVE-2021-36037, CVE-2021-36044, CVE-2021-36032, CVE-2021-36030, CVE-2021-36038, CVE-2021-36021, CVE-2021-36024, CVE-2021-36025, CVE-2021-36034, CVE-2021-36035, CVE-2021-36040, CVE-2021-36041, CVE-2021-36042, CVE-2021-36031, CVE-2021-36022, CVE-2021-36023, CVE-2021-36039, CVE-2021-36043, CVE-2021-36020, CVE-2021-36028, CVE-2021-36033
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Magento is an open-source content management system for e-commerce web sites.

    Affected Versions:
    Magento Open Source 2.4.2-p1 and earlier versions
    Magento Open Source 2.3.7 and earlier versions

    Consequence
    Successful exploitation may allows remote attacker to execute arbitrary code on a targeted server.

    Solution
    Customers are advised to refer APSB21-64 for updates and patch information.
    Patches
    APSB21-64
  • CVE-2021-31535
    Recently Published

    Oracle Enterprise Linux Security Update for libX11 (ELSA-2021-3296)

    Severity
    Critical4
    Qualys ID
    159372
    Date Published
    September 9, 2021
    Vendor Reference
    ELSA-2021-3296
    CVE Reference
    CVE-2021-31535
    CVSS Scores
    Base 9.8 / Temporal 7.8
    Description
    Oracle Enterprise Linux has released a security update for libX11 to fix the vulnerabilities.

    Affected Product:
    Oracle Linux 7

    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch. Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2021-3296.
    Patches
    Oracle Linux ELSA-2021-3296
  • CVE-2021-40444
    Recently Published

    Microsoft MSHTML Remote Code Execution (RCE) Vulnerability

    Severity
    Urgent5
    Qualys ID
    91814
    Date Published
    September 8, 2021
    Vendor Reference
    KB5005563, KB5005565, KB5005566, KB5005568, KB5005569, KB5005573, KB5005575, KB5005606, KB5005613, KB5005623, KB5005627, KB5005633
    CVE Reference
    CVE-2021-40444
    CVSS Scores
    Base 8.8 / Temporal 7.9
    Description

    Remote Code Execution vulnerability in MSHTML that affects Microsoft Windows. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents.

    The KB Articles associated with the update:
    KB5005573
    KB5005568
    KB5005566
    KB5005565
    KB5005569
    KB5005633
    KB5005563
    KB5005613
    KB5005627
    KB5005606
    KB5005623
    KB5005575

    This QID checks for the file version of ntoskrnl.exe and mshtml.dll

    The following versions of ntoskrnl.exe and mshtml.dllwith their corresponding KBs are verified:
    KB5005573
    KB5005568
    KB5005566
    KB5005565
    KB5005569
    KB5005633
    KB5005563
    KB5005613
    KB5005627
    KB5005606
    KB5005623
    KB5005575

    Consequence

    An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The attacker would then have to convince the user to open the malicious document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

    Solution
    Please refer to the5005573
    KB5005568
    KB5005566
    KB5005565
    KB5005569
    KB5005633
    KB5005563
    KB5005613
    KB5005627
    KB5005606
    KB5005623
    KB5005575
    Patches
    KB5005563, KB5005565, KB5005566, KB5005568, KB5005569, KB5005573, KB5005575, KB5005606, KB5005613, KB5005623, KB5005627, KB5005633
  • CVE-2018-1311
    Recently Published

    OpenSUSE Security Update for xerces-c (openSUSE-SU-2021:2958-1)

    Severity
    Critical4
    Qualys ID
    751105
    Date Published
    September 8, 2021
    Vendor Reference
    openSUSE-SU-2021:2958-1
    CVE Reference
    CVE-2018-1311
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description
    OpenSUSE has released a security update for xerces-c to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.3



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:2958-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:2958-1
  • CVE-2018-1311
    Recently Published

    OpenSUSE Security Update for xerces-c (openSUSE-SU-2021:1231-1)

    Severity
    Critical4
    Qualys ID
    751104
    Date Published
    September 8, 2021
    Vendor Reference
    openSUSE-SU-2021:1231-1
    CVE Reference
    CVE-2018-1311
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description
    OpenSUSE has released a security update for xerces-c to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.2



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:1231-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:1231-1
  • CVE-2021-0089+
    Recently Published

    SUSE Enterprise Linux Security Update for xen (SUSE-SU-2021:2957-1)

    Severity
    Critical4
    Qualys ID
    751103
    Date Published
    September 8, 2021
    Vendor Reference
    SUSE-SU-2021:2957-1
    CVE Reference
    CVE-2021-0089, CVE-2021-20255, CVE-2021-28697, CVE-2021-28698, CVE-2021-28699, CVE-2021-3595, CVE-2021-28695, CVE-2021-3592, CVE-2021-3594, CVE-2021-28692, CVE-2021-28696, CVE-2021-28690, CVE-2021-28694
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    This update for xen fixes the following issues: - cve-2021-3594: slirp: invalid pointer initialization may lead to information disclosure (udp)(bsc#1187378).
    - cve-2021-3595: slirp: invalid pointer initialization may lead to information disclosure (tftp)(bsc#1187376).
    - cve-2021-28698: long running loops in grant table handling (xsa-380)(bsc#1189378).
    - cve-2021-28699: inadequate grant-v2 status frames array bounds check (xsa-382)(bsc#1189380).
    - cve-2021-20255: fixed stack overflow via infinite recursion in eepro100 (bsc#1182654) - cve-2021-28690: xen: x86: tsx async abort protections not restored after s3 (bsc#1186434) - cve-2021-28692: xen: inappropriate x86 iommu timeout detection / handling (bsc#1186429) - cve-2021-28694,cve-2021-28695,cve-2021-28696: iommu page mapping issues on x86 (xsa-378)(bsc#1189373).
    - cve-2021-0089: xen: speculative code store bypass (bsc#1186433) - cve-2021-28697: grant table v2 status pages may remain accessible after de-allocation (xsa-379)(bsc#1189376).
    - cve-2021-3592: slirp: invalid pointer initialization may lead to information disclosure (bootp)(bsc#1187369).
    - prevent superpage allocation in the lapic and acpi_info range (bsc#1189882).


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2957-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:2957-1
  • CVE-2021-39139+
    Recently Published

    XStream Arbitrary Code Execution And Multiple vulnerabilities

    Severity
    Critical4
    Qualys ID
    375827
    Date Published
    September 8, 2021
    Vendor Reference
    X-STREAM
    CVE Reference
    CVE-2021-39139, CVE-2021-39140, CVE-2021-39141, CVE-2021-39144, CVE-2021-39145, CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149, CVE-2021-39150, CVE-2021-39151, CVE-2021-39152, CVE-2021-39153, CVE-2021-39154, CVE-2021-29505, CVE-2021-21341, CVE-2021-21342, CVE-2021-21343, CVE-2021-21344, CVE-2021-21345, CVE-2021-21346, CVE-2021-21347, CVE-2021-21348, CVE-2021-21349, CVE-2021-21350, CVE-2021-21351, CVE-2020-26258, CVE-2020-26259, CVE-2020-26217, CVE-2017-7957, CVE-2016-3674, CVE-2013-7285
    CVSS Scores
    Base 9.9 / Temporal 8.9
    Description
    XStream is a simple library to serialize objects to XML and back again.

    The processed stream at the unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on this type of information. An attacker can manipulate the processed input stream and replace or inject objects, that can execute arbitrary shell commands

    Affected Versions:
    XStream library prior and including 1.4.17
    XStream library prior and including 1.4.16
    XStream library prior and including 1.4.15
    XStream library prior and including 1.4.14
    XStream library prior and including 1.4.13
    XStream library prior and including 1.4.9
    XStream library prior and including 1.4.8
    XStream library prior and including 1.4.6
    XStream library prior and including 1.4.10
    QID Detection Logic:
    This authenticated QID fetches the version of the XStream library if it is installed via the package manager on Unix based operating systems with commands such as dpkg -l and rpm -qa.

    NOTE: This QID will work only if the XStream library is installed as via the package manager.

    Consequence
    The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream.
    Solution
    The vendor has provided fix in version 1.4.18 or above. For more information please visit advisory.
    Patches
    x-stream
  • CVE-2021-1487
    Recently Published

    Cisco Prime Infrastructure Command Injection Vulnerability(cisco-sa-pi-epnm-cmd-inj-YU5e6tB3)

    Severity
    Urgent5
    Qualys ID
    730115
    Date Published
    September 8, 2021
    Vendor Reference
    cisco-sa-pi-epnm-cmd-inj-YU5e6tB3
    CVE Reference
    CVE-2021-1487
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description

    A vulnerability in the web-based management interface of Cisco Prime Infrastructure and
    Evolved Programmable Network (EPN) Manager could allow an authenticated,
    remote attacker to execute arbitrary commands on an affected system.

    Affected Products
    Cisco Prime Infrastructure releases earlier than Release 3.9 and Cisco EPN Manager releases earlier than Release 5.1.
    Note: No support for Cisco EPN Manager

    QID Detection Logic (Unauthenticated):
    The QID checks for the Vulnerable Cisco Prime Infrastructure version retrieved via a GET request to a "webacs/js/xmp/nls/xmp.js"

    Consequence
    A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system (OS)
    with the permissions of a special non-root user. In this way, an attacker
    could take control of the affected system, which would allow them to obtain and alter sensitive data.
    Solution

    Customers are advised to refer to cisco-sa-pi-epnm-cmd-inj-YU5e6tB3 for more information.

    Patches
    cisco-sa-pi-epnm-cmd-inj-YU5e6tB3
  • CVE-2019-19977
    Recently Published

    OpenSUSE Security Update for libesmtp (openSUSE-SU-2021:2937-1)

    Severity
    Critical4
    Qualys ID
    751096
    Date Published
    September 7, 2021
    Vendor Reference
    openSUSE-SU-2021:2937-1
    CVE Reference
    CVE-2019-19977
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    OpenSUSE has released a security update for libesmtp to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.3


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:2937-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:2937-1
  • CVE-2021-29921
    Recently Published

    OpenSUSE Security Update for python39 (openSUSE-SU-2021:2940-1)

    Severity
    Critical4
    Qualys ID
    751095
    Date Published
    September 7, 2021
    Vendor Reference
    openSUSE-SU-2021:2940-1
    CVE Reference
    CVE-2021-29921
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    OpenSUSE has released a security update for python39 to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.3


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:2940-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:2940-1
  • CVE-2019-19977
    Recently Published

    SUSE Enterprise Linux Security Update for libesmtp (SUSE-SU-2021:2937-1)

    Severity
    Critical4
    Qualys ID
    751089
    Date Published
    September 7, 2021
    Vendor Reference
    SUSE-SU-2021:2937-1
    CVE Reference
    CVE-2019-19977
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    This update for libesmtp fixes the following issues: - cve-2019-19977: fixed stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2937-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:2937-1
  • CVE-2020-22054+
    Recently Published

    OpenSUSE Security Update for ffmpeg (openSUSE-SU-2021:2919-1)

    Severity
    Critical4
    Qualys ID
    751102
    Date Published
    September 7, 2021
    Vendor Reference
    openSUSE-SU-2021:2919-1
    CVE Reference
    CVE-2020-22054, CVE-2020-22048, CVE-2019-9721, CVE-2020-22046, CVE-2020-21688, CVE-2021-38114, CVE-2020-21697, CVE-2020-22049
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    OpenSUSE has released a security update for ffmpeg to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.3


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:2919-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:2919-1
  • CVE-2021-30598+
    Recently Published

    OpenSUSE Security Update for opera (openSUSE-SU-2021:1221-1)

    Severity
    Critical4
    Qualys ID
    751099
    Date Published
    September 7, 2021
    Vendor Reference
    openSUSE-SU-2021:1221-1
    CVE Reference
    CVE-2021-30598, CVE-2021-30603, CVE-2021-30604, CVE-2021-30602, CVE-2021-30599, CVE-2021-30600, CVE-2021-30601
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    OpenSUSE has released a security update for opera to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.3:NonFree
    openSUSE Leap 15.2:NonFree


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:1221-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:1221-1
  • CVE-2021-37701+
    Recently Published

    Node.js Multiple Vulnerabilities (August 2021)

    Severity
    Critical4
    Qualys ID
    375828
    Date Published
    September 7, 2021
    Vendor Reference
    aug-2021-security-releases2
    CVE Reference
    CVE-2021-37701, CVE-2021-37712, CVE-2021-37713, CVE-2021-39134, CVE-2021-39135, CVE-2021-32803, CVE-2021-32804
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Node.js is an open-source, cross-platform, JavaScript runtime environment that executes JavaScript code outside of a web browser.

    Affected Versions:
    Node.js version 12.X series prior to version Node.js v12.22.6 (LTS)
    Node.js version 14.X series prior to version Node.js v14.17.6 (LTS)
    QID Detection Logic:(Authenticated)
    This QID checks for the vulnerable version of node.js at HKLM\SOFTWARE\Node.js and HKLM\SOFTWARE\WOW6432Node\Node.js

    Consequence
    Attacker could compromise Confidentiality, Integrity and Availability

    Solution
    The vendors have released fixed version of Node.js node.js
    Patches
    aug-2021-security-releases2
  • CVE-2018-1311
    Recently Published

    SUSE Enterprise Linux Security Update for xerces-c (SUSE-SU-2021:2944-1)

    Severity
    Critical4
    Qualys ID
    751088
    Date Published
    September 7, 2021
    Vendor Reference
    SUSE-SU-2021:2944-1
    CVE Reference
    CVE-2018-1311
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description
    This update for xerces-c fixes the following issues: - cve-2018-1311: fixed use-after-free inside xml parser during the scanning of external dtds (bsc#1159552).

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2944-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:2944-1
  • CVE-2021-28694+
    Recently Published

    OpenSUSE Security Update for xen (openSUSE-SU-2021:2923-1)

    Severity
    Critical4
    Qualys ID
    751100
    Date Published
    September 7, 2021
    Vendor Reference
    openSUSE-SU-2021:2923-1
    CVE Reference
    CVE-2021-28694, CVE-2021-0089, CVE-2021-28698, CVE-2021-28696, CVE-2021-28695, CVE-2021-28700, CVE-2021-28690, CVE-2021-28697, CVE-2021-28699, CVE-2021-28692, CVE-2021-28693
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    OpenSUSE has released a security update for xen to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.3


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:2923-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:2923-1
  • CVE-2021-3308+
    Recently Published

    SUSE Enterprise Linux Security Update for xen (SUSE-SU-2021:2955-1)

    Severity
    Critical4
    Qualys ID
    751087
    Date Published
    September 7, 2021
    Vendor Reference
    SUSE-SU-2021:2955-1
    CVE Reference
    CVE-2021-3308, CVE-2021-28699, CVE-2021-28698, CVE-2021-3592, CVE-2021-0089, CVE-2021-20255, CVE-2021-28695, CVE-2021-28696, CVE-2021-28694, CVE-2021-28697, CVE-2021-3594, CVE-2021-28690, CVE-2021-28692, CVE-2021-3595
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    This update for xen fixes the following issues: security issues fixed: - cve-2021-28698: long running loops in grant table handling (xsa-380)(bsc#1189378).
    - cve-2021-28697: grant table v2 status pages may remain accessible after de-allocation (xsa-379)(bsc#1189376).
    - cve-2021-28694,cve-2021-28695,cve-2021-28696: iommu page mapping issues on x86 (xsa-378)(bsc#1189373).
    - cve-2021-28699: inadequate grant-v2 status frames array bounds check (xsa-382)(bsc#1189380).
    - cve-2021-28692: xen: inappropriate x86 iommu timeout detection / handling (bsc#1186429) - cve-2021-28690: xen: x86: tsx async abort protections not restored after s3 (bsc#1186434) - cve-2021-0089: xen: speculative code store bypass (bsc#1186433) - cve-2021-20255: fixed stack overflow via infinite recursion in eepro100 (bsc#1182654) - cve-2021-3592: slirp: invalid pointer initialization may lead to information disclosure (bootp)(bsc#1187369).
    - cve-2021-3594: slirp: invalid pointer initialization may lead to information disclosure (udp)(bsc#1187378).
    - cve-2021-3595: slirp: invalid pointer initialization may lead to information disclosure (tftp)(bsc#1187376).
    - cve-2021-3308: fixed irq vector leak on x86 (xsa-360)(bsc#1181254).
    - prevent superpage allocation in the lapic and acpi_info range (bsc#1189882).

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2955-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:2955-1
  • CVE-2021-28699+
    Recently Published

    SUSE Enterprise Linux Security Update for xen (SUSE-SU-2021:2943-1)

    Severity
    Critical4
    Qualys ID
    751085
    Date Published
    September 7, 2021
    Vendor Reference
    SUSE-SU-2021:2943-1
    CVE Reference
    CVE-2021-28699, CVE-2021-28698, CVE-2021-0089, CVE-2021-28695, CVE-2021-28696, CVE-2021-28694, CVE-2021-28697, CVE-2021-28690, CVE-2021-28692
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    This update for xen fixes the following issues: - cve-2021-28698: long running loops in grant table handling (xsa-380)(bsc#1189378).
    - cve-2021-28692: xen: inappropriate x86 iommu timeout detection / handling (bsc#1186429).
    - cve-2021-0089: xen: speculative code store bypass (bsc#1186433).
    - cve-2021-28699: inadequate grant-v2 status frames array bounds check (xsa-382)(bsc#1189380).
    - cve-2021-28694,cve-2021-28695,cve-2021-28696: iommu page mapping issues on x86 (xsa-378)(bsc#1189373).
    - cve-2021-28697: grant table v2 status pages may remain accessible after de-allocation (xsa-379)(bsc#1189376).
    - cve-2021-28690: xen: x86: tsx async abort protections not restored after s3 (bsc#1186434).
    - prevent superpage allocation in the lapic and acpi_info range (bsc#1189882).

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2943-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:2943-1
  • CVE-2021-2369+
    Recently Published

    OpenSUSE Security Update for java-11-openJava Development Toolkit (openSUSE-SU-2021:2952-1)

    Severity
    Critical4
    Qualys ID
    751094
    Date Published
    September 7, 2021
    Vendor Reference
    openSUSE-SU-2021:2952-1
    CVE Reference
    CVE-2021-2369, CVE-2021-2341, CVE-2021-2388
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    OpenSUSE has released a security update for java-11-openjdk to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.3


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:2952-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:2952-1
  • CVE-2021-33193
    Recently Published

    OpenSUSE Security Update for apache2 (openSUSE-SU-2021:2954-1)

    Severity
    Critical4
    Qualys ID
    751092
    Date Published
    September 7, 2021
    Vendor Reference
    openSUSE-SU-2021:2954-1
    CVE Reference
    CVE-2021-33193
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    OpenSUSE has released a security update for apache2 to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.3


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:2954-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:2954-1
  • CVE-2021-33193
    Recently Published

    SUSE Enterprise Linux Security Update for apache2 (SUSE-SU-2021:2918-1)

    Severity
    Critical4
    Qualys ID
    751086
    Date Published
    September 7, 2021
    Vendor Reference
    SUSE-SU-2021:2918-1
    CVE Reference
    CVE-2021-33193
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    This update for apache2 fixes the following issues: - cve-2021-33193: fixed request splitting via http/2 method injection and mod_proxy (bsc#1189387).

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2918-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:2918-1
  • CVE-2021-2388+
    Recently Published

    SUSE Enterprise Linux Security Update for java-11-openJava Development Toolkit (SUSE-SU-2021:2952-1)

    Severity
    Critical4
    Qualys ID
    751084
    Date Published
    September 7, 2021
    Vendor Reference
    SUSE-SU-2021:2952-1
    CVE Reference
    CVE-2021-2388, CVE-2021-2369, CVE-2021-2341
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    This update for java-11-openjdk fixes the following issues: - update to jdk-11.0.12+7 - cve-2021-2369: fixed jar file handling problem containing multiple manifest.mf files. (
    Bsc#1188565) - cve-2021-2388: fixed a flaw inside the hotspot component performed range check elimination. (
    Bsc#1188566) - cve-2021-2341: fixed a flaw inside the ftpclient. (
    Bsc#1188564)

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2952-1 to address this issue and obtain further details.
    Patches
    SUSE Enterprise Linux SUSE-SU-2021:2952-1
  • CVE-2021-3621
    Recently Published

    OpenSUSE Security Update for sssd (openSUSE-SU-2021:2941-1)

    Severity
    Critical4
    Qualys ID
    751097
    Date Published
    September 7, 2021
    Vendor Reference
    openSUSE-SU-2021:2941-1
    CVE Reference
    CVE-2021-3621
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description
    OpenSUSE has released a security update for sssd to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.3


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Upgrade to the latest packages which contain a patch. To install this OpenSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

    To install packages using the command line interface, use the command "yum update".

    Refer to SUSE security advisory openSUSE-SU-2021:2941-1 to address this issue and obtain further details.

    Patches
    OpenSuse openSUSE-SU-2021:2941-1
  • Recently Published

    Fedora Security Update for libguestfs (FEDORA-2021-c0235d9d79)

    Severity
    Critical4
    Qualys ID
    281878
    Date Published
    September 7, 2021
    Vendor Reference
    FEDORA-2021-c0235d9d79
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description
    Fedora has released a security update for libguestfs to fix the vulnerability.

    Affected OS:
    Fedora 34



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Fedora has issued updated packages to fix this vulnerability.

    For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
    Fedora 34 Update

    Patches
    Fedora 34 FEDORA-2021-c0235d9d79
  • Recently Published

    Fedora Security Update for condor (FEDORA-2021-9e2e12e5d7)

    Severity
    Critical4
    Qualys ID
    281877
    Date Published
    September 7, 2021
    Vendor Reference
    FEDORA-2021-9e2e12e5d7
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description
    Fedora has released a security update for condor to fix the vulnerability.

    Affected OS:
    Fedora 33



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Fedora has issued updated packages to fix this vulnerability.

    For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
    Fedora 33 Update

    Patches
    Fedora 33 FEDORA-2021-9e2e12e5d7
  • Recently Published

    Fedora Security Update for condor (FEDORA-2021-77bf975e28)

    Severity
    Critical4
    Qualys ID
    281876
    Date Published
    September 7, 2021
    Vendor Reference
    FEDORA-2021-77bf975e28
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description
    Fedora has released a security update for condor to fix the vulnerability.

    Affected OS:
    Fedora 34



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Fedora has issued updated packages to fix this vulnerability.

    For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
    Fedora 34 Update

    Patches
    Fedora 34 FEDORA-2021-77bf975e28
  • Recently Published

    Fedora Security Update for firefox (FEDORA-2021-ca8368f328)

    Severity
    Urgent5
    Qualys ID
    281859
    Date Published
    September 7, 2021
    Vendor Reference
    FEDORA-2021-ca8368f328
    CVSS Scores
    Base 4.2 / Temporal 3.7
    Description
    Fedora has released a security update for firefox to fix the vulnerability.

    Affected OS:
    Fedora 33



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Fedora has issued updated packages to fix this vulnerability.

    For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
    Fedora 33 Update

    Patches
    Fedora 33 FEDORA-2021-ca8368f328
Last updated: