CINXE.COM
oss-sec: by thread
<!-- SecLists-Message-Count: 193 --> <!-- MHonArc v2.6.19 --> <!DOCTYPE html> <html lang="en"> <head> <script async src="/site.js"></script> <link rel="alternate" type="application/rss+xml" title="RSS" href="https://seclists.org/rss/oss-sec.rss"> <meta property="og:image" content="https://seclists.org/images/oss-sec-img.png" /> <link rel="image_src" href="https://seclists.org/images/oss-sec-img.png" /> <title>oss-sec: by thread</title> <link rel="canonical" href="/oss-sec/2021/q3/"> <meta name="viewport" content="width=device-width,initial-scale=1"> <meta name="theme-color" content="#2A0D45"> <link rel="preload" as="image" href="/images/sitelogo.png" imagesizes="168px" imagesrcset="/images/sitelogo.png, /images/sitelogo-2x.png 2x"> <link rel="preload" as="image" href="/shared/images/nst-icons.svg"> <link rel="stylesheet" href="/shared/css/nst.css?v=2"> <script async src="/shared/js/nst.js?v=2"></script> <link rel="stylesheet" href="/shared/css/nst-foot.css?v=2" media="print" onload="this.media='all'"> <link rel="stylesheet" href="/site.css"> <!--Google Analytics Code--> <link rel="preload" href="https://www.google-analytics.com/analytics.js" as="script"> <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-11009417-1', 'auto'); ga('send', 'pageview'); </script> <!--END Google Analytics Code--> <META NAME="ROBOTS" CONTENT="NOARCHIVE"> <link rel="shortcut icon" href="/shared/images/tiny-eyeicon.png" type="image/png"> </head> <body><div id="nst-wrapper"> <div id="menu"> <div class="blur"> <header id="nst-head"> <a id="menu-open" href="#menu" aria-label="Open menu"> <img width="44" height="44" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#menu"> </a> <a id="menu-close" href="#" aria-label="Close menu"> <img width="44" height="44" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#close"> </a> <a id="nst-logo" href="/" aria-label="Home page"> <img alt="Home page logo" srcset="/images/sitelogo.png, /images/sitelogo-2x.png 2x" src="/images/sitelogo.png" onerror="this.onerror=null;this.srcset=this.src" height=90 width=168></a> <nav id="nst-gnav"> <a class="nlink" href="https://nmap.org/">Nmap.org</a> <a class="nlink" href="https://npcap.com/">Npcap.com</a> <a class="nlink" href="https://seclists.org/">Seclists.org</a> <a class="nlink" href="https://sectools.org">Sectools.org</a> <a class="nlink" href="https://insecure.org/">Insecure.org</a> </nav> <form class="nst-search" id="nst-head-search" action="/search/"> <input class="nst-search-q" name="q" type="search" placeholder="Site Search"> <button class="nst-search-button" title="Search"> <img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#search"> </button> </form> </header> </div> </div> <main id="nst-content"> <a href="/oss-sec/"><img src="/images/oss-sec-logo.png" width="80" class="l-logo right" alt="oss-sec logo"></a> <h2 class="l-title"><a href="http://seclists.org/oss-sec/">oss-sec</a>: by thread</h2> <ul class="inline"><li class="first"><a href="/rss/oss-sec.rss"><img src="/images/feed-icon-16x16.png" width=16 height=16 alt="RSS icon">RSS Feed</a> <li><a href="http://oss-security.openwall.org/wiki/mailing-lists/oss-security"><img src="/images/about-icon-16x16.png" width=16 height=16 alt="About icon">About List</a> <li><a href="/"><img src="/images/up-icon-16x16.png" width=16 height=16 alt="Up icon">All Lists</a> </ul> <div class="nav-prev"><a href="/cgi-bin/nav.cgi?from=oss-sec%2F2021%2Fq3&goto=prev&view=thread"><img src="/images/left-icon-16x16.png" width=16 height=16 alt="Previous">Previous period</a></div> <div class="nav-next"><a href="/cgi-bin/nav.cgi?from=oss-sec%2F2021%2Fq3&goto=next&view=thread">Next period<img src="/images/right-icon-16x16.png" width=16 height=16 alt="Next"></a></div> <form class="nst-search center" action="/search/oss-sec"> <input class="nst-search-q" name="q" type="search" placeholder="List Archive Search"> <button class="nst-search-button" title="Search"> <img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#search"> </button> </form> <p> 193 messages <a href="#begin">starting</a> Jul 01 21 and <a href="#end">ending</a> Sep 30 21 <br> <a href="date.html">Date index</a> | Thread index | <a href="author.html">Author index</a> </p> <hr id="begin"> <ul class="thread"> <li><a name="0" href="0">CVE-2021-26920: Apache Druid: The HTTP inputSource allows authenticated users to read data from other sources than intended</a> <em>Jihoon Son (Jul 01)</em></li> <li><a name="1" href="1">Django: CVE-2021-35042: Potential SQL injection via unsanitized QuerySet.order_by() input</a> <em>Mariusz Felisiak (Jul 01)</em></li> <li><a name="2" href="2">CVE-2021-33192: Apache Jena Fuseki: Display information UI XSS</a> <em>Andy Seaborne (Jul 04)</em></li> <li><a name="3" href="3">Re: Blind in/on-path attacks against VPN-tunneled connections (CVE-2019-14899 follow-up)</a> <em>vpn-research (Jul 05)</em></li> <li><a name="4" href="4">linuxptp: Fixes published for CVE-2021-3570 and CVE-2021-3571</a> <em>Richard Cochran (Jul 06)</em></li> <li><a name="5" href="5">xscreensaver 5.45 crash</a> <em>Mustafa Kuscu (Jul 06)</em></li> <li><a name="6" href="6">CVE-2021-35039: Linux kernel loading unsigned kernel modules via init_module syscall</a> <em>Nayna (Jul 06)</em></li> <li><a name="7" href="7">CVE-2021-30129: DoS/OOM leak vulnerability in Apache Mina SSHD Server</a> <em>Guillaume Nodet (Jul 12)</em></li> <li><a name="8" href="8">[OSSA-2021-001] Neutron: Anti-spoofing bypass for Open vSwitch networks (CVE-2021-20267)</a> <em>Jeremy Stanley (Jul 12)</em></li> <li><a name="9" href="9">CVE-2021-35515: Apache Commons Compress 1.6 to 1.20 denial of service vulnerability</a> <em>Stefan Bodewig (Jul 13)</em></li> <li><a name="10" href="10">CVE-2021-35516: Apache Commons Compress 1.6 to 1.20 denial of service vulnerability</a> <em>Stefan Bodewig (Jul 13)</em></li> <li><a name="11" href="11">CVE-2021-35517: Apache Commons Compress 1.1 to 1.20 denial of service vulnerability</a> <em>Stefan Bodewig (Jul 13)</em></li> <li><a name="12" href="12">CVE-2021-36090: Apache Commons Compress 1.0 to 1.20 denial of service vulnerability</a> <em>Stefan Bodewig (Jul 13)</em></li> <li><a name="13" href="13">CVE-2021-36373: Apache Ant TAR archive denial of service vulnerability</a> <em>Stefan Bodewig (Jul 13)</em></li> <li><a name="14" href="14">CVE-2021-36374: Apache Ant ZIP, and ZIP based, archive denial of service vulerability</a> <em>Stefan Bodewig (Jul 13)</em></li> <li><a name="15" href="15">[kubernetes] CVE-2021-25740: Endpoint & EndpointSlice permissions allow cross-Namespace forwarding</a> <em>CJ Cullen (Jul 14)</em></li> <li><a name="16" href="16">Re: Polipo: denial-of-service using range</a> <em>John Helmert III (Jul 18)</em> <ul> <li><Possible follow-ups></li> <li><a name="17" href="17">Re: Polipo: denial-of-service using range</a> <em>Jeffrey Walton (Jul 19)</em> <ul> <li><a name="53" href="53">Re: Polipo: denial-of-service using range</a> <em>Alexandr Savca (chinarulezzz) (Jul 28)</em> <ul> <li><a name="62" href="62">Re: Polipo: denial-of-service using range</a> <em>John Helmert III (Aug 01)</em> </li> <li><a name="65" href="65">Re: Polipo: denial-of-service using range</a> <em>Alexandr Savca (chinarulezzz) (Aug 03)</em> </li> <li><a name="99" href="99">Re: Polipo: denial-of-service using range</a> <em>John Helmert III (Aug 13)</em> </li> </ul> </li> </ul> </li> </ul> </li> <li><a name="18" href="18">CVE-2021-32760: containerd archive package allows chmod of file outside of unpack target directory</a> <em>Karp, Samuel (Jul 19)</em></li> <li><a name="19" href="19">CVE-2021-33909: size_t-to-int vulnerability in Linux's filesystem layer</a> <em>Qualys Security Advisory (Jul 20)</em> <ul> <li><a name="21" href="21">Re: CVE-2021-33909: size_t-to-int vulnerability in Linux's filesystem layer</a> <em>Petr Matousek (Jul 20)</em> </li> <li><Possible follow-ups></li> <li><a name="34" href="34">Re: CVE-2021-33909: size_t-to-int vulnerability in Linux's filesystem layer</a> <em>Qualys Security Advisory (Jul 22)</em> <ul> <li><a name="128" href="128">Re: CVE-2021-33909: size_t-to-int vulnerability in Linux's filesystem layer</a> <em>Qualys Security Advisory (Aug 25)</em> </li> </ul> </li> </ul> </li> <li><a name="20" href="20">CVE-2021-33910: Denial of service (stack exhaustion) in systemd (PID 1)</a> <em>Qualys Security Advisory (Jul 20)</em> <ul> <li><a name="22" href="22">Re: CVE-2021-33910: Denial of service (stack exhaustion) in systemd (PID 1)</a> <em>Mauro Matteo Cascella (Jul 20)</em> </li> </ul> </li> <li><a name="23" href="23">Pop!_OS Membership to linux-distros list</a> <em>Jeremy Soller (Jul 20)</em> <ul> <li><a name="51" href="51">Re: Pop!_OS Membership to linux-distros list</a> <em>Solar Designer (Jul 27)</em> <ul> <li><a name="60" href="60">Re: Pop!_OS Membership to linux-distros list</a> <em>Tyler Hicks (Jul 30)</em> </li> <li><a name="67" href="67">Re: Pop!_OS Membership to linux-distros list</a> <em>Jeremy Soller (Aug 04)</em> <ul> <li><a name="68" href="68">Re: Pop!_OS Membership to linux-distros list</a> <em>Tyler Hicks (Aug 04)</em> </li> <li><a name="106" href="106">Re: Pop!_OS Membership to linux-distros list</a> <em>Solar Designer (Aug 17)</em> </li> <li><a name="156" href="156">Re: Pop!_OS Membership to linux-distros list</a> <em>Jeremy Soller (Sep 07)</em> </li> </ul> </li> </ul> </li> </ul> </li> <li><a name="24" href="24">[SECURITY ADVISORY] curl: Wrong content via metalink not discarded</a> <em>Daniel Stenberg (Jul 21)</em></li> <li><a name="25" href="25">[SECURITY ADVISORY] curl: Metalink download sends credentials</a> <em>Daniel Stenberg (Jul 21)</em></li> <li><a name="26" href="26">[SECURITY ADVISORY] curl: Bad connection reuse due to flawed path name checks</a> <em>Daniel Stenberg (Jul 21)</em></li> <li><a name="27" href="27">[SECURITY ADVISORY] curl: TELNET stack contents disclosure again</a> <em>Daniel Stenberg (Jul 21)</em></li> <li><a name="28" href="28">CVE-2021-3640: Linux kernel: UAF in sco_send_frame function</a> <em>Lin Horse (Jul 22)</em></li> <li><a name="29" href="29">ipython3 may execute code from the current working directory</a> <em>Georgi Guninski (Jul 22)</em> <ul> <li><a name="31" href="31">Re: ipython3 may execute code from the current working directory</a> <em>Jakub Wilk (Jul 22)</em> <ul> <li><a name="33" href="33">Re: ipython3 may execute code from the current working directory</a> <em>Jakub Wilk (Jul 22)</em> </li> <li><a name="36" href="36">Re: ipython3 may execute code from the current working directory</a> <em>Jakub Wilk (Jul 23)</em> </li> <li><a name="37" href="37">Re: ipython3 may execute code from the current working directory</a> <em>Mats Wichmann (Jul 23)</em> <ul> <li><a name="41" href="41">Re: ipython3 may execute code from the current working directory</a> <em>Jakub Wilk (Jul 24)</em> </li> <li><a name="43" href="43">Re: ipython3 may execute code from the current working directory</a> <em>Georgi Guninski (Jul 25)</em> </li> </ul> </li> </ul> </li> </ul> </li> <li><a name="30" href="30">CVE-2021-28131: Apache Impala: Impala logs contain secrets</a> <em>Zolt谩n Bor贸k-Nagy (Jul 22)</em></li> <li><a name="32" href="32">Prosody XMPP server advisory 2021-07-22 (Remote Information Disclosure) (CVE Request)</a> <em>Jonas Sch盲fer (Jul 22)</em> <ul> <li><a name="52" href="52">Re: Prosody XMPP server advisory 2021-07-22 (Remote Information Disclosure) (CVE Request)</a> <em>Salvatore Bonaccorso (Jul 27)</em> <ul> <li><a name="54" href="54">Re: Prosody XMPP server advisory 2021-07-22 (Remote Information Disclosure) (CVE Request)</a> <em>Jonas Sch盲fer (Jul 28)</em> </li> </ul> </li> <li><a name="55" href="55">Re: Prosody XMPP server advisory 2021-07-22 (Remote Information Disclosure) (CVE-2021-37601)</a> <em>Jonas Sch盲fer (Jul 28)</em> </li> </ul> </li> <li><a name="35" href="35">WebKitGTK and WPE WebKit Security Advisory WSA-2021-0004</a> <em>Carlos Alberto Lopez Perez (Jul 23)</em></li> <li><a name="38" href="38">CVE-2021-33900: Apache Directory Studio: StartTLS and SASL confidentiality protection bypass</a> <em>Stefan Seelmann (Jul 24)</em></li> <li><a name="39" href="39">Potential symlink attack in python3 __pycache__</a> <em>Georgi Guninski (Jul 24)</em> <ul> <li><a name="40" href="40">Re: Potential symlink attack in python3 __pycache__</a> <em>Michael Orlitzky (Jul 24)</em> <ul> <li><a name="46" href="46">Re: Potential symlink attack in python3 __pycache__</a> <em>Georgi Guninski (Jul 26)</em> <ul> <li><a name="47" href="47">Re: Potential symlink attack in python3 __pycache__</a> <em>Santiago Torres (Jul 26)</em> </li> <li><a name="48" href="48">Re: Potential symlink attack in python3 __pycache__</a> <em>Jakub Wilk (Jul 26)</em> </li> </ul> </li> </ul> </li> </ul> </li> <li><a name="42" href="42">CVE-2020-28020: Integer overflow in Exim that can lead to RCE: Some questions to the Qualys researchers who designed the exploit</a> <em>Jonas Dellinger (Jul 25)</em> <ul> <li><a name="64" href="64">Re: CVE-2020-28020: Integer overflow in Exim that can lead to RCE: Some questions to the Qualys researchers who designed the exploit</a> <em>Qualys Security Advisory (Aug 02)</em> </li> </ul> </li> <li><a name="44" href="44">Linux kernel: powerpc: KVM guest to host memory corruption</a> <em>Michael Ellerman (Jul 26)</em> <ul> <li><a name="50" href="50">Re: Linux kernel: powerpc: KVM guest to host memory corruption</a> <em>Michael Ellerman (Jul 27)</em> </li> </ul> </li> <li><a name="45" href="45">security advisory 2021-01 for PowerDNS Authoritative Server 4.5.0</a> <em>Peter van Dijk (Jul 26)</em></li> <li><a name="49" href="49">replay-sorcery: CVE-2021-36983: kms service in version 0.6.0 allows local root exploit and other local attack vectors</a> <em>Matthias Gerstner (Jul 27)</em></li> <li><a name="56" href="56">ANNOUNCE: fetchmail <= 6.4.19 security announcement 2021-01 (CVE-2021-36386) - fetchmail 6.4.20 released. DoS or information disclosure in some configurations</a> <em>Matthias Andree (Jul 28)</em> <ul> <li><a name="83" href="83">fetchmail 6.4.21 released/regression fix for 6.4.20's security fix, and UPDATE: fetchmail <= 6.4.19 security announcement 2021-01 (CVE-2021-36386)</a> <em>Matthias Andree (Aug 09)</em> </li> </ul> </li> <li><a name="57" href="57">[SECURITY] CVE-2021-37578 Apache jUDDI Remote code execution</a> <em>Alex O'Ree (Jul 29)</em></li> <li><a name="58" href="58">[OSSA-2021-002] Nova: Open Redirect in noVNC proxy (CVE-2021-3654)</a> <em>Jeremy Stanley (Jul 29)</em> <ul> <li><Possible follow-ups></li> <li><a name="188" href="188">[OSSA-2021-002] Nova: Open Redirect in noVNC proxy (CVE-2021-3654)</a> <em>Jeremy Stanley (Sep 27)</em> </li> </ul> </li> <li><a name="59" href="59">Node.js: Security updates for all active release lines, 30 July 2021</a> <em>Daniel Bevenius (Jul 29)</em></li> <li><a name="61" href="61">GPSD time will jump back 1024 weeks at after week=2180 (23-October-2021)</a> <em>Bernd Zeimetz (Aug 01)</em></li> <li><a name="63" href="63">[CVE-2021-34556,CVE-2021-35477] Linux kernel BPF protection against Speculative Store Bypass can be bypassed to disclose arbitrary kernel memory</a> <em>Piotr Krysiuk (Aug 01)</em></li> <li><a name="66" href="66">Reminder: QtWebKit known vulnerabilities</a> <em>Alex Xu (Hello71) (Aug 04)</em></li> <li><a name="69" href="69">Fwd: Node.js security updates for all active release lines, August 2021</a> <em>Michael Dawson (Aug 05)</em></li> <li><a name="70" href="70">Re: [Lynx-dev] bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances)</a> <em>Axel Beckert (Aug 06)</em> <ul> <li><a name="71" href="71">Re: [Lynx-dev] bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances)</a> <em>Thorsten Glaser (Aug 07)</em> <ul> <li><a name="72" href="72">Re: bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances)</a> <em>Axel Beckert (Aug 07)</em> <ul> <li><a name="74" href="74">Re: bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances)</a> <em>Thorsten Glaser (Aug 07)</em> </li> <li><a name="75" href="75">Re: Re: bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances)</a> <em>Stuart Henderson (Aug 07)</em> </li> </ul> </li> <li><a name="73" href="73">SNI is a security vulnerability all by itself (was Re: [Lynx-dev] bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances))</a> <em>Thorsten Glaser (Aug 07)</em> <ul> <li><a name="77" href="77">Re: SNI is a security vulnerability all by itself (was Re: [Lynx-dev] bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances))</a> <em>Jeffrey Walton (Aug 07)</em> </li> </ul> </li> <li><a name="76" href="76">Re: Re: [Lynx-dev] bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances)</a> <em>Ariadne Conill (Aug 07)</em> <ul> <li><a name="79" href="79">Re: [Lynx-dev] [oss-security] Re: bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances)</a> <em>Thorsten Glaser (Aug 07)</em> </li> <li><a name="80" href="80">Re: Re: Bug#991971: [Lynx-dev] bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances)</a> <em>Axel Beckert (Aug 07)</em> </li> <li><a name="81" href="81">Re: Re: Bug#991971: [Lynx-dev] bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances)</a> <em>Ariadne Conill (Aug 07)</em> </li> <li><a name="82" href="82">Re: Re: Bug#991971: [Lynx-dev] bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances)</a> <em>Axel Beckert (Aug 07)</em> </li> </ul> </li> </ul> </li> <li><a name="78" href="78">Re: Bug#991971: [Lynx-dev] bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances)</a> <em>Salvatore Bonaccorso (Aug 07)</em> </li> </ul> </li> <li><a name="84" href="84">[SECURITY ADVISORY] c-ares: Missing input validation on hostnames returned by DNS servers</a> <em>Daniel Stenberg (Aug 09)</em></li> <li><a name="85" href="85">STARTTLS vulnerabilities</a> <em>Hanno B枚ck (Aug 10)</em> <ul> <li><a name="87" href="87">Re: STARTTLS vulnerabilities</a> <em>Guido Berhoerster (Aug 10)</em> <ul> <li><a name="89" href="89">Re: STARTTLS vulnerabilities</a> <em>Hanno B枚ck (Aug 10)</em> <ul> <li><a name="95" href="95">Re: STARTTLS vulnerabilities</a> <em>Eric Blake (Aug 11)</em> </li> <li><a name="96" href="96">Re: STARTTLS vulnerabilities</a> <em>Hanno B枚ck (Aug 11)</em> </li> <li><a name="103" href="103">Re: STARTTLS vulnerabilities</a> <em>Eric Blake (Aug 16)</em> </li> <li><a name="111" href="111">Re: STARTTLS vulnerabilities</a> <em>Eric Blake (Aug 18)</em> </li> </ul> </li> <li><a name="90" href="90">Re: STARTTLS vulnerabilities</a> <em>Matthew Wild (Aug 11)</em> <ul> <li><a name="91" href="91">Re: STARTTLS vulnerabilities</a> <em>Hanno B枚ck (Aug 11)</em> </li> <li><a name="93" href="93">Re: STARTTLS vulnerabilities</a> <em>Matthew Wild (Aug 11)</em> </li> </ul> </li> </ul> </li> </ul> </li> <li><a name="86" href="86">CVE-2021-21501: Apache ServiceComb: ServiceComb ServiceCenter Directory Traversal</a> <em>Willem Jiang (Aug 10)</em></li> <li><a name="88" href="88">[OSSA-2021-003] Keystone: Account name and UUID oracles in account locking (CVE-2021-38155)</a> <em>Jeremy Stanley (Aug 10)</em></li> <li><a name="92" href="92">firebase/php-jwt Algorithm Confusion with Key IDs</a> <em>Paragon Initiative Enterprises Security Team (Aug 11)</em></li> <li><a name="94" href="94">CVE-2021-20314: Remote stack buffer overflow in libspf2</a> <em>Philipp Jeitner (SIT) (Aug 11)</em> <ul> <li><a name="98" href="98">Re: CVE-2021-20314: Remote stack buffer overflow in libspf2</a> <em>Sam James (Aug 12)</em> </li> </ul> </li> <li><a name="97" href="97">[CVE-2021-37608] Arbitrary file upload vulnerability in OFBiz</a> <em>jleroux () apache org (Aug 11)</em></li> <li><a name="100" href="100">CVE-2021-35936: Apache Airflow: No Authentication on Logging Server</a> <em>Kaxil Naik (Aug 14)</em></li> <li><a name="101" href="101">kopano-core 11.0.2.43: Remote authenticated DoS with unhandled exception</a> <em>Jan Engelhardt (Aug 14)</em></li> <li><a name="102" href="102">[CVE-2021-3653, CVE-2021-3656] SVM nested virtualization issues in KVM</a> <em>Mauro Matteo Cascella (Aug 16)</em></li> <li><a name="104" href="104">Re: Linux kernel: nfc: null ptr dereference in llcp_sock_getname</a> <em>butt3rflyh4ck (Aug 17)</em> <ul> <li><a name="105" href="105">Re: Linux kernel: nfc: null ptr dereference in llcp_sock_getname</a> <em>Salvatore Bonaccorso (Aug 17)</em> <ul> <li><a name="117" href="117">Re: Linux kernel: nfc: null ptr dereference in llcp_sock_getname</a> <em>Mohammad Tausif Siddiqui (Aug 24)</em> </li> </ul> </li> </ul> </li> <li><a name="107" href="107">[OSSA-2021-004] Neutron: Linuxbridge ARP filter bypass on Netfilter platforms (CVE-2021-38598)</a> <em>Jeremy Stanley (Aug 17)</em> <ul> <li><a name="108" href="108">Re: [OSSA-2021-004] Neutron: Linuxbridge ARP filter bypass on Netfilter platforms (CVE-2021-38598)</a> <em>Jan Engelhardt (Aug 17)</em> <ul> <li><a name="109" href="109">Re: [OSSA-2021-004] Neutron: Linuxbridge ARP filter bypass on Netfilter platforms (CVE-2021-38598)</a> <em>Jeremy Stanley (Aug 17)</em> </li> </ul> </li> </ul> </li> <li><a name="110" href="110">CVE-2021-33580: Apache Roller: regex injection leading to DoS</a> <em>Dave (Aug 17)</em></li> <li><a name="112" href="112">ISC has disclosed a vulnerability in BIND (CVE-2021-25218)</a> <em>Michael McNally (Aug 18)</em></li> <li><a name="113" href="113">[CVE-2021-22942] Possible Open Redirect in Host Authorization Middleware</a> <em>Aaron Patterson (Aug 19)</em></li> <li><a name="114" href="114">August BIND maintenance releases contain a defect affecting servers using the map zone file format (was: A vulnerability in BIND (CVE-2021-25218) will be announced 18 August 2021)</a> <em>Michael McNally (Aug 20)</em></li> <li><a name="115" href="115">CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613</a> <em>Joe Orton (Aug 23)</em></li> <li><a name="116" href="116">CVE-2021-33191: Apache NiFi - MiNiFi C++: MiNiFi CPP arbitrary script execution is possible on the agent's host machine through the c2 protocol</a> <em>Arpad Boda (Aug 24)</em></li> <li><a name="118" href="118">Oracle Solaris membership in the distros list</a> <em>Alan Coopersmith (Aug 24)</em> <ul> <li><a name="152" href="152">Re: Oracle Solaris membership in the distros list</a> <em>Solar Designer (Sep 06)</em> <ul> <li><a name="165" href="165">Re: Oracle Solaris membership in the distros list</a> <em>Alan Coopersmith (Sep 14)</em> <ul> <li><a name="179" href="179">Re: Oracle Solaris membership in the distros list</a> <em>Solar Designer (Sep 17)</em> </li> </ul> </li> </ul> </li> </ul> </li> <li><a name="119" href="119">Possible memory leak on getspnam / getspnam_r</a> <em>Jean Diogo (Aug 25)</em> <ul> <li><a name="127" href="127">Re: Possible memory leak on getspnam / getspnam_r</a> <em>Travis Finkenauer (Aug 25)</em> <ul> <li><em>Message not available</em><ul> <li><a name="129" href="129">Re: Possible memory leak on getspnam / getspnam_r</a> <em>Jean D'Elboux (Aug 26)</em> </ul> </li> </li> </ul> </li> <li><a name="153" href="153">Re: Possible memory leak on getspnam / getspnam_r</a> <em>Solar Designer (Sep 06)</em> </li> </ul> </li> <li><a name="120" href="120">Linux kernel: qrtr: another out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c</a> <em>butt3rflyh4ck (Aug 25)</em> <ul> <li><a name="132" href="132">Re: Linux kernel: qrtr: another out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c</a> <em>John Haxby (Aug 26)</em> <ul> <li><a name="134" href="134">Re: Linux kernel: qrtr: another out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c</a> <em>butt3rflyh4ck (Aug 26)</em> </li> </ul> </li> <li><a name="135" href="135">Re: Linux kernel: qrtr: another out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c</a> <em>butt3rflyh4ck (Aug 27)</em> <ul> <li><a name="136" href="136">Re: Linux kernel: qrtr: another out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c</a> <em>butt3rflyh4ck (Aug 27)</em> </li> </ul> </li> </ul> </li> <li><a name="121" href="121">Linux kernel: fs/btrfs: null-ptr-dereference bug in btrfs_rm_device in fs/btrfs/volumes.c</a> <em>butt3rflyh4ck (Aug 25)</em> <ul> <li><a name="131" href="131">Re: Linux kernel: fs/btrfs: null-ptr-dereference bug in btrfs_rm_device in fs/btrfs/volumes.c</a> <em>butt3rflyh4ck (Aug 26)</em> <ul> <li><a name="145" href="145">Re: Linux kernel: fs/btrfs: null-ptr-dereference bug in btrfs_rm_device in fs/btrfs/volumes.c</a> <em>butt3rflyh4ck (Sep 01)</em> </li> </ul> </li> </ul> </li> <li><a name="122" href="122">Xen Security Advisory 379 v2 (CVE-2021-28697) - grant table v2 status pages may remain accessible after de-allocation</a> <em>Xen . org security team (Aug 25)</em></li> <li><a name="123" href="123">Xen Security Advisory 382 v2 (CVE-2021-28699) - inadequate grant-v2 status frames array bounds check</a> <em>Xen . org security team (Aug 25)</em></li> <li><a name="124" href="124">Xen Security Advisory 383 v2 (CVE-2021-28700) - xen/arm: No memory limit for dom0less domUs</a> <em>Xen . org security team (Aug 25)</em></li> <li><a name="125" href="125">Xen Security Advisory 380 v2 (CVE-2021-28698) - long running loops in grant table handling</a> <em>Xen . org security team (Aug 25)</em></li> <li><a name="126" href="126">Xen Security Advisory 378 v2 (CVE-2021-28694,CVE-2021-28695,CVE-2021-28696) - IOMMU page mapping issues on x86</a> <em>Xen . org security team (Aug 25)</em></li> <li><a name="130" href="130">OpenSSL SM2 Decryption Buffer Overflow (CVE-2021-3711), Read buffer overruns processing ASN.1 strings (CVE-2021-3712)</a> <em>Mark J Cox (Aug 26)</em></li> <li><a name="133" href="133">libssh: Possible heap-buffer overflow when rekeying (CVE-2021-3634)</a> <em>Marco Benatto (Aug 26)</em></li> <li><a name="137" href="137">ANNOUNCE: fetchmail security announcement 2021-02 (CVE-2021-39272) - TLS bypass vulnerabilities ("NO STARTTLS")</a> <em>Matthias Andree (Aug 27)</em></li> <li><a name="138" href="138">Fwd: Node.js security updates for versions 12.x, and 14.x releases lines, August 31 2021</a> <em>Daniel Bevenius (Aug 27)</em> <ul> <li><Possible follow-ups></li> <li><a name="142" href="142">Fwd: Node.js security updates for versions 12.x, and 14.x releases lines, August 31 2021</a> <em>Daniel Bevenius (Aug 31)</em> </li> </ul> </li> <li><a name="139" href="139">NTFS3G-SA-2021-0001: Multiple buffer overflows in all versions of NTFS-3G</a> <em>Jussi Hietanen (Aug 30)</em></li> <li><a name="140" href="140">Multiple vulnerabilities in Jenkins plugins</a> <em>Daniel Beck (Aug 31)</em></li> <li><a name="141" href="141">[OSSA-2021-005] Neutron: Arbitrary dnsmasq reconfiguration via extra_dhcp_opts (CVE-2021-40085)</a> <em>Jeremy Stanley (Aug 31)</em></li> <li><a name="143" href="143">Xen Security Advisory 378 v3 (CVE-2021-28694,CVE-2021-28695,CVE-2021-28696) - IOMMU page mapping issues on x86</a> <em>Xen . org security team (Sep 01)</em> <ul> <li><a name="147" href="147">Re: Xen Security Advisory 378 v3 (CVE-2021-28694,CVE-2021-28695,CVE-2021-28696) - IOMMU page mapping issues on x86</a> <em>Jason Andryuk (Sep 01)</em> <ul> <li><a name="148" href="148">Re: Xen Security Advisory 378 v3 (CVE-2021-28694,CVE-2021-28695,CVE-2021-28696) - IOMMU page mapping issues on x86</a> <em>Andrew Cooper (Sep 01)</em> </li> </ul> </li> </ul> </li> <li><a name="144" href="144">Xen Security Advisory 380 v3 (CVE-2021-28698) - long running loops in grant table handling</a> <em>Xen . org security team (Sep 01)</em></li> <li><a name="146" href="146">CVE-2021-3753: A out-of-bounds caused by the race of KDSETMODE in vt for latest Linux</a> <em>Minh Yuan (Sep 01)</em></li> <li><a name="149" href="149">CVE-2019-10095: Apache Zeppelin: bash command injection in spark interpreter</a> <em>Jeff Zhang (Sep 02)</em></li> <li><a name="150" href="150">CVE-2020-13929: Apache Zeppelin: Notebook permissions bypass</a> <em>Jeff Zhang (Sep 02)</em></li> <li><a name="151" href="151">CVE-2021-27578: Apache Zeppelin: Cross Site Scripting in markdown interpreter</a> <em>Jeff Zhang (Sep 02)</em></li> <li><a name="154" href="154">CVE-2021-3715 Linux kernel: use-after-free in route4_change() in net/sched/cls_route.c</a> <em>Rohit Keshri (Sep 07)</em> <ul> <li><a name="155" href="155">Re: CVE-2021-3715 Linux kernel: use-after-free in route4_change() in net/sched/cls_route.c</a> <em>Greg KH (Sep 07)</em> <ul> <li><a name="157" href="157">Re: CVE-2021-3715 Linux kernel: use-after-free in route4_change() in net/sched/cls_route.c</a> <em>Rohit Keshri (Sep 08)</em> </li> </ul> </li> </ul> </li> <li><a name="158" href="158">Xen Security Advisory 384 v3 (CVE-2021-28701) - Another race in XENMAPSPACE_grant_table handling</a> <em>Xen . org security team (Sep 08)</em></li> <li><a name="159" href="159">CVE-2021-3773: Lack of port sanity checking in natd and Netfilter leads to exploit of OpenVPN clients on Linux and FreeBSD platforms</a> <em>Ben (Sep 08)</em></li> <li><a name="160" href="160">CVE-2021-38540: Apache Airflow: Variable Import endpoint missed authentication check</a> <em>Kaxil Naik (Sep 09)</em></li> <li><a name="161" href="161">[OSSA-2021-006] Neutron: Routes middleware memory leak for nonexistent controllers (CVE-2021-40797)</a> <em>Jeremy Stanley (Sep 09)</em></li> <li><a name="162" href="162">CVE-2021-38555: An XML external entity (XXE) injection vulnerability exists in Apache Any23 StreamUtils.java</a> <em>lewis john mcgibbney (Sep 11)</em></li> <li><a name="163" href="163">CVE-2021-40146: A Remote Code Execution (RCE) vulnerability exists in Apache Any23 YAMLExtractor.java</a> <em>lewis john mcgibbney (Sep 11)</em></li> <li><a name="164" href="164">Disclosure: CVE-2021-3744: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()</a> <em>Marcus Meissner (Sep 14)</em></li> <li><a name="166" href="166">[SECURITY ADVISORY] curl: UAF and double-free in MQTT sending</a> <em>Daniel Stenberg (Sep 14)</em></li> <li><a name="167" href="167">[SECURITY ADVISORY] curl: Protocol downgrade required TLS bypassed</a> <em>Daniel Stenberg (Sep 14)</em></li> <li><a name="168" href="168">[SECURITY ADVISORY] curl: STARTTLS protocol injection via MITM</a> <em>Daniel Stenberg (Sep 14)</em></li> <li><a name="169" href="169">CVE-2021-3752: Linux kernel: a uaf bug in bluetooth</a> <em>Luo Likang (Sep 15)</em></li> <li><a name="170" href="170">[CVE-2021-38300] Linux kernel cBPF JIT compiler for MIPS emits incorrect branches leading to execution of arbitrary Kernel code</a> <em>Piotr Krysiuk (Sep 15)</em></li> <li><a name="171" href="171">CVE-2021-41079: Apache Tomcat DoS with unexpected TLS packet</a> <em>Mark Thomas (Sep 15)</em></li> <li><a name="172" href="172">[kubernetes] CVE-2021-25741: Symlink Exchange Can Allow Host Filesystem Access</a> <em>CJ Cullen (Sep 15)</em></li> <li><a name="173" href="173">[kubernetes] CVE-2020-8561: Webhook redirect in kube-apiserver</a> <em>Hausler, Micah (Sep 15)</em></li> <li><a name="174" href="174">CVE-2021-39239: Apache Jena: XML External Entity (XXE) vulnerability</a> <em>Andy Seaborne (Sep 16)</em></li> <li><a name="175" href="175">CVE-2021-41303: Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass</a> <em>Brian Demers (Sep 16)</em></li> <li><a name="176" href="176">Containers-optimized OS (COS) membership in the linux-distros list</a> <em>Oleksandr Tymoshenko (Sep 16)</em> <ul> <li><a name="178" href="178">Re: Containers-optimized OS (COS) membership in the linux-distros list</a> <em>Solar Designer (Sep 17)</em> <ul> <li><a name="180" href="180">Re: Containers-optimized OS (COS) membership in the linux-distros list</a> <em>Kees Cook (Sep 18)</em> </li> <li><a name="183" href="183">Re: Containers-optimized OS (COS) membership in the linux-distros list</a> <em>Oleksandr Tymoshenko (Sep 21)</em> <ul> <li><a name="185" href="185">Re: Containers-optimized OS (COS) membership in the linux-distros list</a> <em>Solar Designer (Sep 21)</em> </li> </ul> </li> </ul> </li> </ul> </li> <li><a name="177" href="177">CVE-2021-40690: Apache Santuario: Bypass of the secureValidation property</a> <em>Colm O hEigeartaigh (Sep 17)</em></li> <li><a name="181" href="181">Linux Kernel: Exploitable vulnerability in io_uring</a> <em>Valentina Palmiotti (Sep 18)</em></li> <li><a name="182" href="182">WebKitGTK and WPE WebKit Security Advisory WSA-2021-0005</a> <em>Carlos Alberto Lopez Perez (Sep 20)</em></li> <li><a name="184" href="184">CVE-2021-38153: Timing Attack Vulnerability for Apache Kafka Connect and Clients</a> <em>Randall Hauch (Sep 21)</em></li> <li><a name="186" href="186">CVE-2021-36749: Apache Druid: The HTTP inputSource allows authenticated users to read data from other sources than intended (incomplete fix of CVE-2021-26920)</a> <em>Clint Wylie (Sep 23)</em></li> <li><a name="187" href="187">Announce: OpenSSH 8.8 released</a> <em>Damien Miller (Sep 26)</em></li> <li><a name="189" href="189">CVE-2021-41616: Apache ddlutils 1.0 readobject vulnerability</a> <em>Bryan Pendleton (Sep 29)</em></li> <li><a name="190" href="190">CVE-2021-3762 quay/claircore: directory traversal when scanning crafted container image</a> <em>Przemyslaw Roguski (Sep 29)</em></li> <li><a name="191" href="191">security issues in Litex IP stack</a> <em>Philipp Takacs (Sep 30)</em></li> <li><a name="192" href="192">3 new CVE's in vim</a> <em>Alan Coopersmith (Sep 30)</em></li> </ul> <hr id="end"> <div class="nav-prev"><a href="/cgi-bin/nav.cgi?from=oss-sec%2F2021%2Fq3&goto=prev&view=thread"><img src="/images/left-icon-16x16.png" width=16 height=16 alt="Previous">Previous period</a></div> <div class="nav-next"><a href="/cgi-bin/nav.cgi?from=oss-sec%2F2021%2Fq3&goto=next&view=thread">Next period<img src="/images/right-icon-16x16.png" width=16 height=16 alt="Next"></a></div> </main><!-- content --> <footer id="nst-foot"> <form class="nst-search" id="nst-foot-search" action="/search/"> <input class="nst-search-q" name="q" type="search" placeholder="Site Search"> <button class="nst-search-button" title="Search"> <img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#search"> </button> </form> <div class="flexlists"> <div class="fl-unit"> <h2><a class="nlink" href="https://nmap.org/">Nmap Security Scanner</a></h2> <ul> <li><a class="nlink" href="https://nmap.org/book/man.html">Ref Guide</a> <li><a class="nlink" href="https://nmap.org/book/install.html">Install Guide</a> <li><a class="nlink" href="https://nmap.org/docs.html">Docs</a> <li><a class="nlink" href="https://nmap.org/download.html">Download</a> <li><a class="nlink" href="https://nmap.org/oem/">Nmap OEM</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://npcap.com/">Npcap packet capture</a></h2> <ul> <li><a class="nlink" href="https://npcap.com/guide/">User's Guide</a> <li><a class="nlink" href="https://npcap.com/guide/npcap-devguide.html#npcap-api">API docs</a> <li><a class="nlink" href="https://npcap.com/#download">Download</a> <li><a class="nlink" href="https://npcap.com/oem/">Npcap OEM</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://seclists.org/">Security Lists</a></h2> <ul> <li><a class="nlink" href="https://seclists.org/nmap-announce/">Nmap Announce</a> <li><a class="nlink" href="https://seclists.org/nmap-dev/">Nmap Dev</a> <li><a class="nlink" href="https://seclists.org/fulldisclosure/">Full Disclosure</a> <li><a class="nlink" href="https://seclists.org/oss-sec/">Open Source Security</a> <li><a class="nlink" href="https://seclists.org/dataloss/">BreachExchange</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://sectools.org">Security Tools</a></h2> <ul> <li><a class="nlink" href="https://sectools.org/tag/vuln-scanners/">Vuln scanners</a> <li><a class="nlink" href="https://sectools.org/tag/pass-audit/">Password audit</a> <li><a class="nlink" href="https://sectools.org/tag/web-scanners/">Web scanners</a> <li><a class="nlink" href="https://sectools.org/tag/wireless/">Wireless</a> <li><a class="nlink" href="https://sectools.org/tag/sploits/">Exploitation</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://insecure.org/">About</a></h2> <ul> <li><a class="nlink" href="https://insecure.org/fyodor/">About/Contact</a> <li><a class="nlink" href="https://insecure.org/privacy.html">Privacy</a> <li><a class="nlink" href="https://insecure.org/advertising.html">Advertising</a> <li><a class="nlink" href="https://nmap.org/npsl/">Nmap Public Source License</a> </ul> </div> <div class="fl-unit social-links"> <a class="nlink" href="https://twitter.com/nmap" title="Visit us on Twitter"> <img width="32" height="32" src="/shared/images/nst-icons.svg#twitter" alt="" aria-hidden="true"> </a> <a class="nlink" href="https://facebook.com/nmap" title="Visit us on Facebook"> <img width="32" height="32" src="/shared/images/nst-icons.svg#facebook" alt="" aria-hidden="true"> </a> <a class="nlink" href="https://github.com/nmap/" title="Visit us on Github"> <img width="32" height="32" src="/shared/images/nst-icons.svg#github" alt="" aria-hidden="true"> </a> <a class="nlink" href="https://reddit.com/r/nmap/" title="Discuss Nmap on Reddit"> <img width="32" height="32" src="/shared/images/nst-icons.svg#reddit" alt="" aria-hidden="true"> </a> </div> </div> </footer> </div><!-- wrapper --> </body> </html> <!-- MHonArc v2.6.19 -->