Log

CVE-2021-3743 edited at 27 Aug 2021 10:08:00
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Local
Type
- Unknown
+ Information disclosure
Description
+ An out-of-bounds (OOB) memory read security issue was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check may allow a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.
References
+ https://www.openwall.com/lists/oss-security/2021/08/25/2
+ https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e78c597c3ebfd0cb329aa09a838734147e4f117
AVG-1879 edited at 27 Aug 2021 10:06:40
Issues
CVE-2020-26555
CVE-2020-26556
CVE-2020-26557
CVE-2020-26559
CVE-2020-26560
CVE-2021-3542
CVE-2021-3640
CVE-2021-3669
CVE-2021-3739
+ CVE-2021-3743
CVE-2021-31615
CVE-2021-3743 created at 27 Aug 2021 10:06:40
Severity
+ Unknown
Remote
+ Unknown
Type
+ Unknown
Description
References
Notes
AVG-2114 edited at 26 Aug 2021 15:31:09
Affected
- 2.6.0-2
+ 2.6.0-3
CVE-2021-3634 edited at 26 Aug 2021 15:28:45
Notes
Workaround
==========
The only temporary workaround is to enable key exchange algorithms with the same digest size, for example for SHA256:
+ rc = ssh_options_set(s->ssh.session, SSH_OPTIONS_KEY_EXCHANGE, "diffie-hellman-group14-sha256,curve25519-sha256,ecdh-sha2-nistp256");
- rc = ssh_options_set(s->ssh.session, SSH_OPTIONS_KEY_EXCHANGE,
- "diffie-hellman-group14-sha256,curve25519-sha256,ecdh-sha2-nistp256");
AVG-2324 edited at 26 Aug 2021 15:28:37
Severity
- Unknown
+ Medium
CVE-2021-3634 edited at 26 Aug 2021 15:28:37
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Remote
Type
- Unknown
+ Arbitrary code execution
Description
+ A security issue has been found in libssh before version 0.9.6. An attacker can request a rekey with a key exchange algorithm with a digest of a different size, causing libssh reading or writing behind the buffer limits.
References
+ https://www.libssh.org/security/advisories/CVE-2021-3634.txt
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35485
+ https://git.libssh.org/projects/libssh.git/commit/?id=d3060bc84ed4e160082e819b4d404f76df7c8063
Notes
+ Workaround
+ ==========
+
+ The only temporary workaround is to enable key exchange algorithms with the same digest size, for example for SHA256:
+
+ rc = ssh_options_set(s->ssh.session, SSH_OPTIONS_KEY_EXCHANGE,
+ "diffie-hellman-group14-sha256,curve25519-sha256,ecdh-sha2-nistp256");
AVG-2324 created at 26 Aug 2021 15:24:15
Packages
+ libssh
Issues
+ CVE-2021-3634
Status
+ Vulnerable
Severity
+ Unknown
Affected
+ 0.9.5-1
Fixed
Ticket
Advisory qualified
+ Yes
References
Notes
CVE-2021-3634 created at 26 Aug 2021 15:24:15
AVG-1920 edited at 26 Aug 2021 11:49:35
Advisory qualified
- Yes
+ No
AVG-2292 edited at 26 Aug 2021 11:49:20
Advisory qualified
- Yes
+ No
AVG-2270 edited at 26 Aug 2021 11:49:11
Advisory qualified
- Yes
+ No
AVG-2249 edited at 26 Aug 2021 11:49:05
Advisory qualified
- Yes
+ No