MontaVista CVE List and Response

MontaVista continually monitors the security community and customers for threats. We follow the community on CVE scoring (NVD) and set fix priority accordingly for affected products. Please view the following CVEs that have been remediated or are in process by clicking the CVE Year to the left or use the CVE Filters below.

For inquiries regarding Security Vulnerabilities, please see our Vulnerability Response Policy or email our PSIRT team security@mvista.com. Email messages and attachments can be encrypted using PGP and a MontaVista PSIRT PGP key, which is available for download here.

Year
Product
Score
Severity
Status
CVE
CVE Score Severity Package Description Published
CVE-2022-21505
8.4 (i)
CGX 3.1 Released
Rocky 8.4 Wont Fix
CGX 2.4 Wont Fix
CGX 4.0 Released
Rocky 8.5 Wont Fix
Centos 8.3 Wont Fix
Centos 7.9 Wont Fix
Centos 8.1 Wont Fix
Centos 7.8 Wont Fix
Centos 7.7 Wont Fix
Centos 7.6 Wont Fix
Centos 6.10 Wont Fix
Centos 7.5 Wont Fix
HIGHkernel ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. 2024-05-11
CVE-2024-24788
7.5 (i)
CGX 2.0 Not Affected
CGX 2.2 Not Affected
CGE 7.0 Not Affected
CGX 2.4 Not Affected
CGX 3.1 Not Affected
CGX 4.0 Not Affected
HIGHgo A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop. 2024-05-08
CVE-2024-4438
7.5 (i)
CGE 7.0 Under Investigation
Kubernetes 1.21.14 Under Investigation
HIGHetcd The etcd package distributed with the Red Hat OpenStack platform has an incomplete fix for CVE-2023-39325/CVE-2023-44487, known as Rapid Reset. This issue occurs because the etcd package in the Red Hat OpenStack platform is using http://golang.org/x/net/http2 instead of the one provided by Red Hat Enterprise Linux versions, meaning it should be updated at compile time instead. 2024-05-08
CVE-2024-4437
7.5 (i)
CGE 7.0 Under Investigation
Kubernetes 1.21.14 Under Investigation
HIGHetcd The etcd package distributed with the Red Hat OpenStack platform has an incomplete fix for CVE-2021-44716. This issue occurs because the etcd package in the Red Hat OpenStack platform is using http://golang.org/x/net/http2 instead of the one provided by Red Hat Enterprise Linux versions, meaning it should be updated at compile time instead. 2024-05-08
CVE-2024-4436
5.5 (i)
CGE 7.0 Under Investigation
Kubernetes 1.21.14 Under Investigation
MEDIUMetcd The etcd package distributed with the Red Hat OpenStack platform has an incomplete fix for CVE-2022-41723. This issue occurs because the etcd package in the Red Hat OpenStack platform is using http://golang.org/x/net/http2 instead of the one provided by Red Hat Enterprise Linux versions, meaning it should be updated at compile time instead. 2024-05-08
CVE-2024-4418
6.2 (i)
Centos 7.8 Out of Support Scope
Centos 8.3 Out of Support Scope
CGX 2.0 Wont Fix
CGX 2.2 Wont Fix
CGE 7.0 Wont Fix
CGX 2.4 Wont Fix
Rocky 8.5 Out of Support Scope
Rocky 8.4 Out of Support Scope
CGX 3.1 Not Affected
Centos 7.9 Under Investigation
CGX 4.0 Not Affected
Rocky 9.3 Under Investigation
Rocky 8.9 Under Investigation
CGE 6.0 Wont Fix
Rocky 9.1 Out of Support Scope
Rocky 9.2 Out of Support Scope
Rocky 8.8 Out of Support Scope
Centos 7.6 Out of Support Scope
Centos 7.7 Out of Support Scope
MEDIUMlibvirt A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it. 2024-05-08
CVE-2021-34981
7.5 (i)
CGX 3.1 Released
Centos 5.11 Out of Support Scope
CGE 6.0 Out of Support Scope
CGX 4.0 Released
Centos 6.10 Out of Support Scope
Rocky 9.1 Wont Fix
Rocky 9.2 Wont Fix
Rocky 8.8 Pending Release
Centos 7.6 Out of Support Scope
Centos 7.7 Out of Support Scope
Centos 7.8 Out of Support Scope
Centos 7.8 Pending Release
Centos 8.3 Out of Support Scope
CGX 2.0 Released
CGX 2.0 Under Investigation
CGX 2.2 Released
CGE 7.0 Out of Support Scope
CGX 2.4 Released
Rocky 8.5 Out of Support Scope
Centos 8.1 Out of Support Scope
Rocky 8.4 Out of Support Scope
Centos 7.9 Out of Support Scope
Centos 7.9 Out of Support Scope
Centos 7.9 Out of Support Scope
Rocky 9.3 Wont Fix
Rocky 8.9 Pending Release
HIGHkernel Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977. 2024-05-07
CVE-2024-34397
3.8 (i)
Rocky 9.1 Out of Support Scope
Rocky 8.5 Out of Support Scope
CGX 3.1 Out of Support Scope
Rocky 9.2 Out of Support Scope
Rocky 8.8 Out of Support Scope
Centos 7.6 Out of Support Scope
Centos 7.7 Out of Support Scope
Centos 7.8 Out of Support Scope
Centos 8.3 Out of Support Scope
CGX 2.0 Out of Support Scope
CGX 2.2 Out of Support Scope
CGE 7.0 Out of Support Scope
CGE 7.0 Out of Support Scope
CGX 2.4 Out of Support Scope
Centos 8.1 Out of Support Scope
Rocky 8.4 Out of Support Scope
Centos 7.9 Out of Support Scope
CGX 4.0 Out of Support Scope
Rocky 9.3 Out of Support Scope
Rocky 8.9 Out of Support Scope
Centos 5.11 Out of Support Scope
Centos 5.11 Out of Support Scope
CGE 6.0 Out of Support Scope
CGE 6.0 Out of Support Scope
Centos 6.10 Out of Support Scope
LOWglib An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact. 2024-05-07
CVE-2024-27982
6.1 (i)
CGE 7.0 Out of Support Scope
MEDIUMnode.js The team has identified a critical vulnerability in the http server of the most recent version of Node, where malformed headers can lead to HTTP request smuggling. Specifically, if a space is placed before a content-length header, it is not interpreted correctly, enabling attackers to smuggle in a second request within the body of the first. 2024-05-07
CVE-2024-33602
4.0 (i)
Centos 6.10 Under Investigation
Rocky 9.1 Under Investigation
Rocky 9.2 Under Investigation
Rocky 8.8 Under Investigation
Centos 7.6 Under Investigation
Centos 7.7 Under Investigation
Centos 7.8 Under Investigation
Centos 8.3 Under Investigation
CGX 2.0 Under Investigation
CGX 2.2 Under Investigation
CGX 2.2 Under Investigation
CGE 7.0 Under Investigation
CGX 2.4 Under Investigation
Rocky 8.5 Under Investigation
Centos 8.1 Under Investigation
Rocky 8.4 Under Investigation
CGX 3.1 Under Investigation
Centos 7.9 Under Investigation
CGX 4.0 Under Investigation
Rocky 9.3 Under Investigation
Rocky 8.9 Under Investigation
Centos 5.11 Under Investigation
CGE 6.0 Under Investigation
MEDIUMglibc nscd: netgroup cache assumes NSS callback uses in-buffer stringsThe Name Service Cache Daemon's (nscd) netgroup cache can corrupt memorywhen the NSS callback does not store all strings in the provided buffer.The flaw was introduced in glibc 2.15 when the cache was added to nscd.This vulnerability is only present in the nscd binary. 2024-05-06