Skip to main content
Flexible Top Header

Integrity HOTFIX-561

BlueCat is pleased to announce the following security and product release of HOTFIX-561, addressing a recent defect as well as resolving a high severity security vulnerability, continuing to deepen our commitment to improving your experience with our products. HOTFIX-561 for Address Manager v9.6.1 addresses a defect where LDAP users are unable to login after the LDAP authenticator for the user group is changed. Application of HOTFIX-561 will restore Address Manager to prior pre-v9.6.1 LDAP behavior, allowing users to login normally after the LDAP authenticator for the user group is changed. Alongside this, HOTFIX-561 resolves the following high severity security vulnerability in Address Manager v9.6.1 and DNS/DHCP Server v9.6.1. This vulnerability cannot be exploited from an external source, as it requires shell access on the appliance:   CVE-2021-42378: A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function  Attn: HOTFIX-561 is recommended only for customers experiencing the LDAP authenticator issue detailed in KI-026182, and/or customers who wish to immediately resolve security vulnerability CVE-2021-42378. HOTFIX-561 for Address Manager resolves KI-026182 and CVE-2021-42378 on Address Manager servers, while HOTFIX-561 for DNS/DHCP Server resolves only CVE-2021-42378 on DNS/DHCP Servers. Application of HOTFIX-561 to DNS/DHCP Servers is not required to resolve KI-026182. Action Recommended We recommend applying the following hotfix during a scheduled maintenance window, during non-peak times. For Address Manager, this hotfix will restart the Address Manager service (GUI and API), leading to a temporary service interruption.  For DNS/DHCP Server, applying this hotfix will restart CommandServer on the DNS/DHCP Server; however, a service interruption will not be experienced as a result. [Learn More] 

Related products:Integrity