AusCERT - Security Bulletins

Subscribe to AusCERT - Security Bulletins hírcsatorna
Latest published security bulletins. See https://www.auscert.org.au/rss/ for feed information.
Frissítve: 2 óra 5 perc
2022. szeptember 29.

ESB-2022.4856 - [Win] IBM Security Access Manager for Enterprise Single Sign-On: CVSS (Max): 5.4

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4856 WebSphere Application Server shipped with IBM Security Access Manager for Enterprise Single Sign-On is vulnerable to cross-site scripting in the Admin Console (CVE-2022-34336) 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Security Access Manager for Enterprise Single Sign-On Publisher: IBM Operating System: Windows Resolution: Patch/Upgrade CVE Names: CVE-2022-34336 Original Bulletin: https://www.ibm.com/support/pages/node/6825057 Comment: CVSS (Max): 5.4 CVE-2022-34336 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- WebSphere Application Server shipped with IBM Security Access Manager for Enterprise Single Sign-On is vulnerable to cross-site scripting in the Admin Console (CVE-2022-34336) Document Information Document number : 6825057 Modified date : 28 September 2022 Product : IBM Security Access Manager for Enterprise Single Sign-On Software version : 8.2.0, 8.2.1, 8.2.2 Operating system(s): Windows Summary IBM Security Access Manager for Enterprise Single Sign-On includes IBM WebSphere Application Server. IBM WebSphere Application Server is vulnerable to cross-site scripting in the Admin Console (CVE-2022-34336) Vulnerability Details Refer to the security bulletin(s) listed in the Remediation/Fixes section Affected Products and Versions +-----------------------+--------------+ | Affected Product(s) | Version(s) | |-----------------------+--------------| | IBM Security Access | 8.2.0, | | Manager for | 8.2.1, | | Enterprise Single- | 8.2.2 | | Sign On | | +-----------------------+--------------+ Remediation/Fixes IBM strongly encourages customers to update their systems rapidly. Workarounds and Mitigations None Change History 19 Sep 2022: Initial Publication - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUv9skNZI30y1K9AQhhUg/+JBbBEe6nGbyJKHaM6URLHpHUCWhYvswi rL6jiDhttvaueQwJgXGRkd35dnJhT1eLK4N+rKgVyxwYY0HidhTnj+DQyw3BkkQw 9KDA5t1HrBPHNIn3nocA/2W25Sw0LwH8rrwB2eik9KzytxrWGH7c9QhfEGPgs0XP X3K+LFjl2R978r3lFepoCZnEzjJdqOdySZopeS6ZA0UIhiCtbwNzhHzcNuv6lR1d TOkzTR+2YZnuz/zId2O6CgmDhlUPOW2xHgJrEuobhwUCB3JkVQfG9GWSN4FfDB95 AmzsZhZOf+FpktLCZeUbTyR5HQFnF0jYfb33sxDkPnYWRfL076bZPQZ+5Nyg5XXK TXAu4xE3c3VXulrwj3UAqvNWO2bZbTNYOLwonzJgn89+Gtt40BfHyRntrii5uWlv KR1BJVLpvWukHsWAOQqNnMbLyzmI6yO8BFpp6CUVZAYpd0sPuXQ1tLYkuoLTsnpv DxMCcqz6h9yOY6BZnpH88fDjRpdfEBQ4pgDGDQqoN7SaE2fIiAmfzU5FHP4EVLKK 3CzftAtA9Ljzt/ijRlNmYF8Mv2JnPKVB1w3g1Qo1bdeHzcSuRjBS64st42tI+0XM 3wi9fts56lI1wx6X/tx5K4sTNcAD5dqiDzfXmQN1DU+QKKfAsP34SVdh1NX62ZhB Phh0ccJdua8= =9sCF -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4855 - [Debian] wpewebkit: CVSS (Max): 8.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4855 wpewebkit security update 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: wpewebkit Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2022-32886 Original Bulletin: http://www.debian.org/security/2022/dsa-5241 Comment: CVSS (Max): 8.8 CVE-2022-32886 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-5241-1 security@debian.org https://www.debian.org/security/ Alberto Garcia September 28, 2022 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : wpewebkit CVE ID : CVE-2022-32886 The following vulnerabilities have been discovered in the WPE WebKit web engine: CVE-2022-32886 P1umer, afang5472 and xmzyshypnc discovered that processing maliciously crafted web content may lead to arbitrary code execution For the stable distribution (bullseye), this problem has been fixed in version 2.38.0-1~deb11u1. We recommend that you upgrade your wpewebkit packages. For the detailed security status of wpewebkit please refer to its security tracker page at: https://security-tracker.debian.org/tracker/wpewebkit Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEYrwugQBKzlHMYFizAAyEYu0C2AIFAmM0ErUACgkQAAyEYu0C 2AK/TA/9FNEyzGshSoog6XBZ7bQR3ATaCA1V2vUDSkv1kaq9V7nPtBLW16Kwcgxe AjFzS7BfdW8vN4tnEAx65RS6q60jlADTgXUihiDFRdeuteNXYuMUOp61EU71SKDb LmSdwfU8ule3s1UMtbSG9n7W0NvkuuB+RdZX580r7F/CFpwELQiTeGbOodVfpKfl pU9zSAiEa+hoOeFX7wQewnL60goSPfjhjGZqPR2w0cKOk+zYPYBrAYvxGN+HFpeo 7yx8y0x7RsL/UNLkObs+VWPrPb4LNN4vQck3CYAW1lY0aI2+bQ7Roo4Ax4NvPqMT tNs+72vq/j6d9fYlyVpNJcnwKUxpygqMnRxLW0C16zfqUm7/SvT1MuF9HK0O+7yM 8xGjEsVXMGPeYEGyE+tnujlHeem+YWpi3ODMCizY4bohVPJyLypc+DwABo98yP9v MrtRr94RjfMJV/Khjj0nxxpTmIMjbXBC4uA+zwFtmjZo0vOiU3NfHIbcIZpQu4RC p7olYPSltWkRFnfXPRf97BLCCPolRnTmiQGq7zeqFsxSXaLTBKGqOOiuxkyRObeU W+ybs+X5MDAmRUM93JArarjrnJVE2XvRhXIRkGPIN918lysFwbfr5HwBMCsvaS10 5z+BCqx+A1fCgIja02N2aEr3FaOCDy8I/WqoI/7FwDz/z2y8JxU= =gReZ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUv1ckNZI30y1K9AQg9mQ/9G0EmgJrY3Ne+dczl5mqEQ4e1UbzHZ5Dx Gw3N4XVI6HENv3M8TxcTBcjE8WFNzpFFlLKExd2BQtlrNAbaCuH7XJk+flehRuqO z9rpHlDuqhf5rOwZVpAp0ZVpdYtAKbWNmPTHjjR1qhA3qWBEZGDGvwc+nR0tf+3B 07nyuQ5gjeIGJQGdhsUjNWbigpCSkWWU0uOU233u5Wu7PmltSOBsMSsP+6Lkk15H ckIuQRYRRKkWvKLrWMCU3sNNgZpNewfAYyq8gsuDQFnRdmPn9i3DVRw2rdIyd8Uo 9p5WAVRn8O3fz/gHP+faL0GhM4HO0lOWIV5J31bMbxpRebqvSfDd/DkbY0FR4QH5 oErWfhxFHifzDZkYx/SnxtLjkxmoX032BdQkiGKj2zlWrcOa1Yn1d7/82WGunGQJ TwcubG4xCnSWKdkp06VJc1/KxyzNWpqz35euDaJ7PA2exRp/pGrzHXHpj8VvSu5M jZNDAAk9AlNqxx1Mu1YUYcgMuhGa2a0BS7fUJa27c5NIxDc8SwAf4kpXiDsgQAY5 Q065fnRYc5gW5Yqa2NpF1EZVqyoSP83PKqY66N9JAQxgF1oIY3AINQsyxUTB1mqO DL09Wy0e6rDpZMwr16pdv2MZFTnYUaO9irQ/yMPT2iaUPEE/v6EnivSApP4cNK5P 7nv109gDmAw= =0Dp4 -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4854 - [Debian] maven-shared-utils: CVSS (Max): 9.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4854 maven-shared-utils security update 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: maven-shared-utils Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2022-29599 Original Bulletin: http://www.debian.org/security/2022/dsa-5242 Comment: CVSS (Max): 9.8 CVE-2022-29599 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-5242-1 security@debian.org https://www.debian.org/security/ Aron Xu September 28, 2022 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : maven-shared-utils CVE ID : CVE-2022-29599 Debian Bug : 1012314 It was discovered that the Commandline class in maven-shared-utils, a collection of various utility classes for the Maven build system, can emit double-quoted strings without proper escaping, allowing shell injection attacks. For the stable distribution (bullseye), this problem has been fixed in version 3.3.0-1+deb11u1. We recommend that you upgrade your maven-shared-utils packages. For the detailed security status of maven-shared-utils please refer to its security tracker page at: https://security-tracker.debian.org/tracker/maven-shared-utils Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmM0RjVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Ro4hAAiuNu5Px8339zYifU+AiheHZcNr6WMl4hRufgbZ7qynaQlOifwYaFxbgL wf/6Xj3jpCtvAoSrLuckfAXPiOXcW9rpJeDgGLY8bsrn/d6DIjKL8ShDKWfok2re WB1iS3quaB7NXwXTHVmK6fXKQ1PdDu3AZexODMvrRSZmRwO/kVnZUZirh2TZ/JQ5 dVwe5n/8/N6nrASMMAI5ysDYaaHkIucwxPgh/jxg6A/IasQGbnzvJ7wu47bs2VT0 sgnzkndN1DNj9eP/IRW9ceOrMwUWo8l1i2Q6vufza1I+iELi8rDE0RnQgFR6g+Oh fFZ83kHJuQSGqG3ejj0jJ3P02AjPokScHTZZnAMcuHliiNQxyAIaZyBjDC9Xix9j XHJwj4zB54eEWCIDSU3rMiTYj+2zPU/TcE+Mqy4TcLZrAA/MoHyPWY4jXba3HX9S UIyczG1/J6xdKRbOEajghUw8SHdn7xce9Wgb6XGpmLutAaUjtVCs60fVSo4sBLHE q7/SksMcL4+vgnQDqS93uxa+hxiL9uZ3NT+ErvYesNnFHKz7HkI86Vluy6yk9GYo bGw4Hz8JZic9UJ/cMCV6+IQgOVfl+xo8R+kNA0BhopgV9Ixz7CdoOdFxJdN6uuZj zNGdFvp7j+j/TTIGg6uudOEhqm5DflEQE5SLSBcSpn+lvUQOM/s= =ziDo - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUvx8kNZI30y1K9AQi51xAArs1KcLDPDz49DXzzKHQgWQJMAows6qXP WNkWPTv0ZcQUa5ZZuGZvVBNJbPIxnXF7MuazBtwLkeAQaMr7ZJMkzskRdq4++nXL tpupOqPnramYCawA76pTuuOIE2ttSNCSsVxh5uHXsyXj64ENeR8iJKZup0LF2eU0 DKx9CFBIYHdG0lR6ojXhC1pVY8o7+xnittN1Cr22ubCjWvWghGToVznDPkQ+8aoA m64aS2cudp8declN21tOku9x4TfNcAMDGsQWhWFY1lmd7oaE3WgcTSThD4nlt376 4pdUE9xm7/kg+abKYtTh+fRjrBjcCyKOdItpWWLjLTUuw0oehnrc/rrIF48lrUw2 ZzCi5VcjLrWbbphlPDH2EUaG1pdh8KMoSicrNeqZGPFykbEr4EjZj3sgvCV/TGJP TQuFrLgxbBsbNixUoI3gf3e9GrzRLdalzopr5sk752Ohtr9c/b0GQz1GfwfjpOsD S65+R/dst6nJ+3c7DjjjuVGguKH7JPUczy7TOS+2PVTz+i7MgLgME/vsjTwWbZbV 7eQRea8ItnOyyZNkplpPCZupatcR7FkafvCqbCrZpbWrkREjm36a6cZeENDElZWr ER2Ebpxv03PUsjf6eSkH1d6AA8kUqxaHClKaRpnHURNCA/60CJoTemWka5u1FmnA Xv/3HcXdSng= =mht7 -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4853 - [Win][UNIX/Linux] Apache Tomcat: CVSS (Max): None

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4853 CVE-2021-43980 Apache Tomcat - Information Disclosure 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Apache Tomcat Publisher: Apache Operating System: UNIX variants (UNIX, Linux, OSX) Windows Resolution: Patch/Upgrade CVE Names: CVE-2021-43980 Original Bulletin: https://tomcat.apache.org/security-10.html Comment: CVSS (Max): None available when published - --------------------------BEGIN INCLUDED TEXT-------------------- CVE-2021-43980 Apache Tomcat - Information Disclosure Severity: High Vendor: The Apache Software Foundation Versions Affected: Apache Tomcat 10.1.0-M1 to 10.1.0-M12 Apache Tomcat 10.0.0-M1 to 10.0.18 Apache Tomcat 9.0.0-M1 to 9.0.60 Apache Tomcat 8.5.0 to 8.5.77 Description: The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client. Mitigation: Users of the affected versions should apply one of the following mitigations: - - Upgrade to Apache Tomcat 10.1.0-M14 or later once released - - Upgrade to Apache Tomcat 10.0.20 or later once released - - Upgrade to Apache Tomcat 9.0.62 or later once released - - Upgrade to Apache Tomcat 8.5.78 or later once released - - Note 10.1.0-M13, 10.0.19 and 9.0.61 were not released Credit: Thanks to Adam Thomas, Richard Hernandez and Ryan Schmitt for discovering the issue and working with the Tomcat security team to identify the root cause and appropriate fix. History: 2022-09-28 Original advisory References: [1] https://tomcat.apache.org/security-10.html [2] https://tomcat.apache.org/security-9.html [3] https://tomcat.apache.org/security-8.html - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUumckNZI30y1K9AQgs0A/6A4Nmg1mVwp6EZyJvaSA9lJ7tLchBxscz qSAm+fJMwuz4Dbw/4AxfAMzxM+AsGFXdQ1ySuXawt34CDxLWEsIIDcEq8hZz493G 4exdAtOXZEgWfUYMCO5aky0pxdIfVomYtvPuFW7Las7uRAIzNaFpYSnhn6tf86Ru 3MbiiKFO2elVxiIeNM3OfZpuZyt58MR50AKgKGVT84js0+yZpCAzcaxFtZUKLmvO qhlcubrAUKpWIhkKYocS75HhvK1X8K/ScV0c74P51Y3aoF1PhfFggMQOH6Zad7G1 r0iDCn6r61vO9C3C0YTnxra9P+aFhQhOBJ4S6beoqnX8hDyfFNVql6Jk5xjAbog4 tuehbZ04A3yk9/krtkJ+u6wyNzUKSoZZn5/cWTsEUidr38gLIdEgN11/NEQws+0k Se64RPYUHxTvSuaCVkbrdVDl5/qdQjxND2qooGvXo7CzrhkqEOV9gbRDNHdIpOHg lxWUE65FtGIhLIE/zecGlIDXti/NQBpTEhlDTi0DcdD7G0F0T3uD0v2zxl2Bk0cp iLsFMt/7ZOkvO2mburLaYKmgHARTrRe0b1u9Ajwk1zE9O6bi6ldHlJsvcaRsQxH7 wtn6m6Ikw8+rxBifGZWB90VIp6RV1AX61qOqOYfuPGgBxCd2H4KKvSEDj2nJ1EA6 5uwqxEpyOJw= =2Xnq -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4852 - [Debian] lighttpd: CVSS (Max): 7.5*

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4852 lighttpd security update 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: lighttpd Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2022-41556 CVE-2022-37797 Original Bulletin: https://www.debian.org/security/2022/dsa-5243 Comment: CVSS (Max): 7.5* CVE-2022-37797 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * Not all CVSS available when published - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-5243-1 security@debian.org https://www.debian.org/security/ Helmut Grohne September 28, 2022 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : lighttpd CVE ID : CVE-2022-37797 CVE-2022-41556 Several vulnerabilities were discovered in lighttpd, a fast webserver with minimal memory footprint. CVE-2022-37797 An invalid HTTP request (websocket handshake) may cause a NULL pointer dereference in the wstunnel module. CVE-2022-41556 A resource leak in mod_fastcgi and mod_scgi could lead to a denial of service after a large number of bad HTTP requests. For the stable distribution (bullseye), these problems have been fixed in version 1.4.59-1+deb11u2. We recommend that you upgrade your lighttpd packages. For the detailed security status of lighttpd please refer to its security tracker page at: https://security-tracker.debian.org/tracker/lighttpd Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmM0cCVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0TU5Q/9Ha7yNcTtRk9Dzmt6zwLSp2OVcyiURMKsZgWYuXjJdvA4LZI6WqU85OEn DCeXHA4YTCi6yZBsQy4HdQ0DBcxJGAKVsyMegKJew3WLxs7Cp4ik/moVkrDdaIWP 1YlzbGTgVWdWl8P1hVr8onJP5PN+6in2Ib89+CPexqxJ91uYz01gzCQuzhJk/AdE Vbchn8fNTHqpIkjeZOrm4daKoHzgX4DP4tgxVbpHstNMsojJ2p03cBFs3k3pZVD+ JNWiEFrgXU+Lj9iQi3u/LH6xYYkAFw12oK4rJnP73L9wfZa+Ak4UyFXvpSTp5vyN z6jNYPZt2fZVQjG5zaZ1NEpnUQImA0kGlttGz15/BzB03Dy+5Tr5uRL1mwH/z06y aT26ZCC8TWUhnaqN3ZrneekUmMbOaQmzR7f+z9EZcaWGKdYyyLkMx46Ws+Q4blnf TUqoN1Sphzt6JcGqTEKRe89YS+AsYP1Q1u4JUIHfPxc++0+myh6VJ0U+NR5rihgl 4qqXlhiYHTrQ748Kli2e8i3Q4osoRmdGIbLl4gttCX4r88CdKOHmCXx7GccS13Vq iYTVtX5vXnY08MhbWOJjqRqIxeN8ou26yBGtrkzixD+Dee26fZIx/Nk5LGU05Ld3 rpuAjg13gckqLn/p9hc5OLB+NNQ3YhOwXbkkmSuwNxToy/aO2q0= =usZG - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUurckNZI30y1K9AQgoxBAAo0Ozrwt3SpD/HRJqI73+uQ962tI0820J nVWfLaLApBLn7e2aVCAznkp9yRZcQgis9xO9t4IuYIXe30SD8fj1/Vo7hSV/ro5J infmU84Zy/BzR1S5q1ZCyt8BLhEmhZGrmzGKzHuc7qQT+4AIpignIV4Z1lkh+m5g zkfvRnMM1lFJkrS++z7XesvqmHwacnE+DfCZku4fCTfKLrEyavAJpiQiclFkeIFJ smfrkrgYmK+lByJSRIRJNZui8Xn5CzspElpNU48398XysN7Cu4zy2xAPTxHyg8In tzTrR2XG2Nswlp5R/K2HdAMbFfloRtCigGHKPoTSe8t7Ce12QcjywBpCD5HXbFAs 2Krk6Bu2aLiqWC7STsSPE4gtcd/ULo5blUgveIk//gw3ul9lcyxAo6uev2malFCp PrqxSjloVKs95C2U+mOBwID+IPrFq0mQxAdopVzv1BKq0UU3kYEimVZw4KxwgYBz M+QIHpLjDrZV/QCgFrskjBNx1EBlGAQcjxIf6YPCICu4daysOTWkdOAGzylyjJQT 5jxh7YMrwesVVYEgq3fWlO8udZKRKt/kfo/SZUc845A90ZfLB/bG06hmi3mvXQDZ M6JLViWdKm2XCpDnrDaH43scAUsQzheQvlhsKk8yZFoml5kGAk6JNeMi1OFYGuEP 9O3HpoyCyAs= =Fgvj -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4851 - [Debian] webkit2gtk: CVSS (Max): 8.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4851 webkit2gtk security update 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: webkit2gtk Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2022-32886 Original Bulletin: https://www.debian.org/security/2022/dsa-5240 Comment: CVSS (Max): 8.8 CVE-2022-32886 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-5240-1 security@debian.org https://www.debian.org/security/ Alberto Garcia September 28, 2022 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : webkit2gtk CVE ID : CVE-2022-32886 The following vulnerabilities have been discovered in the WebKitGTK web engine: CVE-2022-32886 P1umer, afang5472 and xmzyshypnc discovered that processing maliciously crafted web content may lead to arbitrary code execution For the stable distribution (bullseye), this problem has been fixed in version 2.38.0-1~deb11u1. We recommend that you upgrade your webkit2gtk packages. For the detailed security status of webkit2gtk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/webkit2gtk Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEYrwugQBKzlHMYFizAAyEYu0C2AIFAmM0EqUACgkQAAyEYu0C 2AIp3A/9ERFf5FnzKwtkVS5KsYQIIwIYxxK4isIg+afUExJH1fC0Ee2oBrYg856Y D5ZrwnV/iy5t/gqyY+TQhqil/GiEOqP9ErhRO0mvVMztBiEA2cUZGALxp7ENkpvT sf1AUPr7PcARHDZsUxDu6edfWTpuhyxcRr3TNq18NZLwzWAQcrkmnUCSgomf684m whtJnxWL2upj29n0K5tnvPdrFs3PeX0EFVO96UBqE+bnXf5NYBvW4mGs0ggjQ5bu Wm/g1dShiTGwBUJxCtUVyY5ZBtkdfNd1EWlnNDsI4KWuMACQ/YzK8ezmE0BzOX9g djJwXZpMgWc+XmUiaPn+Jt8Vo6pgMaf/kY9lEcEN81fti6Fv+11FCVVmzkWgQZ0/ qEHwnR41gqbQ1bmxRPVmZpu2HERDaOTWojfMgaaFdeDxkHDgrDHT6up0J9ZTwYeA MVduyf3VkHUhwxVoHEezl6Rxk1djj9r8ZaYLN4bhNkD0QbAwxOEX6LZRRb1icZ9q YRrq1AfGly9PY0KNvwS6yICOChnz4po9LZMHdSDuW7G8AJfOrtotIRbX3Fs+zGOo yYON4lBulNsHUDyGb4mJROv79Egse6LEk9VmG8w2/xpz6rr4sBxjujSXABPNVh/B rVKkRgrsX1UwQJyad1asvNVP9jHHdlmiczhpGSlvz4jC112obZM= =PJGr - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUui8kNZI30y1K9AQgNeRAAhLCcnyAL6Rf0L8grAvWiApF0c/1UBcju iGyzBjo4+HI5NICSvpD+6TPB8fTfXqPuzLnxlMeqHdy3dLUegYp5Ji+uJoDNR5D9 srtCP56QZCKBTZr6n8XCIn3KbbUZp7gfD7QfLCSFAhGu9unqprVyPBke2weRfW7r NwvW9vnRHfn5TrfJMvY2GR4CHN6sL6YeuVLhS9CQWgzVHjY5V9lHhIsRhUXE4M7I vOAC83mxPL+M/9878qwYaorga1tRZjxuDQw+eDNTyxkpAYzjAS0Fsnf2SwrfUmvL alVyJe9Je6wyhQ9Zn/tFqQVW4HZSnx5+d+h4OUIUzuDSKunee/2r4u4jaUm5mri/ qAuDoLO/Cr5M/NKQxc8lOP5f7qQuo0RxrLoPZWhlB83X3SgonnMrZkFiU8ceBk82 //P+qcNWGfroa9PLKOFiBCoakwSjZE6PkHDgL/4Ov0HxmzhGDa/dN3r6wWMdXv5Y eFf0GxeE/MVTP4DE8SnNYTwhtjVwBReh/qT1QHhXtQ8l6LHQaHmz3IhIFLT/usRE 2B1Gw2XjogzBR88fnTKTu+ybSqlPacVbUkM0SuO9lU/Sk0s6RYCrajw9H34o1N+J MAwEU0eW8tf1bb+q4z8iuejEJjxGIi9M2C8l/sSUGt72sTHuG13EnuQRF1JYDTqv Bu97M7r1imw= =LCbm -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4850 - [Win][UNIX/Linux] Drupal core: CVSS (Max): None

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4850 Drupal core - Critical - Multiple vulnerabilities - SA-CORE-2022-016 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Drupal core Publisher: Drupal Operating System: Windows UNIX variants (UNIX, Linux, OSX) Resolution: Patch/Upgrade CVE Names: CVE-2022-39261 Original Bulletin: https://www.drupal.org/sa-core-2022-016 Comment: CVSS (Max): None available when published - --------------------------BEGIN INCLUDED TEXT-------------------- Drupal core - Critical - Multiple vulnerabilities - SA-CORE-2022-016 Project: Drupal core Date: 2022-September-28 Security risk: Critical Vulnerability: Multiple vulnerabilities CVE IDs: CVE-2022-39261 Affected versions: >= 8.0.0 <9.3.22 || >= 9.4.0 <9.4.7 Description: Drupal uses the Twig third-party library for content templating and sanitization. Twig has released a security update that affects Drupal. Twig has rated the vulnerability as high severity. Drupal core's code extending Twig has also been updated to mitigate a related vulnerability. Multiple vulnerabilities are possible if an untrusted user has access to write Twig code, including potential unauthorized read access to private files, the contents of other files on the server, or database credentials. The vulnerability is mitigated by the fact that an exploit is only possible in Drupal core with a restricted access administrative permission. Additional exploit paths for the same vulnerability may exist with contributed or custom code that allows users to write Twig templates. Solution: Install the latest version: o If you are using Drupal 9.4, update to Drupal 9.4.7 . o If you are using Drupal 9.3, update to Drupal 9.3.22 . All versions of Drupal 9 prior to 9.3.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life . Drupal 7 core does not include Twig and therefore is not affected. Reported By: o Fabien Potencier o Nicolas Grekas o James Williams Fixed By: o xjm of the Drupal Security Team o Alex Pott of the Drupal Security Team o Sascha Grossenbacher o Lee Rowlands of the Drupal Security Team o Lauri Eskola , provisional member of the Drupal Security Team o Nathaniel Catchpole of the Drupal Security Team o Dave Long , provisional member of the Drupal Security Team o cilefen of the Drupal Security Team o James Williams o Benji Fisher , provisional member of the Drupal Security Team - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUufMkNZI30y1K9AQjgkA//WlueCYMZfdr70lYQsHL6XE0gtGAbGmpE jXSKLn7rhJLLf/4in2ic5kiwAdhDQSLAC7ac0PkiiFMK4KhFX4Zx9QUfTWI1ga+r gIuezK8ALQPcpN3SjOu3LNJAwE7j+FdEpvynGNUoQckETXOdIRoDwhe5lZPCFZst FlwB8eXcIKdapurabJLyW+g6DVqjpHy91Wkt4U4P37QfbyAReBwxR2cSlTE6dkDF QYKFsNkl9D8vjXNXMVdD4DhytDPnAEFgJM++jBxJYcT7c01peFbxp1ydCK1g3r1M RR2f+7T6XNO5s46CzOhS7IK35BT4WgfCYKygsOLOOBw7HcsoGWJvnD+RBPEbDMxV tmH+i5GegkMarcxIdZGVG8lpukcsOL3MhBJfi/Phw1lMgvVSQKLxf/OTDnBrNL8r ncctIEN7478Z5uuaoSSqIzxd/EaWQHz4UR6eb5EulvAzTJDj0RtYFL0HiIWBISk/ Ew0J24L/UnSGl+OvUFM6G3BJQnJhAczd+XndMHSS9nGEbtEQQUCMTacfN1jWqrqr r/REU8Qhao9H7Sr9J09C+d1+DgI3ZDhoPnMA8Y3xN7QU6ES3odGNWCeVcTvbwVXa YBc8h9eah4t7wD0mDeNbmQmZJ8auKa4AMMj6ycomxtbacJi9SngLtcZUwTtlUkai ANbYgql8Xyo= =eO5A -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4849 - [RedHat] kernel: CVSS (Max): 7.4

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4849 kernel security and bug fix update 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-1729 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:6741 Comment: CVSS (Max): 7.4 CVE-2022-1729 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2022:6741-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:6741 Issue date: 2022-09-28 CVE Names: CVE-2022-1729 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.7) - noarch, x86_64 Red Hat Enterprise Linux Server E4S (v. 7.7) - noarch, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.7) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.7) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.7) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.7) - noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Posix ACL object is leaked in several places upon setattr and fsetxattr syscalls (BZ#2106586) * netfilter: backports from upstream (BZ#2120634) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2086753 - CVE-2022-1729 kernel: race condition in perf_event_open leads to privilege escalation 6. Package List: Red Hat Enterprise Linux Server AUS (v. 7.7): Source: kernel-3.10.0-1062.70.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1062.70.1.el7.noarch.rpm kernel-doc-3.10.0-1062.70.1.el7.noarch.rpm x86_64: bpftool-3.10.0-1062.70.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debug-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm kernel-devel-3.10.0-1062.70.1.el7.x86_64.rpm kernel-headers-3.10.0-1062.70.1.el7.x86_64.rpm kernel-tools-3.10.0-1062.70.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1062.70.1.el7.x86_64.rpm perf-3.10.0-1062.70.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm python-perf-3.10.0-1062.70.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.7): Source: kernel-3.10.0-1062.70.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1062.70.1.el7.noarch.rpm kernel-doc-3.10.0-1062.70.1.el7.noarch.rpm ppc64le: bpftool-3.10.0-1062.70.1.el7.ppc64le.rpm bpftool-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-debug-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-devel-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-headers-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-tools-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-1062.70.1.el7.ppc64le.rpm perf-3.10.0-1062.70.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm python-perf-3.10.0-1062.70.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm x86_64: bpftool-3.10.0-1062.70.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debug-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm kernel-devel-3.10.0-1062.70.1.el7.x86_64.rpm kernel-headers-3.10.0-1062.70.1.el7.x86_64.rpm kernel-tools-3.10.0-1062.70.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1062.70.1.el7.x86_64.rpm perf-3.10.0-1062.70.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm python-perf-3.10.0-1062.70.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 7.7): Source: kernel-3.10.0-1062.70.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1062.70.1.el7.noarch.rpm kernel-doc-3.10.0-1062.70.1.el7.noarch.rpm x86_64: bpftool-3.10.0-1062.70.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debug-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm kernel-devel-3.10.0-1062.70.1.el7.x86_64.rpm kernel-headers-3.10.0-1062.70.1.el7.x86_64.rpm kernel-tools-3.10.0-1062.70.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1062.70.1.el7.x86_64.rpm perf-3.10.0-1062.70.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm python-perf-3.10.0-1062.70.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 7.7): x86_64: bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1062.70.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional E4S (v. 7.7): ppc64le: bpftool-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-1062.70.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1062.70.1.el7.ppc64le.rpm x86_64: bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1062.70.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 7.7): x86_64: bpftool-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.70.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1062.70.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.70.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYzSXBtzjgjWX9erEAQjKrQ//UMJzCqtbTKo49Rw2Q5bNpiBbMYIczHLu uVWQDb82h2K2Ky3qpGHMIQuhMb/pr0k+9Q+MzjEzkIEnDW4iwXvApz2snWy+jXD9 nqnsBPuQqU/4bCGIJYRw+b6/onxXUzFU58opqkoOcOR1bEpc+7VTCwGwH6KExb3s X6BQTyLmIHkcdMl6qzDtw4JqU591mDgujbxAXo/FTh2C2gIaFV1/TWHNNRe6OoDJ 1HQqthx4aWoY4rK2cHLdwuG0gdGK6QTy/lEAu0+79YiVYrBgWK5yTuyyyLGD8SXQ Fn+c4KMjIO3I1FbQwzGmYuRjrQjatJZJczRt+MLo5DxoSbraf7Y7zn3lI6VtKPX9 snqgjZ6vZ0AUkN2bMRRtiA0QRTkqy/FAr+OlSdJaLCLGXRKZfk8vh7Es4bYpO8Mx 2GzpwthdFyyWcgyoEDI6WCp4t4oaAkKZu5rLoa8563icrcTLRMAdUM4IMNuUOI1q S4ovejF2K4G7gaUS2V/i5N298+B8vr10yEtNPHiQ7SZKdjQ+SXD+fkr2Joz/GsSo ozjIYjBsi/Oglk3G7CVJPWUVWf+CsLZHg3ucSsCT2FMFkACtZLbht1wEHzg5kvWc Qj6KpVi4RJ+ZrYrMCi0EB0ejYbQrkLQpCBIRmN7zLrEyPB+qTq2yquYHffmSpdmW jfydo6q/6as= =rbbu - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUuY8kNZI30y1K9AQhCyw//bRA6oUWw4gMYk+RRGiOrrgPBmkvoORFE lQDq/S5T59h7dolcdpubFgDXc95NrrgBKfFQ9Z0RPuEtVPZ++wpz9hqfyFHrxbHW f8fooxOo/6WZcMzZ5ehN1rw5h3saGMfxS7ggciJp9IWqOk8q7mrFHdYhImNbj+U6 i9IX4IGxrTphBSwEclri/CsyzoRgBpr2yVTaFZNdJF8BLmPMYq6jGWTU1acj1cl5 7UyAyMX1OltZiacdgz+BeEgrEH4bZ6QxCt3xb3ugBZURaj5tCjVreU3qSyBMLB8l 9y2+yH5MDYo8Q89aUQGZbzsW91W9upjNs2NcspABakFS2tWRSDK3n1RdPGgcdioD blWhnQtX31W7mWk/fOcs9hgmGC/Hj22MKs2D4Ls3+q4wvr6CKi4ooJ2jEKOo+LSF PHHtH9Eo/+YV8flIVvW9av9HbB1sh2m4iKQKUfY94gf7Yj4yWBHXOKJYFt+uk+P8 qO9WjObVLBmUdVUQSNL2sIJjTwYzV/wpME+3x3UJfP8xHbz+LdUoUmCuYoL/rpDr 0VbQIQGI0AIUTEonEizrPzrRCJtaYr1iMcW62lUNjuOfhevZv9lZmi/wwjy9l40H lSG+ejOe37OBF06miZCJY3z2a40X4UzhjdlD6zuDMy/rrEAR7zkeHGCxNTFWzhBk /2jL6nB6XMY= =TSxr -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4848 - chromium: CVSS (Max): 7.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4848 chromium security update 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: chromium Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2022-3318 CVE-2022-3317 CVE-2022-3316 CVE-2022-3315 CVE-2022-3314 CVE-2022-3313 CVE-2022-3312 CVE-2022-3311 CVE-2022-3310 CVE-2022-3309 CVE-2022-3308 CVE-2022-3307 CVE-2022-3306 CVE-2022-3305 CVE-2022-3304 CVE-2022-3201 Original Bulletin: https://www.debian.org/security/2022/dsa-5224 Comment: CVSS (Max): 7.8 CVE-2022-38784 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-5244-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff September 28, 2022 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : chromium CVE ID : CVE-2022-3201 CVE-2022-3304 CVE-2022-3305 CVE-2022-3306 CVE-2022-3307 CVE-2022-3308 CVE-2022-3309 CVE-2022-3310 CVE-2022-3311 CVE-2022-3312 CVE-2022-3313 CVE-2022-3314 CVE-2022-3315 CVE-2022-3316 CVE-2022-3317 CVE-2022-3318 Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure. For the stable distribution (bullseye), these problems have been fixed in version 106.0.5249.61-1~deb11u1. We recommend that you upgrade your chromium packages. For the detailed security status of chromium please refer to its security tracker page at: https://security-tracker.debian.org/tracker/chromium Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmM0owUACgkQEMKTtsN8 TjaWvA/+JyNKGBL0rTYWnegJFXMRbVnAeppmWB5S6EkEbMIEtuAkkk493KddXPcl 614y/DNMIFkf5HrFaaIAEg4qnDSAT3tEIx39FEXamdCgeaAMGMEUb35r6Subhxoo jQxsi67aCqup+5s0Y3X7JPJE6uelTZhBfagNqEk3jTtZSSPGHOZHz4zrEXv5comS lHm+Ysnq/MwQv2gYliq3qqrNij2IRk09Plznj1fJR/BvlKOATLaP/xylzy4zzxWe j82Q60pHKhkLhwinylb0QoAVTZ6AStYVa06mXbSFLnT3D2dcFgVlL3GEwlM/fum3 nJ+9mAPS4D8/ucxqODCIQEnAySYZTLEkPxpX8lGGsgL6O0J3R74N5CY9FJPPW/Y7 ZyevWISCs96Wypr7pHL6+/DJrl5uvBL1zRM1QawmLwLRdPM11/dheWu4wh2s6HUC hnxDwoQLXx6/VqjDqXDWPaOaX/9JgRU+uxdbU3xVb+knTuOGpBeBLFlf1WUJ3wLx ooTmiL+ETg2PVS4v5ocz+2X5Z+7W0zPIvdFGyaq37CwG6jvbjQDLlvj41lqyibPH KJHBDUG0YvhsTJp2YhO0tzaHZAAg2e3a3fPS7/uEv2LmuYhCZUK+Vw2MI0z3FT6m 8Hhir/gSV5/gVHXrxRbnldxntrEqMgw480klzGb1dV+PNFvjSHA= =rNFw - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUuUckNZI30y1K9AQhKyg//ZrA/0xnlmnpicIkbMbSBBkD1BUBS0MqA +0nOKmjyPNpI9MfXtkd15ja3knDUAxYbr6mBkgGuPrh5nHwEigSUX4WkFPcVAach jQyMogaY2WJjru6ncXdEmOADrsk0VOGMHrgBDuMKyg82eoRmjpQSSzSIMWvvY8kG mk5DZGE/nfCXT1xBCTk4AHpTS+E0ppwUie5ZO4kjspkD4onBMDnR1dRYoaZTrCs+ 34gjfxduu/2a+SZ4KHlAfUgZFDZoabudXlMSSOUTfwWlMsQ1WstiRH/IvdG19GGN dGC9goy4z5inJyAkO03vnhauv9YQMBF9+yO7UvbRiH0kxACI2sbwCyZVmBe9m46r FKPsjqo9BwumXkDjuP5nuzHgudGX6Zb5zN2c33gr8sst0qS/xFNxk8Vqw+kz4qT7 SKR3luylobwdVWYXCgHvNPo1FgpuTz7y/6Lyr9FMJhWnfQWj3X/OeEVFJrOzzbH3 dprre9PnozyjnSlx7ol4BOTBF0x0znsp8T8JD/0KGc6WZE7Sb+2INbXK/q6lssOd GV4yPnLFb+oWLo2WHRTLiZ3+SsXkAzxNcX9iDyEENFwGEIQn2DiENdXxYcMqpHhj GfnYPDijIj1dkqq+0dys14bo89rgLBDpLJXkWUyAW/6xkz071Nl7XjbKaiHZ1djf K5f8HM0CJkE= =w2Kv -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4847 - [Cisco] Catalyst 9000 Family: CVSS (Max): 6.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4847 Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Information Disclosure Vulnerability 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Catalyst 9800-CL Wireless Controllers for Cloud Catalyst 9800 Embedded Wireless Controller Catalyst 9800 Series Wireless Controllers Embedded Wireless Controller on Catalyst Access Points Publisher: Cisco Systems Operating System: Cisco Resolution: Patch/Upgrade CVE Names: CVE-2022-20810 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cwlc-snmpidv-rnyyQzUZ Comment: CVSS (Max): 6.5 CVE-2022-20810 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) CVSS Source: Cisco Systems Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Information Disclosure Vulnerability Priority: Medium Advisory ID: cisco-sa-cwlc-snmpidv-rnyyQzUZ First Published: 2022 September 28 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvz99497 CVE Names: CVE-2022-20810 CWEs: CWE-202 Summary o A vulnerability in the Simple Network Management Protocol (SNMP) of Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family could allow an authenticated, remote attacker to access sensitive information. This vulnerability is due to insufficient restrictions that allow a sensitive configuration detail to be disclosed. An attacker could exploit this vulnerability by retrieving data through SNMP read-only community access. A successful exploit could allow the attacker to view Service Set Identifier (SSID) preshared keys (PSKs) that are configured on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cwlc-snmpidv-rnyyQzUZ This advisory is part of the September 2022 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Affected Products o Vulnerable Products At the time of publication, this vulnerability affected the following Cisco products if they were running a vulnerable release of Cisco IOS XE Software and had SNMP enabled: Catalyst 9800-CL Wireless Controllers for Cloud Catalyst 9800 Embedded Wireless Controller for Catalyst 9300, 9400, and 9500 Series Switches Catalyst 9800 Series Wireless Controllers Embedded Wireless Controller on Catalyst Access Points For information about which Cisco software releases are vulnerable, see the Fixed Software section of this advisory. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect the following Cisco products: IOS Software IOS XR Software Meraki products NX-OS Software Workarounds o There are no workarounds that address this vulnerability. However, administrators may enable encryption of user passwords and SSID PSKs as a mitigation with the key config-key password-encrypt and password encryption aes commands, as shown in the following example: c9800-1(config)#key config-key password-encrypt c9800-1(config)#password encryption aes Note: Once the passwords and PSKs are encrypted, there is no mechanism to decrypt them, as a security best practice. The only way to recover them would be to reconfigure them. While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Cisco IOS and IOS XE Software To help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides the Cisco Software Checker . This tool identifies any Cisco security advisories that impact a specific software release and the earliest release that fixes the vulnerabilities that are described in each advisory ("First Fixed"). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities that are described in all the advisories that the Software Checker identifies ("Combined First Fixed"). To use the tool, go to the Cisco Software Checker page and follow the instructions. Alternatively, use the following form to determine whether a release is affected by any Cisco Security Advisory. To use the form, follow these steps: 1. Choose which advisories the tool will search-only this advisory, only advisories with a Critical or High Security Impact Rating (SIR) , or all advisories. 2. Enter a release number-for example, 15.9(3)M2 or 17.3.3. 3. Click Check Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o Cisco would like to thank the external researcher who reported this vulnerability. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cwlc-snmpidv-rnyyQzUZ Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2022-SEP-28 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUszskNZI30y1K9AQi9vA/9EjwJ0IenOO7MxruzbWvTbkSMzEp5AbZr qvdnOVrep3nLAxJIoXyJvTyAW7IR16mklPqT7RvqDu5FN1qUOmSzcWuVg6Uw+O1f J631MTTMm+YFgC5azNh9SNmcbGPNR6mHux3D4xvoEZ38ItTgyaX6ZoRC5AQp0LOD SGbD+I2dWckAL/QZmP8PnW6thnAKo424tIFeQDzLQvSx6ZSYc41jw3Scm7vFTkig yxyrJaso5R6wb/4RwPsaSnhNxDcSyTUuYCWVrPSz+oRHdExmQtLctnrTlDFnmlfZ +i9HF6r5mfn0KeJwNYJ0/YACqtRsvAcxVSRPO+7TBT+f46yo+AHy19XRWEufvDo4 bRyFXKMmftK/2DcD2M+Vvzpb8jUmKh1BZY8XAKfkKP/VIyEMvIhhVFdUI4RWtknC 82tGAbVdT6i5cit5lEFH2Rp1Qg7uYS2SF2BG1hDb2sTdmClR36Ey9s+T4bQPtibY ph5zHcVO0Yqfgvzcvv1pLBpD1B2AlVuFEeR3AV4l6j3HsrL/fj1X+EZFaahn5j76 DCT6CDpfyFXgKQ5fLBiUQAfXfB6K8zsjSZxu5M5dnuTKcSw+tmuvjy0DCzIhTBQ0 +DfQjdDq7a7mEKCU3/B0/d5Kc6pTs5Vie5E+TgGfY/EWCqNo6Cp2eIGQvq/m0nyY 1TY7eZr7lA4= =N8Wi -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4846 - [Cisco] Cisco vManage: CVSS (Max): 5.3

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4846 Cisco Software-Defined Application Visibility and Control on Cisco vManage Authentication Bypass Vulnerability 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco vManage Publisher: Cisco Systems Operating System: Cisco Resolution: Patch/Upgrade CVE Names: CVE-2022-20830 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-avc-NddSGB8 Comment: CVSS (Max): 5.3 CVE-2022-20830 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) CVSS Source: Cisco Systems Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco Software-Defined Application Visibility and Control on Cisco vManage Authentication Bypass Vulnerability Priority: Medium Advisory ID: cisco-sa-sdwan-avc-NddSGB8 First Published: 2022 September 28 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvx43977 CVE Names: CVE-2022-20830 CWEs: CWE-306 Summary o A vulnerability in authentication mechanism of Cisco Software-Defined Application Visibility and Control (SD-AVC) on Cisco vManage could allow an unauthenticated, remote attacker to access the GUI of Cisco SD-AVC without authentication. This vulnerability exists because the GUI is accessible on self-managed cloud installations or local server installations of Cisco vManage. An attacker could exploit this vulnerability by accessing the exposed GUI of Cisco SD-AVC. A successful exploit could allow the attacker to view managed device names, SD-AVC logs, and SD-AVC DNS server IP addresses. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-avc-NddSGB8 Affected Products o Vulnerable Products At the time of publication, this vulnerability affected self-managed cloud installations and local server installations of Cisco vManage that have SD-AVC enabled. For information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Note: Installations of cloud-based servers that are provided fully configured by the Cisco Cloud Operations Team do not expose the SD-AVC GUI. If, at the request of the customer, the SD-AVC GUI has been exposed, that environment is affected by this vulnerability. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Workarounds o There are no workarounds that address this vulnerability. However, as a mitigation for this vulnerability, customers who have enabled the SD-AVC component can ensure that access from northbound networks to TCP port 10502 is restricted. While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, the release information in the following table (s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. The left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerability that is described in this advisory and which release included the fix for this vulnerability. Cisco vManage Release First Fixed Release 18.3 and earlier Not affected. 18.4 Migrate to a fixed release. 19.2 Migrate to a fixed release. 20.1 Migrate to a fixed release. 20.3 20.3.4.1 20.3.5 20.4 Migrate to a fixed release. 20.5 Migrate to a fixed release. 20.6 20.6.1 20.7 20.7.1 20.8 Not affected. 20.9 Not affected. Note: The vulnerability described in this advisory is associated with the vulnerability described in Cisco Security Advisory cisco-sa-sdavc-ZA5fpXX2 . Cisco recommends that administrators take into account both vulnerabilities when planning for a software upgrade. The Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory. Exploitation and Public Announcements o The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during the resolution of a Cisco TAC support case. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-avc-NddSGB8 Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2022-SEP-28 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUrrckNZI30y1K9AQg4AhAAq2xhOh0tYT0nr2dckVxIhxd3HQjaF9LF MJiVMYw2PpUPQ8EOoirKtD70mk1M1Cgsvw5NlJB21So4DxD2uathfz0xWPKzfn6N moQgK7bByyzJgPgHLTq7U4DmX+wt54KB1hmK9GXBkM2Di2Ho/sCeyu88ZCoUob8N 9QSH27WpnrawMB03vG1bcLVPFp39WF89XsAbKAUiM7IV+VAK6687yXs5I8T2At+x hUne4D9Qhy2OMFocFT6YVN7oJfDlLwmPDWde9q7E///ee2E9+4T8OucMUKxFd58w 1W58PcuK1GPfTl6cF4+D+5nMa++28O/1Oe8dbZ+deUgKP/PndSapuNcx9XfUvjWo cFDwuEQxbwcsCWbhK6uvgMD07lunALQ4U1hUUPC2Sz1HL/U+NpYj+U02DW+dd7hb Jz06qAAqs+Vv6DC3nXNhj+Zwy/ccph2P3WSkdVUGHrvLz7VEcUHId6qJzVkzPrYp IJLSe4P11l9RpqXL72+xZ5EzFrNFl4fSFczXmjgnYFDvcEHzGjfDACuYVoWw7VLk NJgEi3PDMSerpspLB7w2NtCKKYKh2oTc9/iy+aCYYslQsC68nfIFkQV6MJE8Foti Q7QkSBhM51FUTPTWY8Hmy/ESlJ0+Oi/khWCkJkX78n/8c0h+JoOdkwEQl/sB5YuP zv3SXZes4GE= =Hjwm -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4845 - [Cisco] Cisco Catalyst Switches: CVSS (Max): 4.6

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4845 Cisco IOS XE ROM Monitor Software for Catalyst Switches Information Disclosure Vulnerability 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Catalyst 3600 Series Switches Catalyst 3800 Series Switches Catalyst 9300 Series Switches Catalyst 9400 Series Switches Catalyst 9500 Series Switches Catalyst 9600 Series Switches Publisher: Cisco Systems Operating System: Cisco Resolution: Patch/Upgrade CVE Names: CVE-2022-20864 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-info-disc-nrORXjO Comment: CVSS (Max): 4.6 CVE-2022-20864 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) CVSS Source: Cisco Systems Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco IOS XE ROM Monitor Software for Catalyst Switches Information Disclosure Vulnerability Priority: Medium Advisory ID: cisco-sa-iosxe-info-disc-nrORXjO First Published: 2022 September 28 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvx64514 CSCvx88952 CSCwa53008 CSCwa58212 CVE Names: CVE-2022-20864 CWEs: CWE-538 Summary o A vulnerability in the password-recovery disable feature of Cisco IOS XE ROM Monitor (ROMMON) Software for Cisco Catalyst Switches could allow an unauthenticated, local attacker to recover the configuration or reset the enable password. This vulnerability is due to a problem with the file and boot variable permissions in ROMMON. An attacker could exploit this vulnerability by rebooting the switch into ROMMON and entering specific commands through the console. A successful exploit could allow the attacker to read any file or reset the enable password. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-info-disc-nrORXjO Affected Products o Vulnerable Products At the time of publication, this vulnerability affected the following Cisco products if they were running a vulnerable release of Cisco IOS XE ROMMON Software and had the password-recovery disable feature enabled: Catalyst 3600 Series Switches Catalyst 3800 Series Switches Catalyst 9200 Series Switches Catalyst 9300 Series Switches Catalyst 9400 Series Switches Catalyst 9500 Series Switches Catalyst 9600 Series Switches For information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Determine the Cisco IOS XE ROMMON Software Release To determine which Cisco IOS XE ROMMON Software release is running on a device, log in to the device and use the show version | include BOOTLDR CLI command. The following example shows the output of this command for a device that is running Cisco IOS XE ROMMON Software Release 17.5.1r: Switch# show version | include BOOTLDR BOOTLDR: System Bootstrap, Version 17.5.1r [FC4], RELEASE SOFTWARE (P) Determine Whether the Password-Recovery Disable Feature is Enabled To determine whether the password-recovery disable feature is enabled, log in to the device and use the show romvar | include SWITCH_DISABLE_PASSWORD_RECOVERY CLI command. The following example shows the output of a device that has the password-recovery disable feature enabled (SWITCH_DISABLE_PASSWORD_RECOVERY value is "1"): Switch# show romvar | include SWITCH_DISABLE_PASSWORD_RECOVERY SWITCH_DISABLE_PASSWORD_RECOVERY="1" If the value is "0" or the SWITCH_DISABLE_PASSWORD_RECOVERY is not shown in the show romvar CLI command, the password-recovery disable feature is not enabled. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect the following Cisco products: IOS Software IOS XR Software Meraki products NX-OS Software Workarounds o There are no workarounds that address this vulnerability. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, the release information in the following table (s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Cisco Device First Fixed Cisco IOS XE First Fixed Cisco IOS XE ROMMON Software Release Software Release Catalyst 3600 5.08 16.12.7 Series Switches Catalyst 3800 5.08 16.12.7 Series Switches Catalyst 9200 17.8.1r 17.6.3 and 17.8.1 Series Switches Catalyst 9300 17.8.1r 17.8.1 Series Switches Catalyst 9400 17.8.1r 17.8.1 Series Switches Catalyst 9500 17.8.1r 17.8.1 Series Switches Catalyst 9600 17.8.1r 17.8.1 Series Switches ROMMON software is a bootstrap program that initializes the hardware and boots Cisco IOS XE Software when a device is powered on or reloaded. ROMMON software is bundled with the Cisco IOS XE binary, which can be downloaded from the Software Center on Cisco.com. It is not available as a standalone binary. Customers who want to upgrade ROMMON to a fixed release will need to upgrade the Cisco IOS XE Software to a fixed release. On first boot, Cisco IOS XE Software will check the installed ROMMON release and upgrade it to the included release if the device is running an older release. A second reboot will be required to activate the upgraded ROMMON. The Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory. Exploitation and Public Announcements o The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during the investigation of a TAC Service Request. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-info-disc-nrORXjO Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2022-SEP-28 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUrm8kNZI30y1K9AQiX3RAAm3Rz2rGoHwEC+K90+eCmmPLCV14lp6Y3 8W4bGcyhstd5K9IEXc00ddic+0h5VTcICWDqBX9uLgZpmr0dpTYWOcbabTSdn/44 Qt2SbCPZXst4ma96IsO55ZZ9ZYahyY7EHJCINvO6T6NflhR/vhceTF5MP/DRiSy+ NrZ/2PsHSA6C2229o4V2JM/Yo8Wt8bCQCIQ9gwZVACfcdLq/BNxD3ahaURsyjWL2 tZihUFOiN4I+P2Pb0vQT+kSe2Dgg6vlcwnCdIHVy7JOp8UUAVUMZCcQu08HMWsgM nQM1ACpmXBKl4A+Y27+oVRFQlfQ5NjAnHEdpRzMTCvzWGU9pA8j/XzNOc4D98EZB 9cqlNGrijkMtEFISy48B1DaAWtKUtoQcOrt3dsnYbkZbm0RAJ1jJ9OwJd/0257On kQA+pXidDFpbiMeM/dHyX5UBckuBauX4PR+pRa7RzcYzDv8qJJcIJY1TKMcHBWH8 pK4+qrSSdEJzhF5I80INlnhAIyCgQUA+wVuCJfeJKtS26Oucu1yK5j7HUGPWVJAh jgVGlqdm17/EPvsoJV7ePFB00uKyZOIajkzlPTuu3Tfhpz6egAnVY88Yh270NrWE xQhrbzam7YzuGWRtvFZiPJb65abU/2zBFJ79K6gskMrOwUcTduNcdJ6dTsoraRGn 7BRS3bBgW7U= =LOan -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4844 - [Cisco] Catalyst 9000 Family: CVSS (Max): 8.6

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4844 Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Mobility Denial of Service Vulnerability 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Catalyst 9800-CL Wireless Controllers for Cloud Catalyst 9300,9400 Embedded Wireless Controller 9500 Series Switches Catalyst 9800 Series Wireless Controllers Publisher: Cisco Systems Operating System: Cisco Resolution: Patch/Upgrade CVE Names: CVE-2022-20856 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c9800-mob-dos-342YAc6J Comment: CVSS (Max): 8.6 CVE-2022-20856 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H) CVSS Source: Cisco Systems Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Mobility Denial of Service Vulnerability Priority: High Advisory ID: cisco-sa-c9800-mob-dos-342YAc6J First Published: 2022 September 28 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCwa92678 CVE Names: CVE-2022-20856 CWEs: CWE-664 Summary o A vulnerability in the processing of Control and Provisioning of Wireless Access Points (CAPWAP) Mobility messages in Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a logic error and improper management of resources related to the handling of CAPWAP Mobility messages. An attacker could exploit this vulnerability by sending crafted CAPWAP Mobility packets to an affected device. A successful exploit could allow the attacker to exhaust resources on the affected device. This would cause the device to reload, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c9800-mob-dos-342YAc6J This advisory is part of the September 2022 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Affected Products o Vulnerable Products This vulnerability affects the following Cisco products if they are running a vulnerable release of Cisco IOS XE Software and are part of a Mobility group (disabled by default): Catalyst 9800-CL Wireless Controllers for Cloud Catalyst 9800 Embedded Wireless Controller for Catalyst 9300, 9400, and 9500 Series Switches Catalyst 9800 Series Wireless Controllers For information about which Cisco software releases are vulnerable, see the Fixed Software section of this advisory. Determine the Device Configuration A device is affected by this vulnerability if it is part of a Mobility group. To determine whether a device is part of a Mobility group, use the command show wireless mobility summary . At the end of the output generated by this command, the Mobility peers are listed under Controllers configured in the Mobility Domain , including the current controller. If the only entry is the current device, then it is not part of a Mobility group and is not affected. If there are devices listed other than the current device, then it is part of a Mobility group and is affected. The example output below (layout changed for readability purposes) shows two devices: the device where the command was issued and its Mobility peer. Therefore, the example device is part of a Mobility group and is affected. WLC#show wireless mobility summary Mobility Summary Wireless Management VLAN: 999 Wireless Management IP Address: 9.9.9.9 Wireless Management IPv6 Address: Mobility Control Message DSCP Value: 48 Mobility High Cipher : False Mobility DTLS Supported Ciphers: TLS_ECDHE_RSA_AES128_GCM_SHA256, TLS_RSA_AES256_GCM_SHA384, TLS_RSA_AES128_CBC_SHA Mobility Keepalive Interval/Count: 10/3 Mobility Group Name: default Mobility Multicast Ipv4 address: 0.0.0.0 Mobility Multicast Ipv6 address: :: Mobility MAC Address: 001e.ffff.ffff Mobility Domain Identifier: 0x34ac Controllers configured in the Mobility Domain: IP Public MAC Address Group Multicast Multicast Status PMTU Ip Name IPv4 IPv6 9.9.9.9 N/A 001e.ffff.ffff default 0.0.0.0 :: N/A N/A 9.9.9.10 9.9.9.10 001e.ffff.fffe default 0.0.0.0 :: Up 1385 Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect the following Cisco products: Embedded Wireless Controller on Catalyst Access Points IOS Software IOS XR Software Meraki products NX-OS Software Wireless LAN Controller (WLC) AireOS Software Indicators of Compromise o The Cisco Security Indicators of Compromise Reference Guide lists commonly observed IoCs, which can help identify devices that may have been impacted by the vulnerability disclosed in this Cisco security advisory. Exploitation of this vulnerability could cause a crash of the mobilityd process on an affected device. When a device has experienced a crash of the mobilityd process, the following messages may be seen in the crash log bundle: Feb 15 19:15:43.331: %ID_MANAGER-3-INVALID_ID: Chassis 1 R0/0: mobilityd: bad id in id_get (Out of IDs!) (id: 0x00000000) Workarounds o There are no workarounds that address this vulnerability. Fixed Software o Cisco has released free software updates that address the vulnerability described in this advisory. Customers with service contracts that entitle them to regular software updates should obtain security fixes through their usual update channels. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. The Cisco Support and Downloads page on Cisco.com provides information about licensing and downloads. This page can also display customer device support coverage for customers who use the My Devices tool. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c /en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Cisco IOS and IOS XE Software To help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides the Cisco Software Checker . This tool identifies any Cisco security advisories that impact a specific software release and the earliest release that fixes the vulnerabilities that are described in each advisory ("First Fixed"). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities that are described in all the advisories that the Software Checker identifies ("Combined First Fixed"). To use the tool, go to the Cisco Software Checker page and follow the instructions. Alternatively, use the following form to determine whether a release is affected by any Cisco Security Advisory. To use the form, follow these steps: 1. Choose which advisories the tool will search-only this advisory, only advisories with a Critical or High Security Impact Rating (SIR) , or all advisories. 2. Enter a release number-for example, 15.9(3)M2 or 17.3.3. 3. Click Check Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during the resolution of a Cisco TAC support case. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c9800-mob-dos-342YAc6J Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2022-SEP-28 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUrhskNZI30y1K9AQg09BAAqv66Pa7Qr4hf2acFXjNSL5j3pdDPOx+p nwCDI+shn87ub7TgxZ9ZtEKvaFO0CE6ndok/z52rJQu9QgQU9wvqeXrVCmFxHKwF +rqRhr0jEX2QgAdICz/1vN/d+mCw2R2FE+VgHeL9U6L9RSnHiloJY81jsG08wo67 kxmcCUPOUV5/WzCabTrsq628bfRXjefjOrPCGMxec8ihXpzRNNmILOddVZFO/O3A z9Z98Pvqs77FvqksLEPUNyGvgtMgq1T1Ak869ZAwCO6Vm4w+PlITsQlIzH7SljOX lSaIpquqqyGnF5SEPdGKDITT1401EpexxX3253PqVTNASN6NqJnMmgy1ohJs+BE7 0RrcGuctjSXmREgqUOWcBj76LtQogsdJiLrp22+aY1Mcly0cREvN4LkUyHfC5MyK 9NFGpbEG3vPcT/5sEMFlegLHMMwjrj7cVcQYl+VOjjRj7xOMrIy0fpDsl8ZxPh/L yEpEFjdQ4OOhl2eVzhKHic5jhmXrHsaYJWiKdkvQj8Zw9DtHakcCKOmg6looWfmk mwk4fbV8BqQOetz4Mj89UYRhDRI4ZOdbYu4ystvYsrymjXSiXiRVjMgVOENndmqb qNpIYwwRlpZdwOpGEwnDCg3uzPNFNRZ01XWGnUtWEFJO+cADb+USl3reJPFB4vvv IRvNDIt+ZIc= =XzNQ -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4843 - [Cisco] Catalyst 9000 Family: CVSS (Max): 8.6

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4843 Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family DHCP Processing Denial of Service Vulnerability 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Catalyst 9800-CL Wireless Controllers for Cloud Catalyst 9300,9400 Embedded Wireless Controller 9500 Series Switches Catalyst 9800 Series Wireless Controllers Publisher: Cisco Systems Operating System: Cisco Resolution: Patch/Upgrade CVE Names: CVE-2022-20847 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-dhcp-dos-76pCjPxK Comment: CVSS (Max): 8.6 CVE-2022-20847 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H) CVSS Source: Cisco Systems Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family DHCP Processing Denial of Service Vulnerability Priority: High Advisory ID: cisco-sa-wlc-dhcp-dos-76pCjPxK First Published: 2022 September 28 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvz97985 CVE Names: CVE-2022-20847 CWEs: CWE-399 Summary o A vulnerability in the DHCP processing functionality of Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to the improper processing of DHCP messages. An attacker could exploit this vulnerability by sending malicious DHCP messages to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-dhcp-dos-76pCjPxK This advisory is part of the September 2022 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Affected Products o Vulnerable Products This vulnerability affects the following Cisco products if they are running a vulnerable release of Cisco IOS XE Software and they have the DHCP TLV caching feature enabled: Catalyst 9800-CL Wireless Controllers for Cloud Catalyst 9800 Embedded Wireless Controllers for Catalyst 9300, 9400, and 9500 Series Switches Catalyst 9800 Series Wireless Controllers Embedded Wireless Controllers on Catalyst Access Points Note: The DHCP TLV caching feature is not enabled by default. For information about which Cisco software releases are vulnerable, see the Fixed Software section of this advisory. Determine Whether DHCP TLV Caching is Enabled To determine whether DHCP TLV caching is enabled, check the settings in the device web-based management interface using the following steps: 1. Choose Configuration > Tags & Profiles > Policy . 2. Click the appropriate profile name. 3. Choose Access Policies > DHCP TLV Caching . Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect the following Cisco products: IOS Software IOS XR Software Meraki products NX-OS Software Wireless LAN Controller (WLC) AireOS Software Workarounds o There are no workarounds that address this vulnerability. Fixed Software o Cisco has released free software updates that address the vulnerability described in this advisory. Customers with service contracts that entitle them to regular software updates should obtain security fixes through their usual update channels. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. The Cisco Support and Downloads page on Cisco.com provides information about licensing and downloads. This page can also display customer device support coverage for customers who use the My Devices tool. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c /en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Cisco IOS and IOS XE Software To help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides the Cisco Software Checker . This tool identifies any Cisco security advisories that impact a specific software release and the earliest release that fixes the vulnerabilities that are described in each advisory ("First Fixed"). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities that are described in all the advisories that the Software Checker identifies ("Combined First Fixed"). To use the tool, go to the Cisco Software Checker page and follow the instructions. Alternatively, use the following form to determine whether a release is affected by any Cisco Security Advisory. To use the form, follow these steps: 1. Choose which advisories the tool will search-only this advisory, only advisories with a Critical or High Security Impact Rating (SIR) , or all advisories. 2. Enter a release number-for example, 15.9(3)M2 or 17.3.3. 3. Click Check Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during the resolution of a Cisco TAC support case. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-dhcp-dos-76pCjPxK Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2022-SEP-28 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUrbskNZI30y1K9AQgfKA//a0sb7byRrPRx3TxSs3a1VdcvaprQZFZh /3c3XTWP3xwvmz1LjPXEjmIH9tqxMHvq5XqlTz3/KC+/PrusUjriq4eK4dvOmj9W QpWpkl3vQlwDt8lP5sFAtI/c8qhYIpgoX7gjoCoQd0Mmlww+OkE/9nHlBLPT79HK raU69S54diTRZ901z+C6OW5b2Qvf6D3GdnkgpuW4U5e6OgJT3+nxHQuRx3MtK1Ml nbOC54rig2D70evDJqRD8GUSIkNOHE2sc4lB5xXuuRvqbp+I35HgTOM1VOpSScPo NTE5odaVTZjkEdMYVcT8ZykGQC++qm5mtn1yzudN0iYYTyjiPw2ItOkluK/AcTi0 Fhlhys7VhFRetk5ae1T9rj467PhAgm1AwN6cpoDpoEHPaJ45P2pdXPFgulDzWys9 I7szQb+IJzZxR2h1naQUnXyEBxI9Euf1Og7+q+MNMpqekcr5oKIUHjSjJjWHZx6l uFTjFUCg3qMcnEY0OjUHu+m6IjN9lHAwbMDLKyCP2YJjbcquG+x3BpOvJZ7GZFgz yGdEheWFZ3Zd79+rHI85PvalwIFHyamiqvy2ROKXV843P8FvLLRGidL/jYd1qB50 wV/yG5Q0Pwj8DnPVtsuu6VSIcftyOPPgcGK9SVh1SZiWFsAxDU6HJu1jK97nuKIy hRHFGzjtUFg= =sW2D -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4842 - [Cisco] Cisco SD-WAN products: CVSS (Max): 5.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4842 Cisco SD-WAN Arbitrary File Deletion Vulnerability 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Standalone IOS XE SD-WAN Software SD-WAN vBond Orchestrator Software SD-WAN vEdge Routers SD-WAN vManage Software SD-WAN vSmart Controller Software Publisher: Cisco Systems Operating System: Cisco Resolution: Patch/Upgrade CVE Names: CVE-2022-20850 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arb-file-delete-VB2rVcQv Comment: CVSS (Max): 5.5 CVE-2022-20850 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) CVSS Source: Cisco Systems Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco SD-WAN Arbitrary File Deletion Vulnerability Priority: Medium Advisory ID: cisco-sa-arb-file-delete-VB2rVcQv First Published: 2022 September 28 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvm25943 CVE Names: CVE-2022-20850 CWEs: CWE-22 Summary o A vulnerability in the CLI of stand-alone Cisco IOS XE SD-WAN Software and Cisco SD-WAN Software could allow an authenticated, local attacker to delete arbitrary files from the file system of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary file path information when using commands in the CLI of an affected device. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arb-file-delete-VB2rVcQv Affected Products o Vulnerable Products At the time of publication, this vulnerability affected the following Cisco products: Standalone IOS XE SD-WAN Software SD-WAN vBond Orchestrator Software SD-WAN vEdge Routers SD-WAN vManage Software SD-WAN vSmart Controller Software For information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Note: The standalone Cisco IOS XE SD-WAN release images are separate from the universal Cisco IOS XE Software releases. The SD-WAN feature set was first integrated into the universal Cisco IOS XE Software releases starting with IOS XE Software Release 17.2.1r. For additional information, see the Install and Upgrade Cisco IOS XE Release 17.2.1r and Later chapter of the Cisco SD-WAN Getting Started Guide . Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, the release information in the following table (s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. The left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerability that is described in this advisory and which release included the fix for this vulnerability. Cisco Standalone IOS XE SD-WAN Releases First Fixed Release 16.9 Migrate to a fixed release. 16.10 16.10.1 16.11 Not affected. 16.12 Not affected. Cisco SD-WAN Software Releases First Fixed Release 18.3 and earlier Migrate to a fixed release. 18.4 18.4.5 19.2 Not affected. 20.3 Not affected. 20.6 Not affected. 20.9 Not affected. The Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory. Exploitation and Public Announcements o The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during internal security testing by James Spadaro of the Cisco Advanced Security Initiatives Group (ASIG). Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arb-file-delete-VB2rVcQv Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2022-SEP-28 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUrPMkNZI30y1K9AQj6URAAmuqm6Vlw/QhVDm+pXqjlWQ0PIlycPT53 I7EYkrkupP9F4VOhqiN4iaYWnt3uFQjIw5sZBxX/ssngafsxFVl3eUZev67Xvgm/ YOi7JemX7sMY6mYjSaQl70lEm+OgEVfQEt3lD5FHegT4qHY3ijGPP40EUCOubma3 Et0YoHwzyWzPFW1xztIsZCCL+UZgfKpAK8DRRU2PuV0FmzUTQyMsxiHAJ7bsEn3g p6NhnWAUMQ9Rn4ywEZVDDyuxp/ncWgE9Xj7qRQRKvIKbyecw/mJDTWQKc0MoPPf7 f87O3VcO8hO+5sRLBMFSj6EV73c6FSdrnWhaq6IWxIDMjYRerCvzM2N9OB7WLps5 LLTbdk/l301OrwXAoVQz3/XaM2x8jQTRiM9swtQNPkstzBpoW5B8t3yStq3HZ2pE OmN20bWMad3iwWrnSHLMNOeoIhfAiuoeerm+GdLe7QdbYIXMYo5NafCjeEgb7rCl g1DC9WC0ZcqKKqnAP+UiGIdJwiWdsH8b7ACvwITxy9Ls1/xw1iSD7K9hO2qtJtBG q1AGKyLyvKoX6dl3FHrhKN+vCvH31keFW6Y6E9DtrXh0Veq2JcwBMHtbRub4rGZF DhTN3w7p/TVxtL3esLtuW3a1xom3Kiz8XCaT0RbxBK9XWALSjxUUpj2pwqc9zYx1 4PJeutbGJKw= =75gM -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4841 - [Win][Linux][IBM i][AIX][Mac] WebSphere Application Server: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4841 Security Bulletin: IBM WebSphere Application Server Liberty is vulnerable to a Denial of Service due to Neko HTML (CVE-2022-24839) 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: WebSphere Application Server Publisher: IBM Operating System: AIX IBM i Linux variants Windows macOS z/OS Resolution: Patch/Upgrade CVE Names: CVE-2022-24839 Original Bulletin: https://www.ibm.com/support/pages/node/6824871 Comment: CVSS (Max): 7.5 CVE-2022-24839 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: IBM Calculator: https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- IBM WebSphere Application Server Liberty is vulnerable to a Denial of Service due to Neko HTML (CVE-2022-24839) Document Information Document number : 6824871 Modified date : 28 September 2022 Product : WebSphere Application Server Component : Liberty Software version : Liberty Operating system(s): AIX IBM i Linux Windows z/OS Mac OS Edition : Liberty Summary There is a vulnerability in the Neko HTML library used by IBM WebSphere Application Server Liberty with the openid-2.0 feature enabled. This has been addressed. Vulnerability Details CVEID: CVE-2022-24839 DESCRIPTION: Sparkle Motion Nokogiri is vulnerable to a denial of service, caused by a java.lang.OutOfMemoryError exception when parsing ill-formed HTML markup in the fork of org.cyberneko.html. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a denial of service condition. CVSS Base score: 7.5 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 224089 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Affected Products and Versions +----------------------------------------+--------------------+ |Affected Product(s) |Version(s) | +----------------------------------------+--------------------+ |IBM WebSphere Application Server Liberty|17.0.0.3 - 22.0.0.10| +----------------------------------------+--------------------+ Remediation/Fixes IBM strongly recommends addressing the vulnerability now by applying a currently available interim fix or fix pack that contains the APAR PH48810 . To determine if a feature is enabled for IBM WebSphere Application Server Liberty, refer to How to determine if Liberty is using a specific feature . For IBM WebSphere Application Server Liberty 17.0.0.3 - 22.0.0.10 using the openid-2.0 feature(s): . Upgrade to minimal fix pack levels as required by interim fix and then apply Interim Fix PH48810 - --OR-- . Apply Liberty Fix Pack 22.0.0.11 or later (targeted availability 4Q2022). Additional interim fixes may be available and linked off the interim fix download page. Workarounds and Mitigations None To determine if a feature is enabled for IBM WebSphere Application Server Liberty, refer to How to determine if Liberty is using a specific feature . Change History 28 Sep 2022: Initial Publication - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUj4skNZI30y1K9AQjlBA/+LFHC4KEULEYBQ2lzA3iBFEW28Z7Jp9rK E4t21EbJfbVOieWRtxKhuO0omknVPbS+DO30NjYBDny/+tE7fhvJM/RT9WP1/ltz aOapPPn0wabXivd6Afa+rzMNLStE3BiMksduG5bUxqvGxTWXXvQRTwKbfAmRRZTx 7RnZFuq9KRdrZ8bpaXp0+EyK47e02JoJZkMAnDYZ233WI+bkOepLdVkLmaVuMQgX N93Ob3Wl0tSgHyho9Dpb8iAB3y+4Qe9ivrsXkEm2xjYMyAAEFkyC/IpWrWgBV+ue iSC4HVfHSp2SsFtXjTdbQpk8xP5wvMe7sbYvK420GJYwtM8rtvWHytihdWFr8jdO b9zUmnDFc0QUfQiL/vIwfFbCerktrpZqwjzm5cZI6QNfEoFxDssH/5jSJThElROJ TP4ZlKkOxMgzighYM38wosJPi6SHyjSqLGMwCxO+N8uOI4ezXs2joBjRcNFRIF6r jr2zrXJEC8wYLeY8BvIIUDz+0gH+9b+fqEDQykow0yRQUhV6nkH8Kr7JkA6fMmFJ nZciWo56CTtDortszEJiEt/0VsGbn6QPjbSe7wZ4xqGZgbExyCcHKa9pjRD2YG/Y Y2lL6oiL7pPPoyyVeZyJ/uHCKViX9Auyse+XpiXLm8EFN7rTdBlyveCLRadqGQE3 AHsSpTDgQk4= =9wQC -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4840 - [Ubuntu] linux kernel (GCP): CVSS (Max): 8.2

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4840 USN-5647-1: Linux kernel (GCP) vulnerabilities 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: linux kernel (GCP) Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2022-36946 CVE-2022-32296 CVE-2022-2503 CVE-2022-1729 CVE-2022-1012 CVE-2021-33655 Original Bulletin: https://ubuntu.com/security/notices/USN-5647-1 Comment: CVSS (Max): 8.2 CVE-2022-1012 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H) CVSS Source: NVD, [Red Hat] Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- USN-5647-1: Linux kernel (GCP) vulnerabilities 28 September 2022 Several security issues were fixed in the Linux kernel. Releases o Ubuntu 20.04 LTS Packages o linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems Details It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. ( CVE-2021-33655 ) Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information. ( CVE-2022-1012 , CVE-2022-32296 ) Norbert Slusarek discovered that a race condition existed in the perf subsystem in the Linux kernel, resulting in a use-after-free vulnerability. A privileged local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. ( CVE-2022-1729 ) It was discovered that the device-mapper verity (dm-verity) driver in the Linux kernel did not properly verify targets being loaded into the device- mapper table. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. ( CVE-2022-2503 ) Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter subsystem in the Linux kernel did not properly handle rules that truncated packets below the packet header size. When such rules are in place, a remote attacker could possibly use this to cause a denial of service (system crash). ( CVE-2022-36946 ) Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 o linux-image-gcp-lts-20.04 - 5.4.0.1089.94 o linux-image-5.4.0-1089-gcp - 5.4.0-1089.97 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References o CVE-2022-36946 o CVE-2022-32296 o CVE-2021-33655 o CVE-2022-1012 o CVE-2022-2503 o CVE-2022-1729 Related notices o USN-5580-1 : linux-headers-aws, linux-tools-aws, linux-modules-extra-aws, linux-headers-4.4.0-1150-aws, linux-aws-tools-4.4.0-1150, linux-buildinfo-4.4.0-1150-aws, linux-modules-4.4.0-1150-aws, linux-aws-headers-4.4.0-1150, linux-image-aws, linux-modules-extra-4.4.0-1150-aws, linux-aws-cloud-tools-4.4.0-1150, linux-cloud-tools-4.4.0-1150-aws, linux-image-4.4.0-1150-aws, linux-aws, linux-tools-4.4.0-1150-aws o USN-5590-1 : linux-headers-oem-20.04d, linux-modules-5.14.0-1050-oem, linux-tools-oem-20.04d, linux-headers-oem-20.04c, linux-oem-20.04c, linux-image-unsigned-5.14.0-1050-oem, linux-tools-oem-20.04b, linux-modules-iwlwifi-oem-20.04, linux-image-5.14.0-1050-oem, linux-tools-5.14.0-1050-oem, linux-oem-20.04, linux-oem-5.14-tools-host, linux-image-oem-20.04c, linux-tools-oem-20.04c, linux-image-oem-20.04d, linux-tools-oem-20.04, linux-modules-iwlwifi-oem-20.04d, linux-buildinfo-5.14.0-1050-oem, linux-oem-20.04d, linux-oem-5.14-tools-5.14.0-1050, linux-oem-5.14-headers-5.14.0-1050, linux-headers-oem-20.04, linux-headers-5.14.0-1050-oem, linux-image-oem-20.04, linux-headers-oem-20.04b, linux-modules-iwlwifi-5.14.0-1050-oem, linux-oem-5.14, linux-image-oem-20.04b, linux-oem-20.04b o USN-5621-1 : linux-modules-4.15.0-193-generic-lpae, linux-libc-dev, linux-signed-azure-lts-18.04, linux-image-virtual-hwe-16.04, linux-oracle, linux-tools-generic-lpae, linux-image-unsigned-4.15.0-1106-oracle, linux-lowlatency-hwe-16.04, linux-buildinfo-4.15.0-1151-azure, linux-generic, linux-oracle-headers-4.15.0-1106, linux-headers-lowlatency-hwe-16.04-edge, linux-virtual, linux-image-generic-lpae-hwe-16.04, linux-tools-generic, linux-virtual-hwe-16.04-edge, linux-modules-4.15.0-1141-aws, linux-snapdragon-headers-4.15.0-1137, linux-crashdump, linux-dell300x-headers-4.15.0-1053, linux-headers-oracle-lts-18.04, linux-modules-4.15.0-1106-oracle, linux-image-virtual-hwe-16.04-edge, linux-tools-host, linux-headers-4.15.0-193, linux-cloud-tools-lowlatency, linux-lowlatency, linux-oracle-lts-18.04, linux-headers-gcp, linux-cloud-tools-virtual-hwe-16.04, linux-modules-extra-4.15.0-1136-gcp, linux-image-oracle, linux-headers-generic-lpae-hwe-16.04, linux-gcp-4.15-tools-4.15.0-1136, linux-cloud-tools-lowlatency-hwe-16.04, linux-image-4.15.0-1151-azure, linux-image-gcp-lts-18.04, linux-buildinfo-4.15.0-193-generic-lpae, linux-buildinfo-4.15.0-1106-oracle, linux-dell300x, linux-buildinfo-4.15.0-1119-raspi2, linux-aws-tools-4.15.0-1141, linux-aws-edge, linux-cloud-tools-4.15.0-193-lowlatency, linux-tools-gke, linux-tools-kvm, linux, linux-headers-4.15.0-193-generic, linux-tools-4.15.0-1151-azure, linux-kvm-headers-4.15.0-1127, linux-signed-oracle, linux-cloud-tools-4.15.0-193, linux-azure-lts-18.04, linux-headers-4.15.0-1151-azure, linux-headers-virtual-hwe-16.04, linux-image-4.15.0-193-generic-lpae, linux-buildinfo-4.15.0-1137-snapdragon, linux-headers-oem, linux-image-4.15.0-1141-aws, linux-source, linux-gcp-lts-18.04, linux-modules-4.15.0-1119-raspi2, linux-modules-extra-azure-lts-18.04, linux-modules-extra-4.15.0-1151-azure, linux-hwe-cloud-tools-4.15.0-193, linux-cloud-tools-lowlatency-hwe-16.04-edge, linux-signed-generic-hwe-16.04-edge, linux-signed-lowlatency-hwe-16.04-edge, linux-headers-gcp-lts-18.04, linux-headers-aws-lts-18.04, linux-image-azure-lts-18.04, linux-image-generic-lpae-hwe-16.04-edge, linux-tools-4.15.0-1127-kvm, linux-modules-4.15.0-1151-azure, linux-headers-4.15.0-193-generic-lpae, linux-headers-gke, linux-cloud-tools-common, linux-tools-gcp, linux-image-unsigned-4.15.0-193-lowlatency, linux-headers-4.15.0-1141-aws, linux-signed-oracle-lts-18.04, linux-gcp, linux-signed-generic, linux-headers-generic-lpae-hwe-16.04-edge, linux-image-oracle-lts-18.04, linux-gcp-4.15-headers-4.15.0-1136, linux-gke, linux-tools-dell300x, linux-image-unsigned-4.15.0-1151-azure, linux-buildinfo-4.15.0-1141-aws, linux-aws-lts-18.04, linux-tools-virtual-hwe-16.04, linux-buildinfo-4.15.0-1136-gcp, linux-modules-4.15.0-1127-kvm, linux-tools-4.15.0-1053-dell300x, linux-image-generic-hwe-16.04-edge, linux-hwe, linux-image-4.15.0-1053-dell300x, linux-headers-generic-hwe-16.04, linux-raspi2-tools-4.15.0-1119, linux-signed-lowlatency-hwe-16.04, linux-headers-oracle, linux-snapdragon-tools-4.15.0-1137, linux-tools-common, linux-tools-4.15.0-193, linux-virtual-hwe-16.04, linux-aws, linux-signed-image-generic-hwe-16.04-edge, linux-oem, linux-tools-4.15.0-1137-snapdragon, linux-image-kvm, linux-modules-4.15.0-193-lowlatency, linux-kvm-tools-4.15.0-1127, linux-modules-4.15.0-1137-snapdragon, linux-headers-4.15.0-1119-raspi2, linux-headers-dell300x, linux-image-extra-virtual-hwe-16.04, linux-image-generic, linux-tools-4.15.0-193-generic, linux-headers-generic-hwe-16.04-edge, linux-tools-generic-lpae-hwe-16.04-edge, linux-image-lowlatency, linux-azure-4.15-cloud-tools-4.15.0-1151, linux-modules-extra-4.15.0-1141-aws, linux-image-extra-virtual, linux-headers-4.15.0-1137-snapdragon, linux-buildinfo-4.15.0-193-generic, linux-image-generic-lpae, linux-tools-generic-lpae-hwe-16.04, linux-oracle-tools-4.15.0-1106, linux-raspi2-headers-4.15.0-1119, linux-cloud-tools-4.15.0-193-generic, linux-generic-hwe-16.04-edge, linux-tools-4.15.0-193-lowlatency, linux-generic-lpae, linux-modules-extra-gcp-lts-18.04, linux-signed-image-azure-lts-18.04, linux-tools-snapdragon, linux-cloud-tools-virtual-hwe-16.04-edge, linux-cloud-tools-azure-lts-18.04, linux-lowlatency-hwe-16.04-edge, linux-image-unsigned-4.15.0-1136-gcp, linux-signed-generic-hwe-16.04, linux-dell300x-tools-4.15.0-1053, linux-hwe-tools-4.15.0-193, linux-tools-4.15.0-1119-raspi2, linux-tools-lowlatency-hwe-16.04-edge, linux-tools-4.15.0-1106-oracle, linux-headers-kvm, linux-image-gcp, linux-headers-virtual, linux-cloud-tools-generic-hwe-16.04, linux-image-4.15.0-1119-raspi2, linux-cloud-tools-generic, linux-tools-gcp-lts-18.04, linux-signed-image-lowlatency-hwe-16.04, linux-signed-image-generic-hwe-16.04, linux-tools-generic-hwe-16.04, linux-tools-lowlatency, linux-buildinfo-4.15.0-193-lowlatency, linux-azure-4.15-headers-4.15.0-1151, linux-cloud-tools-4.15.0-1151-azure, linux-snapdragon, linux-headers-aws-hwe, linux-image-virtual, linux-modules-extra-4.15.0-1106-oracle, linux-aws-headers-4.15.0-1141, linux-aws-cloud-tools-4.15.0-1141, linux-image-extra-virtual-hwe-16.04-edge, linux-generic-hwe-16.04, linux-image-4.15.0-193-generic, linux-cloud-tools-4.15.0-1141-aws, linux-modules-extra-aws-lts-18.04, linux-image-lowlatency-hwe-16.04, linux-image-unsigned-4.15.0-193-generic, linux-headers-4.15.0-193-lowlatency, linux-headers-4.15.0-1127-kvm, linux-tools-generic-hwe-16.04-edge, linux-tools-raspi2, linux-headers-generic-lpae, linux-headers-generic, linux-gcp-4.15, linux-modules-extra-aws-hwe, linux-image-snapdragon, linux-tools-lowlatency-hwe-16.04, linux-headers-4.15.0-1136-gcp, linux-image-lowlatency-hwe-16.04-edge, linux-generic-lpae-hwe-16.04, linux-source-4.15.0, linux-headers-lowlatency, linux-signed-image-generic, linux-image-generic-hwe-16.04, linux-aws-hwe-tools-4.15.0-1141, linux-headers-lowlatency-hwe-16.04, linux-tools-aws-lts-18.04, linux-image-gke, linux-headers-4.15.0-1106-oracle, linux-modules-extra-4.15.0-193-generic, linux-image-aws-lts-18.04, linux-image-raspi2, linux-tools-virtual, linux-signed-image-oracle-lts-18.04, linux-signed-oem, linux-headers-virtual-hwe-16.04-edge, linux-gcp-headers-4.15.0-1136, linux-image-dell300x, linux-image-4.15.0-1137-snapdragon, linux-raspi2, linux-tools-4.15.0-193-generic-lpae, linux-tools-oracle, linux-modules-4.15.0-1136-gcp, linux-azure-4.15-tools-4.15.0-1151, linux-modules-extra-gke, linux-tools-4.15.0-1136-gcp, linux-tools-oracle-lts-18.04, linux-tools-virtual-hwe-16.04-edge, linux-aws-hwe, linux-image-4.15.0-1136-gcp, linux-modules-4.15.0-1053-dell300x, linux-tools-aws-hwe, linux-image-4.15.0-1106-oracle, linux-kvm, linux-signed-image-oracle, linux-image-4.15.0-193-lowlatency, linux-cloud-tools-virtual, linux-image-unsigned-4.15.0-1053-dell300x, linux-signed-image-oem, linux-headers-4.15.0-1053-dell300x, linux-signed-lowlatency, linux-headers-azure-lts-18.04, linux-doc, linux-azure-4.15, linux-signed-image-lowlatency-hwe-16.04-edge, linux-gcp-tools-4.15.0-1136, linux-tools-4.15.0-1141-aws, linux-headers-snapdragon, linux-cloud-tools-generic-hwe-16.04-edge, linux-modules-extra-gcp, linux-tools-oem, linux-buildinfo-4.15.0-1053-dell300x, linux-generic-lpae-hwe-16.04-edge, linux-image-4.15.0-1127-kvm, linux-aws-hwe-cloud-tools-4.15.0-1141, linux-image-4.15.0-1141-aws-hwe, linux-image-aws-hwe, linux-buildinfo-4.15.0-1127-kvm, linux-image-unsigned-4.15.0-1141-aws, linux-headers-raspi2, linux-modules-4.15.0-193-generic, linux-image-oem, linux-signed-image-lowlatency, linux-tools-azure-lts-18.04 o USN-5622-1 : linux-oracle, linux-image-gkeop, linux-generic, linux-tools-generic, linux-cloud-tools-5.4.0-1091-azure, linux-headers-5.4.0-126-generic-lpae, linux-image-5.4.0-1033-ibm, linux-modules-5.4.0-126-generic-lpae, linux-image-aws-lts-20.04, linux-tools-5.4.0-1053-gkeop, linux-tools-aws, linux-image-oracle, linux-azure-5.4-cloud-tools-5.4.0-1091, linux-modules-5.4.0-1083-oracle, linux-aws-edge, linux-tools-snapdragon-hwe-18.04, linux-hwe-5.4-source-5.4.0, linux-image-ibm-edge, linux-tools-gkeop-5.4, linux-headers-raspi2-hwe-18.04-edge, linux-image-unsigned-5.4.0-1046-bluefield, linux-headers-gkeop, linux-source, linux-headers-raspi, linux-headers-ibm-edge, linux-cloud-tools-common, linux-cloud-tools-gkeop, linux-ibm, linux-modules-extra-5.4.0-1085-aws, linux-modules-5.4.0-1053-gkeop, linux-generic-hwe-18.04, linux-image-azure-lts-20.04, linux-modules-extra-5.4.0-1083-oracle, linux-cloud-tools-5.4.0-126-generic, linux-modules-extra-aws-lts-20.04, linux-tools-lowlatency-hwe-18.04, linux-cloud-tools-5.4.0-126-lowlatency, linux-oracle-5.4, linux-signed-azure, linux-signed-oracle-edge, linux-buildinfo-5.4.0-126-generic, linux-tools-generic-lpae-hwe-18.04, linux-image-generic-lpae-hwe-18.04-edge, linux-headers-5.4.0-1083-oracle, linux-headers-azure, linux-modules-extra-azure-edge, linux-modules-extra-aws-edge, linux-azure-tools-5.4.0-1091, linux-image-virtual, linux-image-raspi2-hwe-18.04, linux-oracle-edge, linux-cloud-tools-5.4.0-1053-gkeop, linux-tools-5.4.0-126, linux-image-aws-edge, linux-modules-extra-gkeop-5.4, linux-image-unsigned-5.4.0-1033-ibm, linux-modules-5.4.0-1033-ibm, linux-modules-extra-oracle, linux-buildinfo-5.4.0-1091-azure, linux-headers-gkeop-5.4, linux-buildinfo-5.4.0-126-lowlatency, linux-modules-extra-ibm-edge, linux-tools-generic-hwe-18.04, linux-buildinfo-5.4.0-1046-bluefield, linux-ibm-5.4-headers-5.4.0-1033, linux-image-5.4.0-1075-kvm, linux-aws-5.4, linux-raspi-headers-5.4.0-1070, linux-buildinfo-5.4.0-1033-ibm, linux-tools-5.4.0-1075-kvm, linux-raspi2-hwe-18.04, linux-tools-virtual, linux-tools-raspi2-hwe-18.04-edge, linux-azure-cloud-tools-5.4.0-1091, linux-cloud-tools-virtual-hwe-18.04, linux-image-snapdragon-hwe-18.04-edge, linux-tools-5.4.0-1033-ibm, linux-image-oem, linux-tools-5.4.0-1046-bluefield, linux-tools-5.4.0-126-generic-lpae, linux-raspi-tools-5.4.0-1070, linux-image-5.4.0-1046-bluefield, linux-tools-raspi, linux-headers-5.4.0-1053-gkeop, linux-ibm-5.4-source-5.4.0, linux-modules-extra-aws, linux-image-5.4.0-126-generic, linux-bluefield-tools-5.4.0-1046, linux-ibm-5.4-tools-common, linux, linux-signed-oracle, linux-tools-oracle-lts-20.04, linux-modules-extra-ibm-lts-20.04, linux-headers-5.4.0-1046-bluefield, linux-modules-5.4.0-1075-kvm, linux-image-5.4.0-126-lowlatency, linux-ibm-headers-5.4.0-1033, linux-image-extra-virtual-hwe-18.04-edge, linux-headers-generic-hwe-18.04, linux-azure-5.4-headers-5.4.0-1091, linux-headers-aws-edge, linux-image-oem-osp1, linux-modules-extra-oracle-edge, linux-headers-oracle, linux-gkeop-5.4, linux-tools-virtual-hwe-18.04, linux-image-unsigned-5.4.0-126-generic, linux-image-kvm, linux-tools-5.4.0-126-lowlatency, linux-image-generic, linux-headers-5.4.0-1033-ibm, linux-hwe-5.4, linux-image-extra-virtual, linux-image-generic-lpae, linux-ibm-source-5.4.0, linux-modules-5.4.0-126-generic, linux-hwe-5.4-tools-common, linux-cloud-tools-azure-lts-20.04, linux-generic-lpae, linux-headers-snapdragon-hwe-18.04-edge, linux-hwe-5.4-headers-5.4.0-126, linux-raspi-hwe-18.04, linux-tools-aws-edge, linux-aws-5.4-tools-5.4.0-1085, linux-headers-ibm-lts-20.04, linux-tools-azure-edge, linux-tools-lowlatency, linux-image-snapdragon-hwe-18.04, linux-generic-lpae-hwe-18.04-edge, linux-ibm-tools-common, linux-tools-oracle-edge, linux-ibm-cloud-tools-common, linux-raspi-hwe-18.04-edge, linux-kvm-tools-5.4.0-1075, linux-hwe-5.4-tools-5.4.0-126, linux-image-generic-hwe-18.04, linux-headers-lowlatency-hwe-18.04, linux-tools-raspi2, linux-image-5.4.0-1091-azure, linux-headers-generic-lpae, linux-image-azure-edge, linux-modules-extra-virtual-hwe-18.04, linux-cloud-tools-5.4.0-126, linux-image-oracle-edge, linux-image-gkeop-5.4, linux-tools-oem-osp1, linux-aws-tools-5.4.0-1085, linux-hwe-5.4-cloud-tools-common, linux-ibm-lts-20.04, linux-raspi2, linux-signed-image-oracle, linux-tools-azure-lts-20.04, linux-doc, linux-headers-oem-osp1, linux-image-oracle-lts-20.04, linux-tools-generic-lpae, linux-modules-5.4.0-1091-azure, linux-azure-headers-5.4.0-1091, linux-snapdragon-hwe-18.04-edge, linux-tools-host, linux-oem-tools-host, linux-image-virtual-hwe-18.04-edge, linux-image-azure, linux-headers-oracle-lts-20.04, linux-lowlatency, linux-buildinfo-5.4.0-1085-aws, linux-headers-generic-lpae-hwe-18.04-edge, linux-azure-5.4, linux-headers-5.4.0-1085-aws, linux-modules-extra-5.4.0-126-generic, linux-modules-extra-5.4.0-1033-ibm, linux-headers-oem, linux-cloud-tools-lowlatency-hwe-18.04, linux-tools-raspi-hwe-18.04-edge, linux-tools-raspi-hwe-18.04, linux-buildinfo-5.4.0-126-generic-lpae, linux-modules-extra-5.4.0-1053-gkeop, linux-gkeop-tools-5.4.0-1053, linux-cloud-tools-5.4.0-1085-aws, linux-image-5.4.0-126-generic-lpae, linux-headers-5.4.0-1070-raspi, linux-image-virtual-hwe-18.04, linux-signed-image-azure-edge, linux-tools-ibm, linux-image-raspi2-hwe-18.04-edge, linux-aws-5.4-cloud-tools-5.4.0-1085, linux-tools-aws-lts-20.04, linux-oracle-5.4-headers-5.4.0-1083, linux-oracle-headers-5.4.0-1083, linux-image-lowlatency, linux-image-lowlatency-hwe-18.04, linux-source-5.4.0, linux-headers-virtual-hwe-18.04-edge, linux-modules-5.4.0-126-lowlatency, linux-modules-5.4.0-1046-bluefield, linux-tools-5.4.0-1085-aws, linux-snapdragon-hwe-18.04, linux-tools-snapdragon-hwe-18.04-edge, linux-ibm-5.4-cloud-tools-common, linux-headers-kvm, linux-image-unsigned-5.4.0-1085-aws, linux-headers-virtual, linux-cloud-tools-azure, linux-headers-oracle-edge, linux-modules-5.4.0-1085-aws, linux-azure-5.4-tools-5.4.0-1091, linux-cloud-tools-generic, linux-image-extra-virtual-hwe-18.04, linux-ibm-tools-5.4.0-1033, linux-lowlatency-hwe-18.04-edge, linux-raspi, linux-aws-5.4-headers-5.4.0-1085, linux-modules-5.4.0-1070-raspi, linux-modules-extra-azure, linux-headers-snapdragon-hwe-18.04, linux-cloud-tools-generic-hwe-18.04-edge, linux-headers-5.4.0-1075-kvm, linux-headers-bluefield, linux-image-raspi, linux-headers-generic, linux-tools-ibm-lts-20.04, linux-image-generic-lpae-hwe-18.04, linux-image-raspi2, linux-tools-5.4.0-1070-raspi, linux-tools-5.4.0-1083-oracle, linux-gkeop-cloud-tools-5.4.0-1053, linux-image-5.4.0-1085-aws, linux-aws-lts-20.04, linux-image-unsigned-5.4.0-1091-azure, linux-image-unsigned-5.4.0-126-lowlatency, linux-virtual-hwe-18.04, linux-aws-headers-5.4.0-1085, linux-cloud-tools-lowlatency-hwe-18.04-edge, linux-modules-extra-5.4.0-1091-azure, linux-raspi2-hwe-18.04-edge, linux-headers-5.4.0-126-generic, linux-tools-bluefield, linux-image-unsigned-5.4.0-1053-gkeop, linux-bluefield-headers-5.4.0-1046, linux-headers-raspi2, linux-image-5.4.0-1070-raspi, linux-libc-dev, linux-headers-azure-edge, linux-image-raspi-hwe-18.04, linux-headers-5.4.0-1091-azure, linux-virtual, linux-gkeop-source-5.4.0, linux-headers-aws, linux-tools-raspi2-hwe-18.04, linux-crashdump, linux-cloud-tools-gkeop-5.4, linux-image-aws, linux-cloud-tools-lowlatency, linux-modules-extra-ibm, linux-buildinfo-5.4.0-1070-raspi, linux-image-ibm-lts-20.04, linux-generic-hwe-18.04-edge, linux-azure-edge, linux-gkeop, linux-image-bluefield, linux-tools-azure, linux-headers-raspi2-hwe-18.04, linux-headers-aws-lts-20.04, linux-modules-extra-azure-lts-20.04, linux-tools-kvm, linux-headers-virtual-hwe-18.04, linux-bluefield, linux-tools-generic-hwe-18.04-edge, linux-azure-lts-20.04, linux-image-lowlatency-hwe-18.04-edge, linux-image-unsigned-5.4.0-1075-kvm, linux-oem-osp1, linux-image-5.4.0-1053-gkeop, linux-ibm-5.4, linux-buildinfo-5.4.0-1083-oracle, linux-oracle-tools-5.4.0-1083, linux-signed-image-oracle-edge, linux-headers-azure-lts-20.04, linux-image-unsigned-5.4.0-1083-oracle, linux-headers-generic-lpae-hwe-18.04, linux-cloud-tools-generic-hwe-18.04, linux-buildinfo-5.4.0-1075-kvm, linux-tools-common, linux-aws, linux-oem, linux-image-generic-hwe-18.04-edge, linux-headers-lowlatency-hwe-18.04-edge, linux-headers-raspi-hwe-18.04-edge, linux-ibm-edge, linux-tools-generic-lpae-hwe-18.04-edge, linux-tools-gkeop, linux-oracle-5.4-tools-5.4.0-1083, linux-signed-azure-edge, linux-headers-raspi-hwe-18.04, linux-oracle-lts-20.04, linux-oem-osp1-tools-host, linux-azure, linux-tools-virtual-hwe-18.04-edge, linux-kvm-headers-5.4.0-1075, linux-cloud-tools-azure-edge, linux-image-ibm, linux-lowlatency-hwe-18.04, linux-image-5.4.0-1083-oracle, linux-modules-extra-gkeop, linux-generic-lpae-hwe-18.04, linux-tools-5.4.0-126-generic, linux-tools-ibm-edge, linux-image-raspi-hwe-18.04-edge, linux-headers-generic-hwe-18.04-edge, linux-headers-lowlatency, linux-headers-5.4.0-126-lowlatency, linux-ibm-5.4-tools-5.4.0-1033, linux-tools-5.4.0-1091-azure, linux-cloud-tools-virtual-hwe-18.04-edge, linux-aws-cloud-tools-5.4.0-1085, linux-headers-5.4.0-126, linux-buildinfo-5.4.0-1053-gkeop, linux-modules-extra-virtual-hwe-18.04-edge, linux-gkeop-headers-5.4.0-1053, linux-signed-image-azure, linux-tools-oracle, linux-kvm, linux-cloud-tools-virtual, linux-virtual-hwe-18.04-edge, linux-tools-oem, linux-hwe-5.4-cloud-tools-5.4.0-126, linux-tools-lowlatency-hwe-18.04-edge, linux-headers-ibm o USN-5624-1 : linux-tools-generic-64k-hwe-22.04, linux-libc-dev, linux-generic-hwe-22.04, linux-virtual-hwe-22.04-edge, linux-tools-virtual-hwe-20.04, linux-headers-azure-edge, linux-cloud-tools-5.15.0-48-lowlatency, linux-aws-5.15-cloud-tools-5.15.0-1020, linux-generic-lpae-hwe-22.04, linux-lowlatency-tools-host, linux-headers-5.15.0-48-lowlatency, linux-headers-generic-64k-hwe-22.04-edge, linux-modules-5.15.0-48-lowlatency, linux-aws-cloud-tools-5.15.0-1020, linux-generic, linux-tools-lowlatency-64k-hwe-20.04, linux-image-unsigned-5.15.0-48-generic-64k, linux-aws-5.15-tools-5.15.0-1020, linux-virtual, linux-lowlatency-64k-hwe-20.04, linux-tools-generic, linux-generic-hwe-20.04, linux-image-5.15.0-48-generic-64k, linux-headers-aws, linux-modules-iwlwifi-5.15.0-48-lowlatency, linux-modules-extra-aws, linux-modules-5.15.0-48-generic, linux-headers-5.15.0-48-generic, linux-crashdump, linux-headers-lowlatency-64k, linux-image-lowlatency-hwe-20.04-edge, linux-image-generic-lpae-hwe-22.04-edge, linux-image-unsigned-5.15.0-48-lowlatency-64k, linux-tools-5.15.0-48-lowlatency, linux-tools-host, linux-headers-generic-64k-hwe-20.04-edge, linux-cloud-tools-lowlatency, linux-aws-headers-5.15.0-1020, linux-cloud-tools-5.15.0-48-generic, linux-headers-virtual-hwe-22.04, linux-image-5.15.0-1020-aws, linux-image-aws, linux-image-azure, linux-generic-64k-hwe-22.04-edge, linux-lowlatency, linux-modules-5.15.0-48-generic-lpae, linux-azure-edge, linux-azure-5.15-headers-5.15.0-1020, linux-tools-5.15.0-48-generic-64k, linux-tools-generic-64k, linux-tools-generic-hwe-22.04, linux-image-5.15.0-1020-azure, linux-tools-aws, linux-tools-lowlatency-hwe-20.04-edge, linux-buildinfo-5.15.0-48-lowlatency-64k, linux-tools-lowlatency-hwe-22.04-edge, linux-aws-tools-5.15.0-1020, linux-tools-5.15.0-48-generic-lpae, linux-azure-5.15, linux-tools-azure, linux-image-5.15.0-48-lowlatency, linux-cloud-tools-generic-hwe-22.04-edge, linux-modules-5.15.0-1020-aws, linux-aws-edge, linux-tools-kvm, linux, linux-tools-generic-64k-hwe-22.04-edge, linux-headers-lowlatency-hwe-22.04, linux-image-5.15.0-48-generic-lpae, linux-lowlatency-cloud-tools-5.15.0-48, linux-headers-5.15.0-48, linux-lowlatency-cloud-tools-common, linux-tools-5.15.0-48-lowlatency-64k, linux-image-extra-virtual-hwe-20.04, linux-tools-virtual-hwe-20.04-edge, linux-image-virtual-hwe-22.04, linux-buildinfo-5.15.0-1020-azure, linux-image-generic-lpae-hwe-20.04-edge, linux-image-virtual-hwe-20.04, linux-source, linux-tools-generic-lpae-hwe-20.04, linux-image-generic-hwe-22.04, linux-generic-64k-hwe-20.04, linux-cloud-tools-lowlatency-hwe-20.04, linux-azure-cloud-tools-5.15.0-1020, linux-tools-generic-hwe-20.04-edge, linux-kvm-headers-5.15.0-1018, linux-image-generic-hwe-22.04-edge, linux-source-5.15.0, linux-image-lowlatency-hwe-22.04, linux-headers-generic-lpae-hwe-20.04-edge, linux-cloud-tools-5.15.0-1020-aws, linux-headers-generic-hwe-20.04, linux-image-unsigned-5.15.0-1020-aws, linux-headers-aws-edge, linux-cloud-tools-generic-hwe-22.04, linux-headers-generic-lpae-hwe-22.04, linux-cloud-tools-common, linux-buildinfo-5.15.0-48-generic, linux-headers-generic-lpae-hwe-22.04-edge, linux-aws-5.15, linux-image-generic-64k, linux-image-lowlatency-hwe-22.04-edge, linux-generic-64k-hwe-22.04, linux-headers-lowlatency-64k-hwe-22.04, linux-cloud-tools-lowlatency-hwe-22.04, linux-generic-lpae-hwe-20.04, linux-headers-lowlatency-64k-hwe-20.04, linux-image-generic-lpae-hwe-20.04, linux-generic-lpae-hwe-20.04-edge, linux-lowlatency-tools-common, linux-modules-5.15.0-48-generic-64k, linux-azure-5.15-tools-5.15.0-1020, linux-generic-hwe-22.04-edge, linux-tools-generic-lpae-hwe-22.04-edge, linux-tools-oem-20.04, linux-image-5.15.0-48-generic, linux-image-generic-hwe-20.04-edge, linux-headers-5.15.0-1020-azure, linux-tools-common, linux-modules-iwlwifi-5.15.0-48-generic, linux-image-lowlatency-64k, linux-aws, linux-image-extra-virtual-hwe-22.04-edge, linux-generic-64k-hwe-20.04-edge, linux-image-generic-64k-hwe-22.04-edge, linux-image-kvm, linux-image-unsigned-5.15.0-48-generic, linux-lowlatency-hwe-20.04-edge, linux-tools-lowlatency-64k, linux-cloud-tools-generic-hwe-20.04-edge, linux-headers-generic-hwe-20.04-edge, linux-image-oem-20.04, linux-image-generic, linux-headers-5.15.0-1018-kvm, linux-modules-5.15.0-1020-azure, linux-headers-5.15.0-48-lowlatency-64k, linux-image-unsigned-5.15.0-48-lowlatency, linux-tools-lowlatency-64k-hwe-22.04-edge, linux-headers-generic-64k, linux-image-lowlatency, linux-modules-extra-5.15.0-1020-azure, linux-modules-5.15.0-1018-kvm, linux-generic-hwe-20.04-edge, linux-image-virtual-hwe-20.04-edge, linux-image-lowlatency-hwe-20.04, linux-image-extra-virtual, linux-image-generic-lpae, linux-tools-5.15.0-48-generic, linux-virtual-hwe-20.04, linux-tools-generic-64k-hwe-20.04-edge, linux-cloud-tools-lowlatency-hwe-20.04-edge, linux-generic-lpae, linux-headers-generic-64k-hwe-22.04, linux-tools-virtual-hwe-22.04, linux-headers-5.15.0-48-generic-lpae, linux-tools-generic-lpae-hwe-22.04, linux-image-5.15.0-1018-kvm, linux-headers-generic-lpae-hwe-20.04, linux-image-unsigned-5.15.0-1020-azure, linux-modules-iwlwifi-generic, linux-azure-5.15-cloud-tools-5.15.0-1020, linux-headers-kvm, linux-azure, linux-tools-generic-64k-hwe-20.04, linux-headers-5.15.0-1020-aws, linux-headers-azure, linux-headers-lowlatency-hwe-20.04-edge, linux-tools-generic-lpae-hwe-20.04-edge, linux-headers-virtual, linux-cloud-tools-azure, linux-modules-5.15.0-48-lowlatency-64k, linux-tools-aws-edge, linux-modules-extra-azure-edge, linux-modules-extra-aws-edge, linux-tools-lowlatency-64k-hwe-20.04-edge, linux-tools-azure-edge, linux-cloud-tools-generic, linux-image-generic-64k-hwe-20.04-edge, linux-modules-iwlwifi-generic-hwe-22.04-edge, linux-cloud-tools-virtual-hwe-20.04-edge, linux-lowlatency-64k-hwe-20.04-edge, linux-image-extra-virtual-hwe-22.04, linux-image-generic-64k-hwe-20.04, linux-lowlatency-hwe-20.04, linux-tools-lowlatency, linux-image-virtual, linux-headers-lowlatency-hwe-20.04, linux-azure-tools-5.15.0-1020, linux-cloud-tools-lowlatency-hwe-22.04-edge, linux-buildinfo-5.15.0-1020-aws, linux-cloud-tools-5.15.0-1020-azure, linux-headers-generic-64k-hwe-20.04, linux-headers-oem-20.04, linux-image-aws-edge, linux-image-lowlatency-64k-hwe-20.04, linux-virtual-hwe-22.04, linux-generic-lpae-hwe-22.04-edge, linux-image-generic-64k-hwe-22.04, linux-headers-lowlatency-hwe-22.04-edge, linux-cloud-tools-azure-edge, linux-image-lowlatency-64k-hwe-22.04, linux-tools-lowlatency-64k-hwe-22.04, linux-azure-headers-5.15.0-1020, linux-generic-64k, linux-kvm-tools-5.15.0-1018, linux-lowlatency-64k-hwe-22.04-edge, linux-buildinfo-5.15.0-48-generic-lpae, linux-image-virtual-hwe-22.04-edge, linux-lowlatency-hwe-22.04-edge, linux-modules-extra-azure, linux-headers-generic-hwe-22.04-edge, linux-image-5.15.0-48-lowlatency-64k, linux-headers-lowlatency-64k-hwe-20.04-edge, linux-image-lowlatency-64k-hwe-22.04-edge, linux-image-generic-lpae-hwe-22.04, linux-headers-generic-lpae, linux-headers-generic, linux-modules-iwlwifi-generic-hwe-22.04, linux-buildinfo-5.15.0-48-lowlatency, linux-cloud-tools-virtual-hwe-20.04, linux-tools-5.15.0-1020-aws, linux-aws-5.15-headers-5.15.0-1020, linux-cloud-tools-virtual-hwe-22.04-edge, linux-image-azure-edge, linux-tools-5.15.0-1018-kvm, linux-image-lowlatency-64k-hwe-20.04-edge, linux-headers-lowlatency, linux-buildinfo-5.15.0-1018-kvm, linux-cloud-tools-5.15.0-48, linux-headers-virtual-hwe-20.04, linux-tools-5.15.0-1020-azure, linux-lowlatency-64k, linux-virtual-hwe-20.04-edge, linux-image-unsigned-5.15.0-1018-kvm, linux-oem-20.04, linux-tools-virtual, linux-headers-5.15.0-48-generic-64k, linux-headers-generic-hwe-22.04, linux-image-extra-virtual-hwe-20.04-edge, linux-headers-lowlatency-64k-hwe-22.04-edge, linux-headers-virtual-hwe-20.04-edge, linux-lowlatency-tools-5.15.0-48, linux-kvm, linux-cloud-tools-generic-hwe-20.04, linux-modules-extra-5.15.0-1020-aws, linux-tools-lowlatency-hwe-20.04, linux-headers-virtual-hwe-22.04-edge, linux-tools-generic-hwe-20.04, linux-tools-virtual-hwe-22.04-edge, linux-buildinfo-5.15.0-48-generic-64k, linux-cloud-tools-virtual, linux-lowlatency-hwe-22.04, linux-image-generic-hwe-20.04, linux-doc, linux-tools-generic-hwe-22.04-edge, linux-tools-lowlatency-hwe-22.04, linux-cloud-tools-virtual-hwe-22.04, linux-lowlatency-headers-5.15.0-48, linux-lowlatency-64k-hwe-22.04, linux-tools-5.15.0-48, linux-tools-generic-lpae, linux-modules-extra-5.15.0-48-generic o USN-5623-1 : linux-cloud-tools-5.15.0-48-lowlatency, linux-tools-lowlatency-64k-hwe-20.04, linux-headers-5.15.0-48-lowlatency, linux-modules-5.15.0-48-lowlatency, linux-image-unsigned-5.15.0-48-generic-64k, linux-lowlatency-64k-hwe-20.04, linux-generic-hwe-20.04, linux-image-5.15.0-48-generic-64k, linux-modules-iwlwifi-5.15.0-48-lowlatency, linux-modules-5.15.0-48-generic, linux-headers-5.15.0-48-generic, linux-image-lowlatency-hwe-20.04-edge, linux-image-unsigned-5.15.0-48-lowlatency-64k, linux-headers-generic-64k-hwe-20.04-edge, linux-tools-5.15.0-48-lowlatency, linux-cloud-tools-5.15.0-48-generic, linux-modules-5.15.0-48-generic-lpae, linux-tools-5.15.0-48-generic-64k, linux-tools-virtual-hwe-20.04, linux-tools-lowlatency-hwe-20.04-edge, linux-buildinfo-5.15.0-48-lowlatency-64k, linux-tools-5.15.0-48-generic-lpae, linux-lowlatency-hwe-5.15-tools-host, linux-image-5.15.0-48-lowlatency, linux-image-5.15.0-48-generic-lpae, linux-tools-5.15.0-48-lowlatency-64k, linux-image-extra-virtual-hwe-20.04, linux-tools-virtual-hwe-20.04-edge, linux-image-generic-lpae-hwe-20.04-edge, linux-image-virtual-hwe-20.04, linux-tools-generic-lpae-hwe-20.04, linux-cloud-tools-lowlatency-hwe-20.04, linux-generic-64k-hwe-20.04, linux-tools-generic-hwe-20.04-edge, linux-hwe-5.15-cloud-tools-common, linux-headers-generic-lpae-hwe-20.04-edge, linux-headers-generic-hwe-20.04, linux-buildinfo-5.15.0-48-generic, linux-lowlatency-hwe-5.15, linux-generic-lpae-hwe-20.04, linux-headers-lowlatency-64k-hwe-20.04, linux-image-generic-lpae-hwe-20.04, linux-generic-lpae-hwe-20.04-edge, linux-modules-5.15.0-48-generic-64k, linux-hwe-5.15-cloud-tools-5.15.0-48, linux-image-5.15.0-48-generic, linux-image-generic-hwe-20.04-edge, linux-modules-iwlwifi-5.15.0-48-generic, linux-lowlatency-hwe-20.04-edge, linux-generic-64k-hwe-20.04-edge, linux-image-unsigned-5.15.0-48-generic, linux-cloud-tools-generic-hwe-20.04-edge, linux-headers-generic-hwe-20.04-edge, linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-48, linux-headers-5.15.0-48-lowlatency-64k, linux-image-unsigned-5.15.0-48-lowlatency, linux-lowlatency-hwe-5.15-cloud-tools-common, linux-generic-hwe-20.04-edge, linux-image-virtual-hwe-20.04-edge, linux-image-lowlatency-hwe-20.04, linux-tools-5.15.0-48-generic, linux-virtual-hwe-20.04, linux-lowlatency-hwe-5.15-tools-common, linux-tools-generic-64k-hwe-20.04-edge, linux-cloud-tools-lowlatency-hwe-20.04-edge, linux-headers-5.15.0-48-generic-lpae, linux-headers-generic-lpae-hwe-20.04, linux-tools-generic-64k-hwe-20.04, linux-headers-lowlatency-hwe-20.04-edge, linux-tools-generic-lpae-hwe-20.04-edge, linux-modules-5.15.0-48-lowlatency-64k, linux-tools-lowlatency-64k-hwe-20.04-edge, linux-hwe-5.15-source-5.15.0, linux-image-generic-64k-hwe-20.04-edge, linux-cloud-tools-virtual-hwe-20.04-edge, linux-lowlatency-64k-hwe-20.04-edge, linux-lowlatency-hwe-20.04, linux-image-generic-64k-hwe-20.04, linux-headers-lowlatency-hwe-20.04, linux-hwe-5.15, linux-headers-generic-64k-hwe-20.04, linux-image-lowlatency-64k-hwe-20.04, linux-buildinfo-5.15.0-48-generic-lpae, linux-image-5.15.0-48-lowlatency-64k, linux-headers-lowlatency-64k-hwe-20.04-edge, linux-cloud-tools-virtual-hwe-20.04, linux-buildinfo-5.15.0-48-lowlatency, linux-hwe-5.15-headers-5.15.0-48, linux-image-lowlatency-64k-hwe-20.04-edge, linux-hwe-5.15-tools-common, linux-headers-virtual-hwe-20.04, linux-virtual-hwe-20.04-edge, linux-headers-5.15.0-48-generic-64k, linux-image-extra-virtual-hwe-20.04-edge, linux-headers-virtual-hwe-20.04-edge, linux-lowlatency-hwe-5.15-tools-5.15.0-48, linux-hwe-5.15-tools-5.15.0-48, linux-cloud-tools-generic-hwe-20.04, linux-tools-lowlatency-hwe-20.04, linux-tools-generic-hwe-20.04, linux-buildinfo-5.15.0-48-generic-64k, linux-image-generic-hwe-20.04, linux-lowlatency-hwe-5.15-headers-5.15.0-48, linux-hwe-5.15-tools-host, linux-modules-extra-5.15.0-48-generic o USN-5630-1 : linux-modules-5.4.0-1070-raspi, linux-tools-5.4.0-1070-raspi, linux-tools-raspi-hwe-18.04-edge, linux-headers-raspi-hwe-18.04-edge, linux-raspi-hwe-18.04-edge, linux-headers-raspi-hwe-18.04, linux-image-raspi-hwe-18.04, linux-raspi-5.4, linux-buildinfo-5.4.0-1070-raspi, linux-headers-5.4.0-1070-raspi, linux-raspi-5.4-tools-5.4.0-1070, linux-tools-raspi-hwe-18.04, linux-raspi-5.4-headers-5.4.0-1070, linux-raspi-hwe-18.04, linux-image-raspi-hwe-18.04-edge, linux-image-5.4.0-1070-raspi o USN-5633-1 : linux-headers-raspi, linux-image-5.15.0-1016-gke, linux-modules-extra-5.15.0-1018-gcp, linux-headers-raspi-nolpae, linux-modules-extra-raspi-nolpae, linux-modules-5.15.0-1018-gcp, linux-raspi-nolpae, linux-gke-tools-5.15.0-1016, linux-image-raspi, linux-tools-5.15.0-1015-raspi-nolpae, linux-modules-extra-5.15.0-1016-gke, linux-headers-5.15.0-1015-raspi-nolpae, linux-headers-5.15.0-1018-gcp, linux-headers-gke, linux-tools-raspi, linux-tools-gcp, linux-tools-5.15.0-1015-raspi, linux-gcp, linux-tools-5.15.0-1018-gcp, linux-image-gke-5.15, linux-buildinfo-5.15.0-1016-gke, linux-tools-raspi-nolpae, linux-tools-5.15.0-1016-gke, linux-gke, linux-image-gke, linux-gcp-headers-5.15.0-1018, linux-image-gcp, linux-modules-iwlwifi-5.15.0-1018-gcp, linux-headers-gcp, linux-headers-5.15.0-1016-gke, linux-image-5.15.0-1015-raspi, linux-headers-gke-5.15, linux-modules-5.15.0-1015-raspi-nolpae, linux-modules-extra-raspi, linux-raspi-tools-5.15.0-1015, linux-raspi-headers-5.15.0-1015, linux-modules-extra-5.15.0-1015-raspi-nolpae, linux-image-5.15.0-1015-raspi-nolpae, linux-image-unsigned-5.15.0-1018-gcp, linux-gcp-tools-5.15.0-1018, linux-modules-5.15.0-1016-gke, linux-buildinfo-5.15.0-1018-gcp, linux-tools-gke, linux-buildinfo-5.15.0-1015-raspi-nolpae, linux-modules-extra-5.15.0-1015-raspi, linux-headers-5.15.0-1015-raspi, linux-tools-gke-5.15, linux-image-raspi-nolpae, linux-gke-5.15, linux-modules-extra-gcp, linux-gke-headers-5.15.0-1016, linux-image-5.15.0-1018-gcp, linux-modules-iwlwifi-5.15.0-1016-gke, linux-buildinfo-5.15.0-1015-raspi, linux-raspi, linux-image-unsigned-5.15.0-1016-gke, linux-modules-5.15.0-1015-raspi o USN-5634-1 : linux-modules-iwlwifi-oem-22.04a, linux-image-unsigned-5.17.0-1017-oem, linux-oem-5.17, linux-tools-5.17.0-1017-oem, linux-modules-iwlwifi-oem-22.04, linux-oem-5.17-tools-host, linux-image-5.17.0-1017-oem, linux-image-oem-22.04a, linux-buildinfo-5.17.0-1017-oem, linux-tools-oem-22.04a, linux-modules-5.17.0-1017-oem, linux-oem-22.04a, linux-headers-5.17.0-1017-oem, linux-modules-iwlwifi-5.17.0-1017-oem, linux-oem-5.17-headers-5.17.0-1017, linux-tools-oem-22.04, linux-headers-oem-22.04a, linux-oem-5.17-tools-5.17.0-1017, linux-headers-oem-22.04, linux-oem-22.04, linux-image-oem-22.04 o USN-5635-1 : linux-image-gkeop-5.15, linux-image-gkeop, linux-modules-extra-5.15.0-1003-gkeop, linux-modules-extra-gkeop, linux-tools-gkeop, linux-tools-gkeop-5.15, linux-tools-5.15.0-1003-gkeop, linux-headers-gkeop-5.15, linux-cloud-tools-gkeop, linux-gkeop-tools-5.15.0-1003, linux-headers-5.15.0-1003-gkeop, linux-gkeop, linux-modules-extra-gkeop-5.15, linux-cloud-tools-gkeop-5.15, linux-gkeop-cloud-tools-5.15.0-1003, linux-gkeop-headers-5.15.0-1003, linux-modules-5.15.0-1003-gkeop, linux-gkeop-5.15, linux-image-5.15.0-1003-gkeop, linux-image-unsigned-5.15.0-1003-gkeop, linux-cloud-tools-5.15.0-1003-gkeop, linux-headers-gkeop, linux-buildinfo-5.15.0-1003-gkeop o USN-5639-1 : linux-cloud-tools-azure-fde, linux-image-unsigned-5.4.0-1091-azure-fde, linux-image-azure-fde, linux-modules-extra-azure-fde, linux-image-5.4.0-1091-azure-fde, linux-tools-azure-fde, linux-headers-azure-fde, linux-azure-fde o USN-5640-1 : linux-image-oracle, linux-oracle-tools-5.15.0-1018, linux-image-5.15.0-1018-oracle, linux-oracle, linux-tools-oracle, linux-tools-5.15.0-1018-oracle, linux-image-unsigned-5.15.0-1018-oracle, linux-oracle-headers-5.15.0-1018, linux-headers-oracle, linux-headers-5.15.0-1018-oracle, linux-modules-5.15.0-1018-oracle, linux-modules-extra-5.15.0-1018-oracle, linux-buildinfo-5.15.0-1018-oracle o USN-5644-1 : linux-image-gcp-edge, linux-modules-extra-5.15.0-1018-gcp, linux-modules-5.15.0-1018-gcp, linux-gcp-5.15-headers-5.15.0-1018, linux-headers-5.15.0-1018-gcp, linux-headers-gcp-edge, linux-tools-gcp, linux-gcp, linux-tools-5.15.0-1018-gcp, linux-gcp-edge, linux-image-gcp, linux-tools-gcp-edge, linux-headers-gcp, linux-gcp-5.15-tools-5.15.0-1018, linux-image-unsigned-5.15.0-1018-gcp, linux-buildinfo-5.15.0-1018-gcp, linux-modules-extra-gcp-edge, linux-modules-extra-gcp, linux-image-5.15.0-1018-gcp, linux-gcp-5.15, linux-modules-iwlwifi-5.15.0-1018-gcp o USN-5616-1 : linux-tools-5.15.0-1015-intel-iotg, linux-image-unsigned-5.15.0-1015-intel-iotg, linux-intel-iotg-cloud-tools-5.15.0-1015, linux-image-intel-iotg, linux-tools-intel-iotg, linux-intel-iotg-cloud-tools-common, linux-intel-iotg-tools-host, linux-headers-intel-iotg, linux-modules-5.15.0-1015-intel-iotg, linux-intel-iotg-headers-5.15.0-1015, linux-buildinfo-5.15.0-1015-intel-iotg, linux-intel-iotg, linux-intel-iotg-tools-common, linux-headers-5.15.0-1015-intel-iotg, linux-modules-iwlwifi-5.15.0-1015-intel-iotg, linux-image-5.15.0-1015-intel-iotg, linux-modules-extra-5.15.0-1015-intel-iotg, linux-cloud-tools-5.15.0-1015-intel-iotg, linux-intel-iotg-tools-5.15.0-1015 o USN-5577-1 : linux-headers-oem-20.04d, linux-tools-oem-20.04d, linux-headers-oem-20.04c, linux-oem-20.04c, linux-buildinfo-5.14.0-1049-oem, linux-tools-oem-20.04b, linux-modules-iwlwifi-5.14.0-1049-oem, linux-modules-iwlwifi-oem-20.04, linux-oem-5.14-headers-5.14.0-1049, linux-modules-5.14.0-1049-oem, linux-oem-20.04, linux-oem-5.14-tools-host, linux-image-oem-20.04c, linux-tools-oem-20.04c, linux-image-unsigned-5.14.0-1049-oem, linux-image-oem-20.04d, linux-oem-5.14-tools-5.14.0-1049, linux-tools-5.14.0-1049-oem, linux-tools-oem-20.04, linux-modules-iwlwifi-oem-20.04d, linux-oem-20.04d, linux-headers-oem-20.04, linux-image-5.14.0-1049-oem, linux-headers-5.14.0-1049-oem, linux-image-oem-20.04, linux-headers-oem-20.04b, linux-oem-5.14, linux-image-oem-20.04b, linux-oem-20.04b o USN-5596-1 : linux-oem-5.17-tools-5.17.0-1016, linux-modules-iwlwifi-oem-22.04a, linux-oem-5.17, linux-oem-5.17-headers-5.17.0-1016, linux-modules-iwlwifi-oem-22.04, linux-oem-5.17-tools-host, linux-image-oem-22.04a, linux-tools-oem-22.04a, linux-oem-22.04a, linux-modules-iwlwifi-5.17.0-1016-oem, linux-headers-5.17.0-1016-oem, linux-image-unsigned-5.17.0-1016-oem, linux-modules-5.17.0-1016-oem, linux-buildinfo-5.17.0-1016-oem, linux-tools-5.17.0-1016-oem, linux-headers-oem-22.04a, linux-tools-oem-22.04, linux-headers-oem-22.04, linux-oem-22.04, linux-image-5.17.0-1016-oem, linux-image-oem-22.04 o USN-5471-1 : linux-modules-iwlwifi-oem-22.04a, linux-modules-iwlwifi-5.17.0-1011-oem, linux-oem-5.17, linux-modules-iwlwifi-oem-22.04, linux-oem-5.17-tools-host, linux-tools-5.17.0-1011-oem, linux-image-oem-22.04a, linux-tools-oem-22.04a, linux-oem-22.04a, linux-image-5.17.0-1011-oem, linux-buildinfo-5.17.0-1011-oem, linux-modules-5.17.0-1011-oem, linux-oem-5.17-tools-5.17.0-1011, linux-oem-5.17-headers-5.17.0-1011, linux-headers-5.17.0-1011-oem, linux-tools-oem-22.04, linux-headers-oem-22.04a, linux-headers-oem-22.04, linux-oem-22.04, linux-image-unsigned-5.17.0-1011-oem, linux-image-oem-22.04 o USN-5594-1 : linux-azure-cloud-tools-5.15.0-1019, linux-generic-lpae-hwe-22.04, linux-image-gkeop, linux-azure-5.15-cloud-tools-5.15.0-1019, linux-generic, linux-aws-5.15-headers-5.15.0-1019, linux-tools-generic, linux-generic-hwe-20.04, linux-image-5.15.0-1017-kvm, linux-buildinfo-5.15.0-1019-azure, linux-headers-virtual-hwe-22.04, linux-tools-lowlatency-hwe-22.04-edge, linux-headers-gcp, linux-tools-5.15.0-1017-kvm, linux-tools-aws, linux-cloud-tools-generic-hwe-22.04-edge, linux-aws-edge, linux-gcp-5.15-headers-5.15.0-1017, linux-tools-generic-64k-hwe-22.04-edge, linux-headers-gkeop, linux-buildinfo-5.15.0-1002-gkeop, linux-source, linux-image-generic-hwe-22.04, linux-image-unsigned-5.15.0-1015-gke, linux-generic-64k-hwe-20.04, linux-headers-5.15.0-1019-aws, linux-image-generic-hwe-22.04-edge, linux-image-lowlatency-hwe-22.04, linux-azure-headers-5.15.0-1019, linux-image-unsigned-5.15.0-1017-kvm, linux-tools-gkeop-5.15, linux-headers-generic-lpae-hwe-22.04, linux-cloud-tools-common, linux-buildinfo-5.15.0-47-generic-lpae, linux-headers-gkeop-5.15, linux-cloud-tools-gkeop, linux-ibm, linux-tools-gcp-edge, linux-gkeop-tools-5.15.0-1002, linux-headers-5.15.0-47-generic-64k, linux-image-5.15.0-47-generic-64k, linux-image-extra-virtual-hwe-22.04-edge, linux-lowlatency-hwe-20.04-edge, linux-gcp-5.15, linux-image-unsigned-5.15.0-47-generic-64k, linux-tools-lowlatency-64k-hwe-22.04-edge, linux-image-gcp-edge, linux-gke-headers-5.15.0-1015, linux-aws-tools-5.15.0-1019, linux-image-lowlatency-hwe-20.04, linux-gkeop-headers-5.15.0-1002, linux-tools-generic-lpae-hwe-22.04, linux-image-5.15.0-47-generic-lpae, linux-image-gcp, linux-headers-azure, linux-modules-extra-azure-edge, linux-modules-extra-aws-edge, linux-cloud-tools-gkeop-5.15, linux-modules-5.15.0-1019-aws, linux-image-generic-64k-hwe-20.04, linux-image-virtual, linux-cloud-tools-lowlatency-hwe-22.04-edge, linux-image-lowlatency-64k-hwe-20.04, linux-image-aws-edge, linux-headers-gke-edge, linux-generic-lpae-hwe-22.04-edge, linux-image-generic-64k-hwe-22.04, linux-buildinfo-5.15.0-1017-kvm, linux-gcp-tools-5.15.0-1017, linux-azure-tools-5.15.0-1019, linux-lowlatency-hwe-22.04-edge, linux-headers-generic-hwe-22.04-edge, linux-tools-5.15.0-47-generic-lpae, linux-headers-lowlatency-64k-hwe-20.04-edge, linux-cloud-tools-virtual-hwe-20.04, linux-image-lowlatency-64k-hwe-20.04-edge, linux-image-gke, linux-headers-virtual-hwe-20.04, linux-lowlatency-64k, linux-tools-virtual, linux-headers-lowlatency-64k-hwe-22.04-edge, linux-gke-tools-5.15.0-1015, linux-image-unsigned-5.15.0-1019-aws, linux-headers-virtual-hwe-22.04-edge, linux-tools-5.15.0-47-generic, linux-modules-extra-gcp, linux-cloud-tools-5.15.0-1019-aws, linux-headers-5.15.0-47-generic, linux-modules-extra-aws, linux-image-lowlatency-hwe-20.04-edge, linux-modules-extra-5.15.0-1017-gcp, linux-headers-generic-64k-hwe-20.04-edge, linux-tools-gke-edge, linux-tools-generic-hwe-22.04, linux-headers-gke-5.15, linux-cloud-tools-5.15.0-47-lowlatency, linux-modules-extra-5.15.0-1019-aws, linux-lowlatency-cloud-tools-5.15.0-47, linux-tools-gke, linux, linux-tools-virtual-hwe-20.04-edge, linux-cloud-tools-lowlatency-hwe-20.04, linux-headers-5.15.0-47-generic-lpae, linux-buildinfo-5.15.0-47-generic, linux-source-5.15.0, linux-cloud-tools-5.15.0-47, linux-headers-aws-edge, linux-headers-gke, linux-headers-generic-lpae-hwe-22.04-edge, linux-image-generic-64k, linux-image-lowlatency-hwe-22.04-edge, linux-generic-64k-hwe-22.04, linux-modules-extra-5.15.0-1015-gke, linux-headers-5.15.0-47-lowlatency-64k, linux-headers-lowlatency-64k-hwe-20.04, linux-gkeop-cloud-tools-5.15.0-1002, linux-image-5.15.0-1015-gke, linux-generic-hwe-22.04-edge, linux-image-unsigned-5.15.0-1017-gcp, linux-tools-generic-lpae-hwe-22.04-edge, linux-tools-oem-20.04, linux-headers-5.15.0-1013-ibm, linux-image-5.15.0-47-lowlatency, linux-image-kvm, linux-cloud-tools-generic-hwe-20.04-edge, linux-image-generic, linux-image-unsigned-5.15.0-47-lowlatency-64k, linux-image-extra-virtual, linux-image-generic-lpae, linux-buildinfo-5.15.0-1017-gcp, linux-image-gke-edge, linux-modules-iwlwifi-5.15.0-1017-gcp, linux-generic-lpae, linux-headers-generic-64k-hwe-22.04, linux-modules-iwlwifi-generic, linux-tools-generic-64k-hwe-20.04, linux-tools-aws-edge, linux-tools-lowlatency-64k-hwe-20.04-edge, linux-tools-azure-edge, linux-image-generic-64k-hwe-20.04-edge, linux-image-unsigned-5.15.0-1013-ibm, linux-cloud-tools-virtual-hwe-20.04-edge, linux-lowlatency-64k-hwe-20.04-edge, linux-lowlatency-hwe-20.04, linux-lowlatency-tools-5.15.0-47, linux-modules-5.15.0-47-generic-64k, linux-tools-lowlatency, linux-modules-5.15.0-1015-gke, linux-modules-5.15.0-47-generic, linux-lowlatency-headers-5.15.0-47, linux-ibm-tools-common, linux-ibm-cloud-tools-common, linux-headers-generic-64k-hwe-20.04, linux-tools-5.15.0-1015-gke, linux-tools-lowlatency-64k-hwe-22.04, linux-headers-lowlatency-hwe-22.04-edge, linux-generic-64k, linux-gke-5.15-tools-5.15.0-1015, linux-image-5.15.0-47-lowlatency-64k, linux-gcp-headers-5.15.0-1017, linux-lowlatency-64k-hwe-22.04-edge, linux-image-generic-lpae-hwe-22.04, linux-headers-generic-lpae, linux-image-azure-edge, linux-cloud-tools-virtual-hwe-22.04-edge, linux-cloud-tools-5.15.0-1002-gkeop, linux-oem-20.04, linux-aws-5.15-tools-5.15.0-1019, linux-buildinfo-5.15.0-47-generic-64k, linux-tools-virtual-hwe-22.04-edge, linux-tools-generic-hwe-20.04, linux-aws-cloud-tools-5.15.0-1019, linux-image-generic-hwe-20.04, linux-doc, linux-tools-generic-lpae, linux-virtual-hwe-22.04-edge, linux-cloud-tools-5.15.0-1019-azure, linux-tools-lowlatency-64k-hwe-20.04, linux-headers-generic-64k-hwe-22.04-edge, linux-lowlatency-64k-hwe-20.04, linux-headers-gcp-edge, linux-tools-host, linux-image-azure, linux-lowlatency, linux-tools-virtual-hwe-20.04, linux-modules-5.15.0-47-generic-lpae, linux-azure-5.15, linux-headers-lowlatency-hwe-22.04, linux-image-extra-virtual-hwe-20.04, linux-gcp-5.15-tools-5.15.0-1017, linux-image-virtual-hwe-22.04, linux-buildinfo-5.15.0-1019-aws, linux-image-generic-lpae-hwe-20.04-edge, linux-tools-generic-lpae-hwe-20.04, linux-buildinfo-5.15.0-1013-ibm, linux-tools-generic-hwe-20.04-edge, linux-headers-5.15.0-1015-gke, linux-headers-generic-lpae-hwe-20.04-edge, linux-aws-headers-5.15.0-1019, linux-tools-gcp, linux-modules-iwlwifi-5.15.0-1015-gke, linux-image-gke-5.15, linux-gke, linux-image-generic-lpae-hwe-20.04, linux-generic-lpae-hwe-20.04-edge, linux-modules-extra-5.15.0-47-generic, linux-tools-ibm, linux-image-lowlatency-64k, linux-kvm-headers-5.15.0-1017, linux-tools-5.15.0-47-lowlatency, linux-modules-iwlwifi-5.15.0-1013-ibm, linux-generic-64k-hwe-20.04-edge, linux-headers-generic-hwe-20.04-edge, linux-cloud-tools-5.15.0-47-generic, linux-headers-generic-64k, linux-image-lowlatency, linux-generic-hwe-20.04-edge, linux-ibm-headers-5.15.0-1013, linux-image-virtual-hwe-20.04-edge, linux-tools-generic-64k-hwe-20.04-edge, linux-cloud-tools-lowlatency-hwe-20.04-edge, linux-buildinfo-5.15.0-47-lowlatency-64k, linux-headers-generic-lpae-hwe-20.04, linux-headers-kvm, linux-headers-lowlatency-hwe-20.04-edge, linux-tools-generic-lpae-hwe-20.04-edge, linux-headers-virtual, linux-cloud-tools-azure, linux-cloud-tools-generic, linux-kvm-tools-5.15.0-1017, linux-image-unsigned-5.15.0-47-generic, linux-image-extra-virtual-hwe-22.04, linux-headers-5.15.0-47-lowlatency, linux-modules-extra-5.15.0-1002-gkeop, linux-image-lowlatency-64k-hwe-22.04, linux-image-unsigned-5.15.0-47-lowlatency, linux-modules-extra-azure, linux-image-5.15.0-47-generic, linux-tools-5.15.0-1013-ibm, linux-headers-generic, linux-modules-iwlwifi-generic-hwe-22.04, linux-modules-extra-5.15.0-1013-ibm, linux-gke-5.15-headers-5.15.0-1015, linux-image-unsigned-5.15.0-1019-azure, linux-modules-iwlwifi-5.15.0-47-generic, linux-tools-5.15.0-1017-gcp, linux-virtual-hwe-20.04-edge, linux-headers-generic-hwe-22.04, linux-image-extra-virtual-hwe-20.04-edge, linux-headers-virtual-hwe-20.04-edge, linux-gkeop-5.15, linux-tools-generic-hwe-22.04-edge, linux-headers-5.15.0-1019-azure, linux-tools-lowlatency-hwe-22.04, linux-cloud-tools-virtual-hwe-22.04, linux-lowlatency-64k-hwe-22.04, linux-image-5.15.0-1002-gkeop, linux-tools-generic-64k-hwe-22.04, linux-libc-dev, linux-generic-hwe-22.04, linux-headers-azure-edge, linux-lowlatency-tools-host, linux-modules-5.15.0-47-lowlatency, linux-modules-5.15.0-1019-azure, linux-virtual, linux-headers-aws, linux-ibm-tools-5.15.0-1013, linux-crashdump, linux-headers-lowlatency-64k, linux-image-generic-lpae-hwe-22.04-edge, linux-image-aws, linux-cloud-tools-lowlatency, linux-gke-edge, linux-tools-virtual-hwe-22.04, linux-generic-64k-hwe-22.04-edge, linux-tools-generic-64k, linux-tools-5.15.0-1019-azure, linux-azure-edge, linux-modules-5.15.0-1002-gkeop, linux-tools-lowlatency-hwe-20.04-edge, linux-gkeop, linux-tools-azure, linux-modules-extra-5.15.0-1019-azure, linux-tools-kvm, linux-lowlatency-cloud-tools-common, linux-tools-gke-5.15, linux-gke-5.15, linux-image-virtual-hwe-20.04, linux-image-5.15.0-1017-gcp, linux-headers-generic-hwe-20.04, linux-tools-5.15.0-1002-gkeop, linux-cloud-tools-generic-hwe-22.04, linux-aws-5.15, linux-gcp, linux-aws-5.15-cloud-tools-5.15.0-1019, linux-headers-lowlatency-64k-hwe-22.04, linux-cloud-tools-lowlatency-hwe-22.04, linux-headers-5.15.0-1002-gkeop, linux-gcp-edge, linux-generic-lpae-hwe-20.04, linux-tools-5.15.0-1019-aws, linux-image-5.15.0-1019-aws, linux-modules-5.15.0-47-lowlatency-64k, linux-azure-5.15-tools-5.15.0-1019, linux-lowlatency-tools-common, linux-image-generic-hwe-20.04-edge, linux-tools-common, linux-image-5.15.0-1019-azure, linux-aws, linux-modules-5.15.0-1013-ibm, linux-image-generic-64k-hwe-22.04-edge, linux-tools-lowlatency-64k, linux-image-oem-20.04, linux-modules-5.15.0-1017-kvm, linux-tools-5.15.0-47-generic-64k, linux-azure-5.15-headers-5.15.0-1019, linux-virtual-hwe-20.04, linux-headers-5.15.0-47, linux-buildinfo-5.15.0-47-lowlatency, linux-image-5.15.0-1013-ibm, linux-tools-gkeop, linux-ibm-source-5.15.0, linux-azure, linux-modules-iwlwifi-generic-hwe-22.04-edge, linux-tools-5.15.0-47, linux-headers-lowlatency-hwe-20.04, linux-tools-5.15.0-47-lowlatency-64k, linux-virtual-hwe-22.04, linux-headers-5.15.0-1017-gcp, linux-headers-oem-20.04, linux-buildinfo-5.15.0-1015-gke, linux-cloud-tools-azure-edge, linux-image-ibm, linux-image-gkeop-5.15, linux-image-virtual-hwe-22.04-edge, linux-modules-extra-gkeop, linux-image-lowlatency-64k-hwe-22.04-edge, linux-image-unsigned-5.15.0-1002-gkeop, linux-modules-iwlwifi-5.15.0-47-lowlatency, linux-headers-lowlatency, linux-headers-5.15.0-1017-kvm, linux-modules-extra-gkeop-5.15, linux-kvm, linux-cloud-tools-generic-hwe-20.04, linux-modules-extra-gcp-edge, linux-tools-lowlatency-hwe-20.04, linux-modules-5.15.0-1017-gcp, linux-cloud-tools-virtual, linux-lowlatency-hwe-22.04, linux-headers-ibm o USN-5599-1 : linux-image-oracle, linux-modules-5.15.0-1017-oracle, linux-oracle, linux-image-unsigned-5.15.0-1017-oracle, linux-headers-5.15.0-1017-oracle, linux-oracle-tools-5.15.0-1017, linux-tools-oracle, linux-headers-oracle, linux-tools-5.15.0-1017-oracle, linux-image-5.15.0-1017-oracle, linux-buildinfo-5.15.0-1017-oracle, linux-oracle-headers-5.15.0-1017, linux-modules-extra-5.15.0-1017-oracle o USN-5602-1 : linux-headers-raspi, linux-tools-5.15.0-1014-raspi, linux-image-5.15.0-1014-raspi-nolpae, linux-buildinfo-5.15.0-1014-raspi-nolpae, linux-modules-extra-5.15.0-1014-raspi, linux-headers-raspi-nolpae, linux-modules-extra-raspi-nolpae, linux-raspi-headers-5.15.0-1014, linux-raspi-nolpae, linux-raspi-tools-5.15.0-1014, linux-image-raspi, linux-tools-5.15.0-1014-raspi-nolpae, linux-tools-raspi, linux-buildinfo-5.15.0-1014-raspi, linux-tools-raspi-nolpae, linux-headers-5.15.0-1014-raspi-nolpae, linux-image-5.15.0-1014-raspi, linux-modules-extra-raspi, linux-modules-5.15.0-1014-raspi, linux-headers-5.15.0-1014-raspi, linux-image-raspi-nolpae, linux-modules-extra-5.15.0-1014-raspi-nolpae, linux-raspi, linux-modules-5.15.0-1014-raspi-nolpae o USN-5560-1 : linux-image-4.15.0-1149-azure, linux-headers-4.15.0-1104-oracle, linux-libc-dev, linux-signed-azure-lts-18.04, linux-image-virtual-hwe-16.04, linux-oracle, linux-headers-4.15.0-1135-snapdragon, linux-lowlatency-hwe-16.04, linux-generic, linux-azure-4.15-cloud-tools-4.15.0-1149, linux-modules-4.15.0-1135-snapdragon, linux-headers-lowlatency-hwe-16.04-edge, linux-virtual, linux-image-generic-lpae-hwe-16.04, linux-tools-generic, linux-gcp-4.15-tools-4.15.0-1134, linux-modules-extra-4.15.0-1104-oracle, linux-virtual-hwe-16.04-edge, linux-azure-4.15-tools-4.15.0-1149, linux-modules-extra-4.15.0-191-generic, linux-crashdump, linux-tools-4.15.0-1051-dell300x, linux-headers-oracle-lts-18.04, linux-tools-host, linux-image-virtual-hwe-16.04-edge, linux-image-4.15.0-1051-dell300x, linux-cloud-tools-lowlatency, linux-lowlatency, linux-modules-4.15.0-1117-raspi2, linux-headers-4.15.0-1117-raspi2, linux-oracle-lts-18.04, linux-cloud-tools-virtual-hwe-16.04, linux-headers-generic-lpae-hwe-16.04, linux-buildinfo-4.15.0-1135-snapdragon, linux-cloud-tools-lowlatency-hwe-16.04, linux-image-unsigned-4.15.0-191-lowlatency, linux-image-gcp-lts-18.04, linux-cloud-tools-4.15.0-1139-aws, linux-dell300x, linux-modules-4.15.0-1125-kvm, linux-tools-kvm, linux-tools-4.15.0-191, linux, linux-headers-4.15.0-1149-azure, linux-azure-lts-18.04, linux-headers-virtual-hwe-16.04, linux-tools-4.15.0-191-lowlatency, linux-buildinfo-4.15.0-1149-azure, linux-buildinfo-4.15.0-1134-gcp, linux-image-4.15.0-1134-gcp, linux-image-4.15.0-1117-raspi2, linux-source, linux-gcp-lts-18.04, linux-tools-4.15.0-191-generic-lpae, linux-modules-extra-azure-lts-18.04, linux-cloud-tools-lowlatency-hwe-16.04-edge, linux-headers-4.15.0-191-generic, linux-signed-generic-hwe-16.04-edge, linux-cloud-tools-4.15.0-191-lowlatency, linux-headers-gcp-lts-18.04, linux-signed-lowlatency-hwe-16.04-edge, linux-image-unsigned-4.15.0-1149-azure, linux-headers-aws-lts-18.04, linux-image-azure-lts-18.04, linux-image-generic-lpae-hwe-16.04-edge, linux-cloud-tools-common, linux-headers-4.15.0-1134-gcp, linux-image-unsigned-4.15.0-1104-oracle, linux-signed-oracle-lts-18.04, linux-azure-4.15-headers-4.15.0-1149, linux-tools-4.15.0-1149-azure, linux-signed-generic, linux-snapdragon-tools-4.15.0-1135, linux-tools-4.15.0-1135-snapdragon, linux-headers-generic-lpae-hwe-16.04-edge, linux-image-oracle-lts-18.04, linux-modules-4.15.0-191-generic, linux-modules-4.15.0-1051-dell300x, linux-tools-dell300x, linux-aws-lts-18.04, linux-tools-virtual-hwe-16.04, linux-image-generic-hwe-16.04-edge, linux-tools-4.15.0-1104-oracle, linux-headers-4.15.0-1051-dell300x, linux-headers-generic-hwe-16.04, linux-signed-lowlatency-hwe-16.04, linux-tools-4.15.0-1125-kvm, linux-tools-common, linux-tools-4.15.0-191-generic, linux-virtual-hwe-16.04, linux-aws, linux-signed-image-generic-hwe-16.04-edge, linux-tools-4.15.0-1117-raspi2, linux-modules-4.15.0-191-generic-lpae, linux-buildinfo-4.15.0-1125-kvm, linux-headers-4.15.0-191-lowlatency, linux-image-kvm, linux-modules-extra-4.15.0-1139-aws, linux-raspi2-headers-4.15.0-1117, linux-headers-dell300x, linux-image-extra-virtual-hwe-16.04, linux-image-generic, linux-image-4.15.0-1139-aws, linux-headers-generic-hwe-16.04-edge, linux-buildinfo-4.15.0-1051-dell300x, linux-tools-generic-lpae-hwe-16.04-edge, linux-image-lowlatency, linux-headers-4.15.0-1125-kvm, linux-image-extra-virtual, linux-buildinfo-4.15.0-1117-raspi2, linux-image-generic-lpae, linux-tools-generic-lpae-hwe-16.04, linux-image-unsigned-4.15.0-1134-gcp, linux-image-4.15.0-1135-snapdragon, linux-generic-hwe-16.04-edge, linux-buildinfo-4.15.0-191-generic-lpae, linux-gcp-4.15-headers-4.15.0-1134, linux-generic-lpae, linux-modules-extra-gcp-lts-18.04, linux-signed-image-azure-lts-18.04, linux-tools-snapdragon, linux-cloud-tools-virtual-hwe-16.04-edge, linux-cloud-tools-azure-lts-18.04, linux-lowlatency-hwe-16.04-edge, linux-signed-generic-hwe-16.04, linux-modules-extra-4.15.0-1134-gcp, linux-image-unsigned-4.15.0-1051-dell300x, linux-tools-lowlatency-hwe-16.04-edge, linux-headers-kvm, linux-headers-virtual, linux-cloud-tools-generic-hwe-16.04, linux-snapdragon-headers-4.15.0-1135, linux-cloud-tools-generic, linux-aws-cloud-tools-4.15.0-1139, linux-signed-image-lowlatency-hwe-16.04, linux-buildinfo-4.15.0-191-lowlatency, linux-signed-image-generic-hwe-16.04, linux-tools-gcp-lts-18.04, linux-tools-generic-hwe-16.04, linux-tools-lowlatency, linux-snapdragon, linux-image-4.15.0-1104-oracle, linux-image-virtual, linux-cloud-tools-4.15.0-1149-azure, linux-tools-4.15.0-1139-aws, linux-raspi2-tools-4.15.0-1117, linux-kvm-tools-4.15.0-1125, linux-modules-4.15.0-1139-aws, linux-dell300x-headers-4.15.0-1051, linux-headers-4.15.0-1139-aws, linux-modules-extra-4.15.0-1149-azure, linux-modules-4.15.0-191-lowlatency, linux-image-extra-virtual-hwe-16.04-edge, linux-generic-hwe-16.04, linux-dell300x-tools-4.15.0-1051, linux-modules-extra-aws-lts-18.04, linux-aws-headers-4.15.0-1139, linux-image-4.15.0-191-generic-lpae, linux-image-lowlatency-hwe-16.04, linux-modules-4.15.0-1134-gcp, linux-tools-4.15.0-1134-gcp, linux-buildinfo-4.15.0-1104-oracle, linux-tools-generic-hwe-16.04-edge, linux-tools-raspi2, linux-buildinfo-4.15.0-191-generic, linux-headers-4.15.0-191, linux-headers-generic-lpae, linux-headers-generic, linux-gcp-4.15, linux-image-4.15.0-191-generic, linux-image-snapdragon, linux-tools-lowlatency-hwe-16.04, linux-headers-4.15.0-191-generic-lpae, linux-image-lowlatency-hwe-16.04-edge, linux-oracle-tools-4.15.0-1104, linux-generic-lpae-hwe-16.04, linux-source-4.15.0, linux-headers-lowlatency, linux-signed-image-generic, linux-image-generic-hwe-16.04, linux-headers-lowlatency-hwe-16.04, linux-tools-aws-lts-18.04, linux-aws-tools-4.15.0-1139, linux-image-aws-lts-18.04, linux-image-raspi2, linux-image-unsigned-4.15.0-1139-aws, linux-tools-virtual, linux-signed-image-oracle-lts-18.04, linux-buildinfo-4.15.0-1139-aws, linux-headers-virtual-hwe-16.04-edge, linux-image-dell300x, linux-image-4.15.0-191-lowlatency, linux-raspi2, linux-image-4.15.0-1125-kvm, linux-tools-oracle-lts-18.04, linux-tools-virtual-hwe-16.04-edge, linux-cloud-tools-4.15.0-191-generic, linux-kvm, linux-cloud-tools-virtual, linux-kvm-headers-4.15.0-1125, linux-modules-4.15.0-1149-azure, linux-signed-lowlatency, linux-headers-azure-lts-18.04, linux-doc, linux-azure-4.15, linux-signed-image-lowlatency-hwe-16.04-edge, linux-headers-snapdragon, linux-cloud-tools-4.15.0-191, linux-cloud-tools-generic-hwe-16.04-edge, linux-modules-4.15.0-1104-oracle, linux-oracle-headers-4.15.0-1104, linux-generic-lpae-hwe-16.04-edge, linux-signed-image-lowlatency, linux-tools-azure-lts-18.04, linux-headers-raspi2, linux-tools-generic-lpae, linux-image-unsigned-4.15.0-191-generic o USN-5560-2 : linux-image-4.15.0-1149-azure, linux-headers-4.15.0-1104-oracle, linux-image-virtual-hwe-16.04, linux-oracle, linux-headers-azure-edge, linux-lowlatency-hwe-16.04, linux-headers-lowlatency-hwe-16.04-edge, linux-hwe-cloud-tools-4.15.0-191, linux-modules-extra-4.15.0-1104-oracle, linux-modules-extra-4.15.0-191-generic, linux-virtual-hwe-16.04-edge, linux-image-virtual-hwe-16.04-edge, linux-image-azure, linux-azure-edge, linux-headers-gcp, linux-cloud-tools-virtual-hwe-16.04, linux-image-oracle, linux-cloud-tools-lowlatency-hwe-16.04, linux-image-unsigned-4.15.0-191-lowlatency, linux-tools-azure, linux-cloud-tools-4.15.0-1139-aws, linux-azure-tools-4.15.0-1149, linux-aws-edge, linux-tools-gke, linux-headers-4.15.0-1149-azure, linux-signed-oracle, linux-headers-virtual-hwe-16.04, linux-tools-4.15.0-191-lowlatency, linux-buildinfo-4.15.0-1149-azure, linux-buildinfo-4.15.0-1134-gcp, linux-image-4.15.0-1134-gcp, linux-headers-oem, linux-azure-headers-4.15.0-1149, linux-aws-hwe-tools-4.15.0-1139, linux-cloud-tools-lowlatency-hwe-16.04-edge, linux-headers-4.15.0-191-generic, linux-cloud-tools-4.15.0-191-lowlatency, linux-signed-generic-hwe-16.04-edge, linux-signed-lowlatency-hwe-16.04-edge, linux-image-unsigned-4.15.0-1149-azure, linux-headers-gke, linux-headers-4.15.0-1134-gcp, linux-tools-gcp, linux-image-unsigned-4.15.0-1104-oracle, linux-gcp, linux-tools-4.15.0-1149-azure, linux-gcp-tools-4.15.0-1134, linux-modules-4.15.0-191-generic, linux-gke, linux-tools-virtual-hwe-16.04, linux-image-generic-hwe-16.04-edge, linux-tools-4.15.0-1104-oracle, linux-hwe, linux-headers-generic-hwe-16.04, linux-signed-lowlatency-hwe-16.04, linux-headers-oracle, linux-signed-image-azure-edge, linux-tools-4.15.0-191-generic, linux-virtual-hwe-16.04, linux-signed-image-generic-hwe-16.04-edge, linux-oem, linux-headers-4.15.0-191-lowlatency, linux-image-4.15.0-1139-aws-hwe, linux-modules-extra-4.15.0-1139-aws, linux-image-extra-virtual-hwe-16.04, linux-headers-generic-hwe-16.04-edge, linux-image-unsigned-4.15.0-1134-gcp, linux-generic-hwe-16.04-edge, linux-signed-azure, linux-signed-azure-edge, linux-hwe-tools-4.15.0-191, linux-cloud-tools-virtual-hwe-16.04-edge, linux-lowlatency-hwe-16.04-edge, linux-signed-generic-hwe-16.04, linux-modules-extra-4.15.0-1134-gcp, linux-tools-lowlatency-hwe-16.04-edge, linux-azure, linux-image-gcp, linux-headers-azure, linux-cloud-tools-azure, linux-cloud-tools-generic-hwe-16.04, linux-modules-extra-azure-edge, linux-tools-azure-edge, linux-tools-generic-hwe-16.04, linux-signed-image-lowlatency-hwe-16.04, linux-buildinfo-4.15.0-191-lowlatency, linux-signed-image-generic-hwe-16.04, linux-aws-hwe-cloud-tools-4.15.0-1139, linux-headers-aws-hwe, linux-image-4.15.0-1104-oracle, linux-cloud-tools-4.15.0-1149-azure, linux-tools-4.15.0-1139-aws, linux-gcp-headers-4.15.0-1134, linux-modules-4.15.0-1139-aws, linux-headers-4.15.0-1139-aws, linux-modules-extra-4.15.0-1149-azure, linux-modules-4.15.0-191-lowlatency, linux-image-extra-virtual-hwe-16.04-edge, linux-generic-hwe-16.04, linux-cloud-tools-azure-edge, linux-aws-headers-4.15.0-1139, linux-image-lowlatency-hwe-16.04, linux-modules-4.15.0-1134-gcp, linux-tools-4.15.0-1134-gcp, linux-azure-cloud-tools-4.15.0-1149, linux-buildinfo-4.15.0-1104-oracle, linux-modules-extra-azure, linux-tools-generic-hwe-16.04-edge, linux-buildinfo-4.15.0-191-generic, linux-headers-4.15.0-191, linux-modules-extra-aws-hwe, linux-image-4.15.0-191-generic, linux-image-azure-edge, linux-tools-lowlatency-hwe-16.04, linux-image-lowlatency-hwe-16.04-edge, linux-oracle-tools-4.15.0-1104, linux-source-4.15.0, linux-image-generic-hwe-16.04, linux-headers-lowlatency-hwe-16.04, linux-image-gke, linux-image-unsigned-4.15.0-1139-aws, linux-signed-oem, linux-buildinfo-4.15.0-1139-aws, linux-headers-virtual-hwe-16.04-edge, linux-image-4.15.0-191-lowlatency, linux-signed-image-azure, linux-tools-oracle, linux-modules-extra-gke, linux-tools-virtual-hwe-16.04-edge, linux-aws-hwe, linux-cloud-tools-4.15.0-191-generic, linux-tools-aws-hwe, linux-signed-image-oracle, linux-modules-4.15.0-1149-azure, linux-signed-image-oem, linux-signed-image-lowlatency-hwe-16.04-edge, linux-tools-oem, linux-cloud-tools-generic-hwe-16.04-edge, linux-modules-4.15.0-1104-oracle, linux-modules-extra-gcp, linux-oracle-headers-4.15.0-1104, linux-image-aws-hwe, linux-image-oem, linux-image-unsigned-4.15.0-191-generic - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUIw8kNZI30y1K9AQgnxw/6AwUBDuWWNixx683lVzo1TWrIIjI/Mo6N 71blkwBg/cSB+/7xjmDsbBTlMQvGZzrA2uNp9zKoiWXftB5lJqX7R12u713Na/oq L0+rzH5ts3lg+AsGUQNC/03RWQFTmm40bf47+8jlAl9AhJB344n4CBkK9encEZxw g0TIecS/AERmzAfYcIGfmKLchTsa4ukF0wxA5xmF9OhZ6fA2awILJ1UkvQAUvi6o cFBrPobkeq75kgXDB3bdHVQUIe1hqQrdtEoCcJTmlzSGZl9AWohOCJwULv/5qIyw l+MAm6FgITHiqVNJrDbylSRabr+Avjeu0Fie82RAF1Lo9fQa7nXTqQ6s+fQTmCcb I6Q/DmNXI6TKJiONDBm6LL/o61o11d/OeP3GEQbYuh/GozH1hAQM6bCTpEhUD02r 6bLR4JqPF8N0irI+kP+I6wpZpkRQbFIvOBs45ZZVvJ09yXdqYZCnufpxw5aUoO8Z YoXeLuyt97uboYDCMZZKFvRAqvGwlTHOoubKQdz6poEcb5vG5PUjrr++j0TeEiPk egXzUwwngjPtP6ilP1JISoUI8jW9Qtey9LH0CbYecGyzu9xAVevKPFd+3LMScYpx k2kisf6yzciM1Db7OlCfxAHOxYwQb01s95ivwvA3tZqiJ8z2BjXRrbszYcDFMRta JUfK+nCnnqM= =4hdv -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4839 - [Ubuntu] SQLite: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4839 USN-5615-2: SQLite vulnerability 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: SQLite Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2020-35525 Original Bulletin: https://ubuntu.com/security/notices/USN-5615-2 Comment: CVSS (Max): 7.5 CVE-2020-35525 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- USN-5615-2: SQLite vulnerability 28 September 2022 SQLite could be made to crash or execute arbitrary code. Releases o Ubuntu 16.04 ESM Packages o sqlite3 - C library that implements an SQL database engine Details USN-5615-1 fixed several vulnerabilities in SQLite. This update provides the corresponding fix for CVE-2020-35525 for Ubuntu 16.04 ESM. Original advisory details: It was discovered that SQLite incorrectly handled INTERSEC query processing. An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 o sqlite3 - 3.11.0-1ubuntu1.5+esm1 Available with UA Infra or UA Desktop In general, a standard system update will make all the necessary changes. References o CVE-2020-35525 Related notices o USN-5615-1 : sqlite3-doc, libsqlite3-dev, sqlite3, libsqlite3-tcl, libsqlite3-0, lemon - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUIpckNZI30y1K9AQgIYBAAgVK2/32oQvYpztm6AkY8yuYUHGPWPc6W hzwXNf0kjnAb+tU9qGhrfFv87gDURWmBpCTTUW31aH/soZPOL8JHlSzSuE+8PrMz Cr4UgzFRK/p9epTJD3XEdWyztYMbRZhwI9nC5+zxgEzCWiND0dmvFTaqkGId2Bvn TUHHqiM/9UOk+8icRa0o8aJ8jbdcy0yqkMsYRJCgkQTK6YuMRs7eOOyCUYda+IYN hDp4te+r6j9sc0468kgq/6RYFGr2pfFvCWrBiJVZsFGAll5wxzfc6WYxjiQU4ffh 1fvFd7hFvXPfOFmjDka2j+/Ibki9FSH4JPmImr85OYJi3VaGGnHHv2AgivwY6K0m 3jQXfURwNcTTb/I5nxYwO++bPJz87CzcBmzDVj6SGj7heDerCzW7YwnEbF9BkCEo tCDmGamHBQmF3zmVyaXqPgNALjv4SEN4K1LAz7hzH263otIlsy2Gw9MCTZl+0tgk X7i5K6rxkzTIZiSrBIM9henGojUPlw0gwO0gv7eUxA+RusucZYuuWjPHSp62I1ce ZhAHNrtH+D5oYanjUXbKZC8Sc7Fv7+QdfDXE0QhI6yryKqqmY+Nz65XVOfLTNd0U bkTY6qapDt5AcaBHguUgAeOcAXBwTB20TjceCXxGAQCY5vt2Kr/75EMYm9vNAJkt THgnjlD5r7w= =VPhi -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4838 - [Ubuntu] libXi: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4838 USN-5646-1: libXi vulnerabilities 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: libXi Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2016-7946 CVE-2016-7945 Original Bulletin: https://ubuntu.com/security/notices/USN-5646-1 Comment: CVSS (Max): 7.5 CVE-2016-7946 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- USN-5646-1: libXi vulnerabilities 28 September 2022 Several security issues were fixed in libxi. Releases o Ubuntu 16.04 ESM Packages o libxi - X11 Input extension library Details Tobias Stoeckmann discovered that libXi did not properly manage memory when handling X server responses. A remote attacker could use this issue to cause libXi to crash, resulting in a denial of service. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 o libxi6 - 2:1.7.6-1ubuntu0.1~esm1 Available with UA Infra or UA Desktop In general, a standard system update will make all the necessary changes. References o CVE-2016-7946 o CVE-2016-7945 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUImckNZI30y1K9AQj5pxAAmKFT7Qj5dsoyJ5NgACcAzJkMZNYghPQL qNKRggUuiMOfCJfwJwbMWmLmILDiDasSR0P7DlDZXVN+vWpjExG90U6KhpimcdDm u3XneyZaKR1WBLalpPk8jVo6G+ZWwx+Wh7Q/fRZOJC0XxCi3uD70Dmb3nLnwloyz JaxLYbXJ7nvb3nz9ftC3dLU0jWjvYwDxZT/h8RqVXZ16fcDjuQJ8/0g0/CbIGXXm HIUrOOcnXjfQBNcf+lv+ElTCNqUIaVwBN4n1UkcJp351tpSR3VF0g9kaGo2BOjzx fqQ6ZAjACdfvs4h44OB2ffOAOWsEuhXsgCWvwIgRxtRigZ0iAsSbDHoqAl+BUU7P HpxiW6NIPi2fKDhyVkG0/3bOvpjIF2r1OnRKBx+OxBZJXxfWO2fW/5P6GNZVL75n +/N9Jb33mdo7Fxfta7j9gT4npbmSy1vbAjTRq9IDTMRPVuBdCJ4Pmte5Iy7SPJ2s EmNKDaRp3fasCDX+J7vKbe5Vlw+is476BZiQZX0+Qghw8mIcoUTwQSAS5Nudt5O+ fbs5mmmnZ4BX3NvbBGL73+BjCMxpY259ba2TJu3SBdDKewnLnNSkboB/E5JdXXme IdssBTWDButfHjm0MgPlaCBxuDixUPIS5fnWaMVU+PDdAZKvd8C2/KpiNq5qg4A3 CrnrcA5HQM8= =46Cw -----END PGP SIGNATURE-----
2022. szeptember 29.

ESB-2022.4837 - [Ubuntu] PostgreSQL: CVSS (Max): 8.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.4837 USN-5645-1: PostgreSQL vulnerabilities 29 September 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: PostgreSQL Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2021-32027 CVE-2021-23214 Original Bulletin: https://ubuntu.com/security/notices/USN-5645-1 Comment: CVSS (Max): 8.8 CVE-2021-32027 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- USN-5645-1: PostgreSQL vulnerabilities 28 September 2022 Several security issues were fixed in PostgreSQL. Releases o Ubuntu 16.04 ESM Packages o postgresql-9.5 - Object-relational SQL database Details Jacob Champion discovered that PostgreSQL incorrectly handled SSL certificate verification and encryption. A remote attacker could possibly use this issue to inject arbitrary SQL queries when a connection is first established. ( CVE-2021-23214 ) Tom Lane discovered that PostgreSQL incorrect handled certain array subscripting calculations. An authenticated attacker could possibly use this issue to overwrite server memory and escalate privileges. ( CVE-2021-32027 ) Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 o postgresql-9.5 - 9.5.25-0ubuntu0.16.04.1+esm1 Available with UA Infra or UA Desktop In general, a standard system update will make all the necessary changes. References o CVE-2021-23214 o CVE-2021-32027 Related notices o USN-5145-1 : postgresql-doc-12, libpq-dev, postgresql-plperl-12, postgresql-doc-10, libecpg6, postgresql-pltcl-10, postgresql-server-dev-12, libecpg-compat3, libecpg-dev, postgresql-plpython3-12, postgresql-pltcl-12, postgresql-12, postgresql-server-dev-10, libpgtypes3, postgresql-plperl-10, postgresql-doc-13, postgresql-pltcl-13, postgresql-10, postgresql-plpython-10, postgresql-client-12, libpq5, postgresql-plpython3-13, postgresql-13, postgresql-client-10, postgresql-client-13, postgresql-plpython3-10, postgresql-plperl-13, postgresql-server-dev-13 o USN-4972-1 : postgresql-doc-12, libpq-dev, postgresql-plperl-12, postgresql-doc-10, libecpg6, postgresql-pltcl-10, postgresql-server-dev-12, libecpg-compat3, libecpg-dev, postgresql-plpython3-12, postgresql-pltcl-12, postgresql-12, postgresql-server-dev-10, libpgtypes3, postgresql-plperl-10, postgresql-doc-13, postgresql-pltcl-13, postgresql-10, postgresql-plpython-10, postgresql-client-12, libpq5, postgresql-plpython3-13, postgresql-13, postgresql-client-10, postgresql-client-13, postgresql-plpython3-10, postgresql-plperl-13, postgresql-server-dev-13 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYzUIf8kNZI30y1K9AQie/RAAmJ11YEkV/KTuSu6HXHmhq/aWdOk3usgq R2On4hmCw2qH6dZ+5K6qaQXhq/HgBUC64L6iL8nPbgpxwPJ5Uv4r4XqEK0DChiPA /cbVBfOSRriQTbWPqefArfjoybr73Z88IBg2Wiy/TScTBoFCbIJzzIonoJKir571 GspioVBbnC1Wgre/uD9h3G6V+YJ195IEC2Mpa1UKNmIeY7bCsK7b5YZGWTsFqDwp vagKyS6aOvkFRUlP1iCAUPyD/VnxAds7TxyiRTp89lvglEf5AlQLawNkME7a8rUC X5tpkKQJdwM6vH7vZPXHvLGWSq/80Kz0SXdU/Y2CQh9LdGtNqOfhEkCWLQo7UzM0 R9evdJlwIwYsAdLk1r1Nlq+nH7RiYc65WWBVUSnGFRxIYbu/JxlUYa5F+edTOcV+ EqV702p4Mds69e+whK1fAderv896FANm6gCpQNeOpP+65sieWFFkybHO0e6vkwtu HCxQDmDaOtUnwY71jJ3qQW5CeRV/K+GFzNfjEkdM7ofOzsdVD+sJzDiUhe+5qW0A uSKMu/pzrGeD/tt+IqGTN7taVNPJHiO8jWbrBRX3S4zkHxuqSrED1KzaT8ZJBgby La5vl/0Ilwj6kCQ7ve7ze8aMxWZ6G3Si9KqQvLyqscwW55Dys3Bdn7Ru3wgVyMvo fxFb8vZPOmg= =h/WW -----END PGP SIGNATURE-----