AusCERT - Security Bulletins

Subscribe to AusCERT - Security Bulletins hírcsatorna
Latest published security bulletins. See https://www.auscert.org.au/rss/ for feed information.
Frissítve: 2 óra 47 perc
2022. május 20.

ESB-2022.2475 - [RedHat] Red Hat OpenShift GitOps: CVSS (Max): 10.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2475 Red Hat OpenShift GitOps security update 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat OpenShift GitOps Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-29165 CVE-2022-24905 CVE-2022-24904 CVE-2022-1271 CVE-2022-1154 CVE-2022-0778 CVE-2021-41617 CVE-2021-25219 CVE-2021-4189 CVE-2021-3737 CVE-2021-3639 CVE-2021-3634 CVE-2018-25032 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:4690 Comment: CVSS (Max): 10.0 CVE-2022-29165 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat OpenShift GitOps security update Advisory ID: RHSA-2022:4690-01 Product: Red Hat OpenShift GitOps Advisory URL: https://access.redhat.com/errata/RHSA-2022:4690 Issue date: 2022-05-18 CVE Names: CVE-2018-25032 CVE-2021-3634 CVE-2021-3639 CVE-2021-3737 CVE-2021-4189 CVE-2021-25219 CVE-2021-41617 CVE-2022-0778 CVE-2022-1154 CVE-2022-1271 CVE-2022-24904 CVE-2022-24905 CVE-2022-29165 ===================================================================== 1. Summary: An update is now available for Red Hat OpenShift GitOps 1.5 in openshift-gitops-argocd container. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications. Security Fix(es): * argocd: ArgoCD will blindly trust JWT claims if anonymous access is enabled (CVE-2022-29165) * argocd: Symlink following allows leaking out-of-bound manifests and JSON files from Argo CD repo-server (CVE-2022-24904) * argocd: Login screen allows message spoofing if SSO is enabled (CVE-2022-24905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2081686 - CVE-2022-29165 argocd: ArgoCD will blindly trust JWT claims if anonymous access is enabled 2081689 - CVE-2022-24905 argocd: Login screen allows message spoofing if SSO is enabled 2081691 - CVE-2022-24904 argocd: Symlink following allows leaking out-of-bound manifests and JSON files from Argo CD repo-server 5. References: https://access.redhat.com/security/cve/CVE-2018-25032 https://access.redhat.com/security/cve/CVE-2021-3634 https://access.redhat.com/security/cve/CVE-2021-3639 https://access.redhat.com/security/cve/CVE-2021-3737 https://access.redhat.com/security/cve/CVE-2021-4189 https://access.redhat.com/security/cve/CVE-2021-25219 https://access.redhat.com/security/cve/CVE-2021-41617 https://access.redhat.com/security/cve/CVE-2022-0778 https://access.redhat.com/security/cve/CVE-2022-1154 https://access.redhat.com/security/cve/CVE-2022-1271 https://access.redhat.com/security/cve/CVE-2022-24904 https://access.redhat.com/security/cve/CVE-2022-24905 https://access.redhat.com/security/cve/CVE-2022-29165 https://access.redhat.com/security/updates/classification/#important 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYoW2y9zjgjWX9erEAQgI0A/7Bsyo23H2bp/kw2tiSl4Zeg1lhoT/MDRI W8ZJ8kspFLyvbIyhl2fj97idEl7iDdP0WCT1gCsTToNxtJPIiB1GNDFAxIhSdIlX J0sZ5QoulsahLZEc0aKnauxq0bZ2iqDjHhxKEaalg2PkMTW2YWVyLk7/WSRjRs3c psY1oFVMA5f4jKRZNrOwBTty54rbWOnsbO4L7IK0hgqUiSY6GAIwVA6AKZp72eOy FA+Dg1G+GCkehfLFqjakR7qGXkk2IDchCELf7Yk7FfqZjYhdRzSKlcBAzxvnIlzI WUs96He5+G/zdO8PER0Mis6mZMFwgaQErdRbT2CXuPqj8vACDy9g5+zdhw/H06id mGexyNjSl9af+ikSfzKkfY6hR9o+Jwj7V098Vg10SRNduVk+9Mn1MDVAcnW55Nw0 on1qI0mDLxBiOIXctSn4ZexnzkGU4FoQNFUyd0C5BElGjPAG7N7tQuSSwE/A2vgW Cf3ieKezraFVwaeAjpKw8Gspb2mpuX3gAh50mA6xbC7SuKPgYcaqvHREelVKoGo+ Yp94WI/s5tqVtSX0hn3FAATchNAQX1XseY2c0GsxZzp8pJup/VKezn2mIGyXIXPc Huhdg1xXTS/DXYLFWfGxv23fCVmS2mF8v2eqvWuFuMhX7FZc6ZKOHBvIPRLWiuRI Tjt+93XZDLo= =+CIE - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobWvskNZI30y1K9AQh6NA//UxDTeShizDO6HSACvw3zMq029fVajljc MS67YGkPrHqSTfwIqVapRqjbIuhmD2vyBekEE6D1Gbj8G7BvNnfZydJ1N0FsdoDH gNKt/YvQmljG0SjtD7hselU/n/4PcRauC9iQL3FkKXZAvlmnFIvbE9ZEKeHeDJfo WGNSwbbCh0AP3j01v+H3pJaLi295ff/S1TqYWBuog/+i9iUSl90PjNumRlUq1N+8 bIe209Ia9ux1he+dD7nERKeE5bCXNHYeoZEUtAujhX0uYOCQyK/CFGSSIVTjKClB FLw3jIV7dhNs4tE7LCAtRtr8Vl041/ttwM0j/zzjhNTW6HpGB7xvmQwnljrkR87T OBKhERpWf+nVJBG/Vyi1+Wq2l6waESXoVRI3YWt8JPkcmnEgy+8lDtdzbDQRzDpb PQwd0/WpNOEeC0Fo0bigC4X/VOQ/BbNoNWf5WYg2ozLiFCDmmkgiAlgVsjAXpcKJ YHlHrWvzBO6S9zV7DIQ2YSTEOnXyzSYoYIWOPe8TQ4JPobr4thaWsjiO2TSQDc8T RGGW5mfpkqESeQO7nnz2ODZ0nCb+tX4MK0prZG85FbtrzmTZEBNZQW7kSUNCDTt7 vFHDuBv/bAKIR6c6ptg3vsRGQKuHvN52gOnmXcUDwyaxiFF8Qkc7DMNz+tkuR0zM DB5jVZCOm7k= =mrwQ -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2474 - [RedHat] Red Hat OpenShift GitOps: CVSS (Max): 10.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2474 Red Hat OpenShift GitOps security update 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat OpenShift GitOps Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-29165 CVE-2022-24905 CVE-2022-24904 CVE-2021-41617 CVE-2021-4189 CVE-2021-3737 CVE-2021-3634 CVE-2018-25032 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:4691 Comment: CVSS (Max): 10.0 CVE-2022-29165 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat OpenShift GitOps security update Advisory ID: RHSA-2022:4691-01 Product: Red Hat OpenShift GitOps Advisory URL: https://access.redhat.com/errata/RHSA-2022:4691 Issue date: 2022-05-18 CVE Names: CVE-2018-25032 CVE-2021-3634 CVE-2021-3737 CVE-2021-4189 CVE-2021-41617 CVE-2022-24904 CVE-2022-24905 CVE-2022-29165 ===================================================================== 1. Summary: An update is now available for Red Hat OpenShift GitOps 1.3 in openshift-gitops-argocd container. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications. Security Fix(es): * argocd: ArgoCD will blindly trust JWT claims if anonymous access is enabled (CVE-2022-29165) * argocd: Symlink following allows leaking out-of-bound manifests and JSON files from Argo CD repo-server (CVE-2022-24904) * argocd: Login screen allows message spoofing if SSO is enabled (CVE-2022-24905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2081686 - CVE-2022-29165 argocd: ArgoCD will blindly trust JWT claims if anonymous access is enabled 2081689 - CVE-2022-24905 argocd: Login screen allows message spoofing if SSO is enabled 2081691 - CVE-2022-24904 argocd: Symlink following allows leaking out-of-bound manifests and JSON files from Argo CD repo-server 5. References: https://access.redhat.com/security/cve/CVE-2018-25032 https://access.redhat.com/security/cve/CVE-2021-3634 https://access.redhat.com/security/cve/CVE-2021-3737 https://access.redhat.com/security/cve/CVE-2021-4189 https://access.redhat.com/security/cve/CVE-2021-41617 https://access.redhat.com/security/cve/CVE-2022-24904 https://access.redhat.com/security/cve/CVE-2022-24905 https://access.redhat.com/security/cve/CVE-2022-29165 https://access.redhat.com/security/updates/classification/#important 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYoW2xtzjgjWX9erEAQg+Dw//Sz7EYdBs7gg3YPbXIEYK189PeBAgGVHm x2r4lCqZyWthN/nXDjEaOi6WQLP9SjOQm4QGp28/JTkkaHdXFNrIaNUUfweW+HvM 3hTPs6cdheB9/Vt+57Az+z5Jw2xUotyA23tLVPW/Gi7gWP54wPZG8KpdE8aVhA1w EWpNH27WbzPDxI02a2d1upU7UeclGJvNofWTGiSwPO6DbSULbVin/owgjwMbDJVH CVI8oxrL7S0WVFHfsTqWh9yRgtMqaBYlFS5L3cTH6b+05zb9Zi6+8fox+a/QQbDt oNcii89Jiosi/yt387cUmeAK3sgK7HcHhpY9D/eGJU7OjWaz2xpkOpBOC6a3enpB OWhOCknLKVL73LSFAnG2GuFpGdiTjYYq3Vk7Wot3k7qeDeVSQqgTcJKFGZAhSCjb PjKnHPftVB1+sK9QRQh1GwN/V74Y3tjTJYEs/ulRnG5n4lwyvy94QUa+rDBEVhnN q07pIy8or0j5WLVKo3SGp55ayowuy/opvzEEReDf4gWMdtCL6wIJ/J08ckna3HsK H1EJJe361ytg2APxp0BJIE65o4Siyp26QBHX9ySGdRjUbRC/PW+bKr/VXDxSbURX xGi19UMLT183Gq4lYfo1CgAFpJ3iMTQkKERVy9FAi5rm/XYGJgvz1ypAqxvUYMRW LpTZZZKm6P4= =qP77 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobWiskNZI30y1K9AQiF8Q/9Gbqa0LTcgyAOT87Z7wWIZRbI2Ugzq3UH MjdX1YNIZ5bQioQsF5FFl/5RxDpsau7A4uWqMyBr9Md0SvE3Ze828nZrmchTlcff z5kfQQH7QwUUFxo9T2Y+Vh6VvSNXH/KjarOOkBvncOVCqNNFHxZDCOlIuh763yFT 8hCDnwu3s8Vfgej6NmZ3Ft9dpSqtXyFH7aoqrsQkH0pLAfMZxPIKhgf+P+vDvreI YbypuyqoZ3S+lHztsRNyhMKZliOu+n7yrZ7eswGxC9z+AwRHfXUF/RbsX0c0pqm/ MUKPDkds1wupfOwWYv2CDHF7Trcu2usB+3vyZFbZd/Tu5K6vdpuT+noT+JQ63FtK qBlAoXEMcdNkgBEmhRGtPKpy6ZbZMmby8iorDNDBJ26EW6w011I4f0/T6ltoOZBV EQ0LlMKy8yZDSFdKwjOIb6GTo+HfiCGId5WkLNwGnfFCkppOeGELpdBml0Wyxm8D brdm0TaH6upLga975G8etjUxZfq0c+UcorlbpDOK5metdRQ2SAaV6ilgQcYFZaGh L7VzOgnQfyVkJtLKrirIOas+iOz/5WOZ0JbM4tG3cbea1ddN0F446C4+vikbse5T N8N6ray8PEuDWnFNy25+L5ffpR9VBXBYVRG7IsAewOB+PFmoAeuqMOqBHtb1vtSw uuiJf1h/1bU= =6nvq -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2473 - [RedHat] Red Hat OpenShift GitOps: CVSS (Max): 10.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2473 Red Hat OpenShift GitOps security update 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat OpenShift GitOps Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-29165 CVE-2022-24905 CVE-2022-24904 CVE-2021-41617 CVE-2021-4189 CVE-2021-3737 CVE-2021-3634 CVE-2018-25032 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:4692 Comment: CVSS (Max): 10.0 CVE-2022-29165 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat OpenShift GitOps security update Advisory ID: RHSA-2022:4692-01 Product: Red Hat OpenShift GitOps Advisory URL: https://access.redhat.com/errata/RHSA-2022:4692 Issue date: 2022-05-18 CVE Names: CVE-2018-25032 CVE-2021-3634 CVE-2021-3737 CVE-2021-4189 CVE-2021-41617 CVE-2022-24904 CVE-2022-24905 CVE-2022-29165 ===================================================================== 1. Summary: An update is now available for Red Hat OpenShift GitOps 1.4 in openshift-gitops-argocd container. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications. Security Fix(es): * argocd: ArgoCD will blindly trust JWT claims if anonymous access is enabled (CVE-2022-29165) * argocd: Symlink following allows leaking out-of-bound manifests and JSON files from Argo CD repo-server (CVE-2022-24904) * argocd: Login screen allows message spoofing if SSO is enabled (CVE-2022-24905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2081686 - CVE-2022-29165 argocd: ArgoCD will blindly trust JWT claims if anonymous access is enabled 2081689 - CVE-2022-24905 argocd: Login screen allows message spoofing if SSO is enabled 2081691 - CVE-2022-24904 argocd: Symlink following allows leaking out-of-bound manifests and JSON files from Argo CD repo-server 5. References: https://access.redhat.com/security/cve/CVE-2018-25032 https://access.redhat.com/security/cve/CVE-2021-3634 https://access.redhat.com/security/cve/CVE-2021-3737 https://access.redhat.com/security/cve/CVE-2021-4189 https://access.redhat.com/security/cve/CVE-2021-41617 https://access.redhat.com/security/cve/CVE-2022-24904 https://access.redhat.com/security/cve/CVE-2022-24905 https://access.redhat.com/security/cve/CVE-2022-29165 https://access.redhat.com/security/updates/classification/#important 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYoW2wNzjgjWX9erEAQiV5A//RplnmRc7IXZjGkwntbddhbl+lIErrNPv omVjG54n0mmIUEY4P7s+ROES2yZbtjZsmwPEpSd29GWnTc0hZiTafqGpfKjDfvbJ ythyf261GT85ItfBNVpYL2dIJVEreIM+otFcHYm+Y+Otl3Etee58BB5c/A78rY0m BdrwiLstzDK9nRLDCvVZ4fQFEaezyXYNKdaNgg66lNXF2z/jC4OI1gUUTb/DnmPb 8Ha2hqvouTZIdn+oOIb0I3L0CBzo2SZKNJ5bec+lqWjxvE2BFOlQxI7t7BF8AmCC Qb7GowrUhEtoY85cXHLH0D05JXfKYL8zFFzHtCOwDkED5MaSObHtNVxKcpK+Te3X YuI7M8IsabMCo+cdY9uKokXisP0npoRdydKapANns/pASVfRe4df99Rwo2e1gNKs ITJaSmpj72uuAQ4fylfaxI5I7jL8NA9slQNjevNUuddsBrb/eG0JyRSFsEjVaYWL NSs4tPuJimWN2qQ3ohpLgs3AyYBFyl1Y8zPpwnGCiS7xYnWCfgT22v7FETnXZEjF bnx4qa6dFVHEnvIdcAKqeVtnV7/TQVdUCPYGUOycPh3jKih84gJFcu/HwVMq6DLu xcKw9dqLgB3B7MNNRIW2Q8NesO3D1OHtS/1wj9uk01USq9wj4SzehXZM9odIZMTF 2lPfQMqnP48= =di4z - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobWVckNZI30y1K9AQiEyQ//VI+Jrb3q+LHNjvdL8UnYxpP4BFcupIs+ Aqikyku9jktFYBNAJLy1o7GSdxyWy5rLuciYUzJ78ucSyI+/RvMFZ2qz4cg5Fg35 dnpoSqnOvfCqwQ044atb2dtuyA+gKehDKTnZFQi2seeZzP4bBj6YDY6uGJ9f6DLP w3i7BYy6oPPdRf8TpVZKWtnP2NLsoHCo3OsN53v/aTia4JAdWnUGsm5YSYerdkga NYVXsC4ejcpsb7z+yyT9YMTABMsowrEYcD6F9xTBAVjZS9HvKB944oSaWC5jrq0m 2pYHrw6vU3oCpx4RamOn6v93W3pllnjGSRcQOolZD9eJ81xltWGb/PbZ4UGv6A43 SRza6jJ4XKsdcrV6yHyPCBFRRgM8mJHnIDvgEQalWm40U2WOXo2at9E2plkideqp PAB1Ru9WMGUR+3OXlgXsLd+bg7qVubMIxXHNRPGgUZsm3+QsbLxf+QW2GlqzRLyb yxeGENOd9R9oeKV8kO+4jQIaPAJAo18OLzH8AiRTcSePP2yP00JnOLHqyGUpzS4m 40JUIaeHyoW4KmX8GEs0XbHazuDwf6Zf39Q1STUbBHjECc3d0vWKsWqdzyEn/GpN MFJb1xD8ZaQnNm1Mq3HjToBYYhzUb7LDoTx3rgyYHKpIxOlUPMzBknaCf9MfkuYY 2U5cA/v8Ag8= =8W4D -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2472 - [RedHat] OpenShift Container Platform 4.9.33: CVSS (Max): 7.3

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2472 OpenShift Container Platform 4.9.33 packages and security update 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: OpenShift Container Platform 4.9.33 Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-29047 CVE-2022-29046 CVE-2022-29041 CVE-2022-29036 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:2205 Comment: CVSS (Max): 7.3 CVE-2022-29047 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: OpenShift Container Platform 4.9.33 packages and security update Advisory ID: RHSA-2022:2205-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2022:2205 Issue date: 2022-05-18 CVE Names: CVE-2022-29036 CVE-2022-29041 CVE-2022-29046 CVE-2022-29047 ===================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.9.33 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Container Platform 4.9 - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.9.33. See the following advisory for the container images for this release: https://access.redhat.com/errata/RHBA-2022:2206 Security Fix(es): * Jira: Stored XSS vulnerabilities in Jenkins Jira plugin (CVE-2022-29041) * subversion: Stored XSS vulnerabilities in Jenkins subversion plugin (CVE-2022-29046) * Pipeline Shared Groovy Libraries: Untrusted users can modify some Pipeline libraries in Pipeline Shared Groovy Libraries Plugin (CVE-2022-29047) * credentials: Stored XSS vulnerabilities in jenkins plugin (CVE-2022-29036) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. All OpenShift Container Platform 4.9 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html 4. Solution: For OpenShift Container Platform 4.9 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html 5. Bugs fixed (https://bugzilla.redhat.com/): 2074847 - CVE-2022-29036 credentials: Stored XSS vulnerabilities in jenkins plugin 2074850 - CVE-2022-29041 Jira: Stored XSS vulnerabilities in Jenkins Jira plugin 2074851 - CVE-2022-29046 subversion: Stored XSS vulnerabilities in Jenkins subversion plugin 2074855 - CVE-2022-29047 Pipeline Shared Groovy Libraries: Untrusted users can modify some Pipeline libraries in Pipeline Shared Groovy Libraries Plugin 6. Package List: Red Hat OpenShift Container Platform 4.9: Source: cri-o-1.22.3-6.rhaos4.9.git388405c.el7.src.rpm x86_64: cri-o-1.22.3-6.rhaos4.9.git388405c.el7.x86_64.rpm cri-o-debuginfo-1.22.3-6.rhaos4.9.git388405c.el7.x86_64.rpm Red Hat OpenShift Container Platform 4.9: Source: cri-o-1.22.3-5.rhaos4.9.git388405c.el8.src.rpm jenkins-2-plugins-4.9.1651754460-1.el8.src.rpm jenkins-2.319.3.1651752848-1.el8.src.rpm aarch64: cri-o-1.22.3-5.rhaos4.9.git388405c.el8.aarch64.rpm cri-o-debuginfo-1.22.3-5.rhaos4.9.git388405c.el8.aarch64.rpm cri-o-debugsource-1.22.3-5.rhaos4.9.git388405c.el8.aarch64.rpm noarch: jenkins-2-plugins-4.9.1651754460-1.el8.noarch.rpm jenkins-2.319.3.1651752848-1.el8.noarch.rpm ppc64le: cri-o-1.22.3-5.rhaos4.9.git388405c.el8.ppc64le.rpm cri-o-debuginfo-1.22.3-5.rhaos4.9.git388405c.el8.ppc64le.rpm cri-o-debugsource-1.22.3-5.rhaos4.9.git388405c.el8.ppc64le.rpm s390x: cri-o-1.22.3-5.rhaos4.9.git388405c.el8.s390x.rpm cri-o-debuginfo-1.22.3-5.rhaos4.9.git388405c.el8.s390x.rpm cri-o-debugsource-1.22.3-5.rhaos4.9.git388405c.el8.s390x.rpm x86_64: cri-o-1.22.3-5.rhaos4.9.git388405c.el8.x86_64.rpm cri-o-debuginfo-1.22.3-5.rhaos4.9.git388405c.el8.x86_64.rpm cri-o-debugsource-1.22.3-5.rhaos4.9.git388405c.el8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-29036 https://access.redhat.com/security/cve/CVE-2022-29041 https://access.redhat.com/security/cve/CVE-2022-29046 https://access.redhat.com/security/cve/CVE-2022-29047 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYoWMv9zjgjWX9erEAQjBwxAAopw+4MTZjvvbOHIRrXtrLwAbS9p8duS5 3V0/WLw4HSU81A2HPc0dq2BdyTolwJSoUETRfX40rcTVuf6qVaTa+A2xS9EzyTbU 6ofmi6Vcj6kg3vXX/oCkbM12ePMeYWbB/LWj40SkcclfVV2cdhOdrxPJFAb/Hwa2 f8swosCFKNuI52N+KdVGNdz7gQ3YLj0JTtYMbzRBWyAGGfOXPwuyQST5en42w2kG ZfszY5IWdhEM6yEIZc4OcsSZSyBsfe8ZgrvhLspzOGJuGcmECoKI3TrKnAGNxfI8 tahqIpCTd/DfMKqrXe+ZCLgY7fLPB5TSMgRLMedpTsVuFLMw1hB+kjDUDLfhZExw z4yb9J3bQgxJ6K7grfE8WzLhUB081hW+59Yp5I6FyKyEv3xRx0u9JowGoUpaBIAx oOPm7zDh0tW5rHaMqhQUaLXh+x/ZosnyS4H/QF0FP/MIxO5hLATA9JtRUB8QPF8c CbL1FL4mdZQoLcSThZoGLp6tcNriRLMv+qKKgfYHEi23/6rilAWqundsHSmJZiq6 NCMXrniEJ8nIDCWEdpwcb4ZNLxhVVXu/5iDlTq4NJRD8ITR+8CV7OY0XZiT7AXIG mFrTQNsohQA/E1yA/hssJuL3duKylWJE9bhEv/xCFtYZ3sd7uCJ5YoIulQxs37C2 jyk0h3fqxN0= =RQOP - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobWC8kNZI30y1K9AQjZMRAAi/AB9n0HTt9DZRseTM5hu0CEz95E5iHy gJBKCRwUj2LoUqgAQcqCxmcxjJ6/Ev4ydrHv4ADHjLk+q1AQh/51tZU/9AiiYvnB o6+ZFp1Xom5LUsSmcoG7/wxV1fsVqSokcGuqcE4ssfGoUIo0ckyfROVT9TNPV3Ro +NAxa8wryhU1AAM8Y7vfyC9b2RqdG+YKjH+6IZ/0et+P6qRqr73DzoNqN7PB7KLs JXSocYbP5hYrOmwAS3EZTBV5D07CWSM5mvyhKBo4nSLJi9dCPUuJmtaD0v80L+Qa 3S8Ehi3xeEZLY9HqFi6v1jKAq1Yx0dp7Uc0aZEp5P4R8eYHFH34Ow3HzYD7K8OW6 RoZs+kXXYT550PM4NL1qEs25uYkT/r5TSLO+s8N/gO1GgdVKY3heABp9vFLR/Guo hexGW5ndfxTUz8QUOHckN/yMbTUiYc+4RaBGroyjD9zmhYrNPBicMYzyERc69CrK FsrLMahe7wxAhpVmgU8jTtE08Z5jwH6jsoBXgHbgaryZoubs1IhZRXCDtDE7iBae v7zmZ4+08AbbLbSvs2JRi/k7u9w4ezZibm0C90J4hvA+P8iKrQch+RhVlFeHN2if 4fwzAdgiKA0g0YkvqlnsZwHp3hKAl8mcVr3bL83RsK+hB300zMY3GkNHDoT65f7f BGkutuefDLg= =GsLq -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2471 - [RedHat] Red Hat build of Quarkus 2.7.5: CVSS (Max): 9.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2471 Red Hat build of Quarkus 2.7.5 release and security update 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat build of Quarkus 2.7.5 Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-21724 CVE-2022-21363 CVE-2022-0981 CVE-2021-43797 CVE-2021-29429 CVE-2021-29428 CVE-2021-29427 CVE-2021-22569 CVE-2021-3914 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:4623 Comment: CVSS (Max): 9.0 CVE-2022-21724 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat build of Quarkus 2.7.5 release and security update Advisory ID: RHSA-2022:4623-01 Product: Red Hat build of Quarkus Advisory URL: https://access.redhat.com/errata/RHSA-2022:4623 Issue date: 2022-05-18 CVE Names: CVE-2021-3914 CVE-2021-22569 CVE-2021-29427 CVE-2021-29428 CVE-2021-29429 CVE-2021-43797 CVE-2022-0981 CVE-2022-21363 CVE-2022-21724 ===================================================================== 1. Summary: An update is now available for Red Hat build of Quarkus. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For more information, see the CVE links in the References section. 2. Description: This release of Red Hat build of Quarkus 2.7.5 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Security Fix(es): * gradle: information disclosure through temporary directory permissions (CVE-2021-29429) * gradle: repository content filters do not work in Settings pluginManagement (CVE-2021-29427) * gradle: local privilege escalation through system temporary director (CVE-2021-29428) * smallrye-health-ui: persistent cross-site scripting in endpoint (CVE-2021-3914) * Quarkus Resteasy component may return Resteasy implementation details * netty: control chars in header names may lead to HTTP request smuggling (CVE-2021-43797) * jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes (CVE-2022-21724) * mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors (CVE-2022-21363) * quarkus: privilege escalation vulnerability with RestEasy Reactive scope leakage in Quarkus (CVE-2022-0981) * protobuf-java: potential DoS in the parsing procedure for binary data (CVE-2021-22569) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. The References section of this erratum contains a download link for the update. You must be logged in to download the update. 4. Bugs fixed (https://bugzilla.redhat.com/): 1949636 - CVE-2021-29429 gradle: information disclosure through temporary directory permissions 1949638 - CVE-2021-29427 gradle: repository content filters do not work in Settings pluginManagement 1949643 - CVE-2021-29428 gradle: local privilege escalation through system temporary directory 2018015 - CVE-2021-3914 smallrye-health-ui: persistent cross-site scripting in endpoint 2031958 - CVE-2021-43797 netty: control chars in header names may lead to HTTP request smuggling 2039903 - CVE-2021-22569 protobuf-java: potential DoS in the parsing procedure for binary data 2047343 - CVE-2022-21363 mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors 2050863 - CVE-2022-21724 jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes 2062520 - CVE-2022-0981 quarkus: privilege escalation vulnerability with RestEasy Reactive scope leakage in Quarkus 5. JIRA issues fixed (https://issues.jboss.org/): QUARKUS-1376 - Quarkus Resteasy component may return Resteasy implementation details 6. References: https://access.redhat.com/security/cve/CVE-2021-3914 https://access.redhat.com/security/cve/CVE-2021-22569 https://access.redhat.com/security/cve/CVE-2021-29427 https://access.redhat.com/security/cve/CVE-2021-29428 https://access.redhat.com/security/cve/CVE-2021-29429 https://access.redhat.com/security/cve/CVE-2021-43797 https://access.redhat.com/security/cve/CVE-2022-0981 https://access.redhat.com/security/cve/CVE-2022-21363 https://access.redhat.com/security/cve/CVE-2022-21724 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=redhat.quarkus&downloadType=distributions&version=2.7.5 https://access.redhat.com/documentation/en-us/red_hat_build_of_quarkus/2.7/ https://access.redhat.com/articles/4966181 7. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYoWMuNzjgjWX9erEAQg8tw/+NfxQRsVczGyCt5Uecmukk19/AYn9XuRY LYGUv7/vtpRZHESqrOw/uIO0INZuNOnp6VArMDwvDga9HcfHFFZZkHpg5v9ZgNdT NXzi0V7oXADiEFF9GZHWN8T6DS2/bw1CeC64K3cAgiAdBqBpGJDIlBnyAym+Qzqf qpvEDGL7BIVXpsqDIKdSSkbBjGqL5xPaeRJQrXY4caxUtN8cV0Wq07dF86a73Yil 8m9LcRmkXrMYjm9VIbUg+2EcIuJQHYgBOkJKGiRTB/3AQaqhFuc1MVGGYo/d8Mel IGeG34buEv2oovpoJcnLF992qu+obUMuXskcO8z4sVxFFEl/cJxEWfSnWgz3KAzw cNXv7vZd40Qm2PwcvH0casK1LavEMpqN/1/DzJtMZ33F2+20LL7ZjK2TRbkx2HG4 7uXrZ1U+rUBVEoX23BPtJBbqxN7/Bb24dX6LPfojgWPwYekT/nHkwMQuHb2YHShH ePfqtZidb8HMFVIUNNpey1JoKu01vVNQXmQi9xJqSPJmk8lKlnONTKWXrDkOHC5j c9QsDziNvp1TH0eXz17iySDTf6lFI3uDsNEPwkjCXWLHK/dELQQVBMZXWKzzoJQD TumZO1D6fXUBq0jb8wZhugD0XO3UpqG8zTJqn8yGxu1WBuf3QE4lYPS4CNBAn58D NdRgfmXR4KQ= =Kqt+ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobV2skNZI30y1K9AQhtug//fHnX/yfZ6pRpCm8+muhUQoyTd2crkVEQ lWLcYippr5ELZr2Y4D6r/cqMrWTEBnTMHzZ+s/nuwW5hMKefVpsKoMGQRn46tSwc b9web1Tr1Sr6C6pCt2NxAnfBqIRGbEd1UrIq2cyyC5M5LibLMPCyyRodIfhOkWQj E8YhLlMnDx28gkxJwEqDwZ3hlPAdAANV8W21CbAESyKiHb0RMJMERZy9yIZc4Spy qVYIAX87o0+cZ4+/Okhmi+NUhdW7mLkkJ8CjAP8Tiz3ocA9se9QitP0faQH2tF9F iahVnGQzq3EGOBGk8sKxh7xhRId+nqagRkGhtTkDEPa4NGwQdzf2Ur5U9A9uNVdN oLTDgITDS7iuX7aJL8xpU5rLEf/612c4oC0dC9bVZZ/8ww5XZ5ruwBktKwwHvZvB 4O6hiHdo3k7FDPFtdgFZg3BsvB1XeFn19Bk8PrhVrSl5aujxJ8D6E4b3vt/B2JWM BGNlCn2YMdLQasLlsTrrxssPLCGaxiy9od0CB/wm8Z2FNuBXbZHa3AGVdyB1+NvV gEtf2jynUvo2vl6dHMQa7UbDPYsQNhzmAxREqLgKVH+eRyceXAf14n1D66eE3GLe PjNlonWbLmuK/7Q+qA02tSdsanCGij5DvzC4lb5JEHjnUqP/pH9P2KVaojkKKQCQ QkXuyUXuYr4= =KMr1 -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2470 - [RedHat] container-tools:2.0: CVSS (Max): 8.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2470 container-tools:2.0 security update 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: container-tools:2.0 Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-27651 CVE-2022-27649 CVE-2022-1227 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:4651 Comment: CVSS (Max): 8.0 CVE-2022-1227 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: container-tools:2.0 security update Advisory ID: RHSA-2022:4651-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:4651 Issue date: 2022-05-18 CVE Names: CVE-2022-1227 CVE-2022-27649 CVE-2022-27651 ===================================================================== 1. Summary: An update for the container-tools:2.0 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream EUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * psgo: Privilege escalation in 'podman top' (CVE-2022-1227) * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2066568 - CVE-2022-27649 podman: Default inheritable capabilities for linux container should be empty 2066840 - CVE-2022-27651 buildah: Default inheritable capabilities for linux container should be empty 2070368 - CVE-2022-1227 psgo: Privilege escalation in 'podman top' 6. Package List: Red Hat Enterprise Linux AppStream EUS (v. 8.2): Source: buildah-1.11.6-8.module+el8.2.0+14896+bf621b2a.src.rpm cockpit-podman-11-1.module+el8.2.0+14896+bf621b2a.src.rpm conmon-2.0.6-1.module+el8.2.0+14896+bf621b2a.src.rpm container-selinux-2.124.0-1.module+el8.2.0+14896+bf621b2a.src.rpm containernetworking-plugins-0.8.3-4.module+el8.2.0+14896+bf621b2a.src.rpm criu-3.12-9.module+el8.2.0+14896+bf621b2a.src.rpm fuse-overlayfs-0.7.2-5.module+el8.2.0+14896+bf621b2a.src.rpm podman-1.6.4-24.module+el8.2.0+14896+bf621b2a.src.rpm python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.2.0+14896+bf621b2a.src.rpm runc-1.0.0-65.rc10.module+el8.2.0+14896+bf621b2a.src.rpm skopeo-0.1.40-9.module+el8.2.0+14896+bf621b2a.src.rpm slirp4netns-0.4.2-3.git21fdece.module+el8.2.0+14896+bf621b2a.src.rpm toolbox-0.0.7-1.module+el8.2.0+14896+bf621b2a.src.rpm udica-0.2.1-2.module+el8.2.0+14896+bf621b2a.src.rpm aarch64: buildah-1.11.6-8.module+el8.2.0+14896+bf621b2a.aarch64.rpm buildah-debuginfo-1.11.6-8.module+el8.2.0+14896+bf621b2a.aarch64.rpm buildah-debugsource-1.11.6-8.module+el8.2.0+14896+bf621b2a.aarch64.rpm buildah-tests-1.11.6-8.module+el8.2.0+14896+bf621b2a.aarch64.rpm buildah-tests-debuginfo-1.11.6-8.module+el8.2.0+14896+bf621b2a.aarch64.rpm conmon-2.0.6-1.module+el8.2.0+14896+bf621b2a.aarch64.rpm containernetworking-plugins-0.8.3-4.module+el8.2.0+14896+bf621b2a.aarch64.rpm containernetworking-plugins-debuginfo-0.8.3-4.module+el8.2.0+14896+bf621b2a.aarch64.rpm containernetworking-plugins-debugsource-0.8.3-4.module+el8.2.0+14896+bf621b2a.aarch64.rpm containers-common-0.1.40-9.module+el8.2.0+14896+bf621b2a.aarch64.rpm crit-3.12-9.module+el8.2.0+14896+bf621b2a.aarch64.rpm criu-3.12-9.module+el8.2.0+14896+bf621b2a.aarch64.rpm criu-debuginfo-3.12-9.module+el8.2.0+14896+bf621b2a.aarch64.rpm criu-debugsource-3.12-9.module+el8.2.0+14896+bf621b2a.aarch64.rpm fuse-overlayfs-0.7.2-5.module+el8.2.0+14896+bf621b2a.aarch64.rpm fuse-overlayfs-debuginfo-0.7.2-5.module+el8.2.0+14896+bf621b2a.aarch64.rpm fuse-overlayfs-debugsource-0.7.2-5.module+el8.2.0+14896+bf621b2a.aarch64.rpm podman-1.6.4-24.module+el8.2.0+14896+bf621b2a.aarch64.rpm podman-debuginfo-1.6.4-24.module+el8.2.0+14896+bf621b2a.aarch64.rpm podman-debugsource-1.6.4-24.module+el8.2.0+14896+bf621b2a.aarch64.rpm podman-remote-1.6.4-24.module+el8.2.0+14896+bf621b2a.aarch64.rpm podman-remote-debuginfo-1.6.4-24.module+el8.2.0+14896+bf621b2a.aarch64.rpm podman-tests-1.6.4-24.module+el8.2.0+14896+bf621b2a.aarch64.rpm python3-criu-3.12-9.module+el8.2.0+14896+bf621b2a.aarch64.rpm runc-1.0.0-65.rc10.module+el8.2.0+14896+bf621b2a.aarch64.rpm runc-debuginfo-1.0.0-65.rc10.module+el8.2.0+14896+bf621b2a.aarch64.rpm runc-debugsource-1.0.0-65.rc10.module+el8.2.0+14896+bf621b2a.aarch64.rpm skopeo-0.1.40-9.module+el8.2.0+14896+bf621b2a.aarch64.rpm skopeo-debuginfo-0.1.40-9.module+el8.2.0+14896+bf621b2a.aarch64.rpm skopeo-debugsource-0.1.40-9.module+el8.2.0+14896+bf621b2a.aarch64.rpm skopeo-tests-0.1.40-9.module+el8.2.0+14896+bf621b2a.aarch64.rpm slirp4netns-0.4.2-3.git21fdece.module+el8.2.0+14896+bf621b2a.aarch64.rpm slirp4netns-debuginfo-0.4.2-3.git21fdece.module+el8.2.0+14896+bf621b2a.aarch64.rpm slirp4netns-debugsource-0.4.2-3.git21fdece.module+el8.2.0+14896+bf621b2a.aarch64.rpm noarch: cockpit-podman-11-1.module+el8.2.0+14896+bf621b2a.noarch.rpm container-selinux-2.124.0-1.module+el8.2.0+14896+bf621b2a.noarch.rpm podman-docker-1.6.4-24.module+el8.2.0+14896+bf621b2a.noarch.rpm python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.2.0+14896+bf621b2a.noarch.rpm toolbox-0.0.7-1.module+el8.2.0+14896+bf621b2a.noarch.rpm udica-0.2.1-2.module+el8.2.0+14896+bf621b2a.noarch.rpm ppc64le: buildah-1.11.6-8.module+el8.2.0+14896+bf621b2a.ppc64le.rpm buildah-debuginfo-1.11.6-8.module+el8.2.0+14896+bf621b2a.ppc64le.rpm buildah-debugsource-1.11.6-8.module+el8.2.0+14896+bf621b2a.ppc64le.rpm buildah-tests-1.11.6-8.module+el8.2.0+14896+bf621b2a.ppc64le.rpm buildah-tests-debuginfo-1.11.6-8.module+el8.2.0+14896+bf621b2a.ppc64le.rpm conmon-2.0.6-1.module+el8.2.0+14896+bf621b2a.ppc64le.rpm containernetworking-plugins-0.8.3-4.module+el8.2.0+14896+bf621b2a.ppc64le.rpm containernetworking-plugins-debuginfo-0.8.3-4.module+el8.2.0+14896+bf621b2a.ppc64le.rpm containernetworking-plugins-debugsource-0.8.3-4.module+el8.2.0+14896+bf621b2a.ppc64le.rpm containers-common-0.1.40-9.module+el8.2.0+14896+bf621b2a.ppc64le.rpm crit-3.12-9.module+el8.2.0+14896+bf621b2a.ppc64le.rpm criu-3.12-9.module+el8.2.0+14896+bf621b2a.ppc64le.rpm criu-debuginfo-3.12-9.module+el8.2.0+14896+bf621b2a.ppc64le.rpm criu-debugsource-3.12-9.module+el8.2.0+14896+bf621b2a.ppc64le.rpm fuse-overlayfs-0.7.2-5.module+el8.2.0+14896+bf621b2a.ppc64le.rpm fuse-overlayfs-debuginfo-0.7.2-5.module+el8.2.0+14896+bf621b2a.ppc64le.rpm fuse-overlayfs-debugsource-0.7.2-5.module+el8.2.0+14896+bf621b2a.ppc64le.rpm podman-1.6.4-24.module+el8.2.0+14896+bf621b2a.ppc64le.rpm podman-debuginfo-1.6.4-24.module+el8.2.0+14896+bf621b2a.ppc64le.rpm podman-debugsource-1.6.4-24.module+el8.2.0+14896+bf621b2a.ppc64le.rpm podman-remote-1.6.4-24.module+el8.2.0+14896+bf621b2a.ppc64le.rpm podman-remote-debuginfo-1.6.4-24.module+el8.2.0+14896+bf621b2a.ppc64le.rpm podman-tests-1.6.4-24.module+el8.2.0+14896+bf621b2a.ppc64le.rpm python3-criu-3.12-9.module+el8.2.0+14896+bf621b2a.ppc64le.rpm runc-1.0.0-65.rc10.module+el8.2.0+14896+bf621b2a.ppc64le.rpm runc-debuginfo-1.0.0-65.rc10.module+el8.2.0+14896+bf621b2a.ppc64le.rpm runc-debugsource-1.0.0-65.rc10.module+el8.2.0+14896+bf621b2a.ppc64le.rpm skopeo-0.1.40-9.module+el8.2.0+14896+bf621b2a.ppc64le.rpm skopeo-debuginfo-0.1.40-9.module+el8.2.0+14896+bf621b2a.ppc64le.rpm skopeo-debugsource-0.1.40-9.module+el8.2.0+14896+bf621b2a.ppc64le.rpm skopeo-tests-0.1.40-9.module+el8.2.0+14896+bf621b2a.ppc64le.rpm slirp4netns-0.4.2-3.git21fdece.module+el8.2.0+14896+bf621b2a.ppc64le.rpm slirp4netns-debuginfo-0.4.2-3.git21fdece.module+el8.2.0+14896+bf621b2a.ppc64le.rpm slirp4netns-debugsource-0.4.2-3.git21fdece.module+el8.2.0+14896+bf621b2a.ppc64le.rpm s390x: buildah-1.11.6-8.module+el8.2.0+14896+bf621b2a.s390x.rpm buildah-debuginfo-1.11.6-8.module+el8.2.0+14896+bf621b2a.s390x.rpm buildah-debugsource-1.11.6-8.module+el8.2.0+14896+bf621b2a.s390x.rpm buildah-tests-1.11.6-8.module+el8.2.0+14896+bf621b2a.s390x.rpm buildah-tests-debuginfo-1.11.6-8.module+el8.2.0+14896+bf621b2a.s390x.rpm conmon-2.0.6-1.module+el8.2.0+14896+bf621b2a.s390x.rpm containernetworking-plugins-0.8.3-4.module+el8.2.0+14896+bf621b2a.s390x.rpm containernetworking-plugins-debuginfo-0.8.3-4.module+el8.2.0+14896+bf621b2a.s390x.rpm containernetworking-plugins-debugsource-0.8.3-4.module+el8.2.0+14896+bf621b2a.s390x.rpm containers-common-0.1.40-9.module+el8.2.0+14896+bf621b2a.s390x.rpm crit-3.12-9.module+el8.2.0+14896+bf621b2a.s390x.rpm criu-3.12-9.module+el8.2.0+14896+bf621b2a.s390x.rpm criu-debuginfo-3.12-9.module+el8.2.0+14896+bf621b2a.s390x.rpm criu-debugsource-3.12-9.module+el8.2.0+14896+bf621b2a.s390x.rpm fuse-overlayfs-0.7.2-5.module+el8.2.0+14896+bf621b2a.s390x.rpm fuse-overlayfs-debuginfo-0.7.2-5.module+el8.2.0+14896+bf621b2a.s390x.rpm fuse-overlayfs-debugsource-0.7.2-5.module+el8.2.0+14896+bf621b2a.s390x.rpm podman-1.6.4-24.module+el8.2.0+14896+bf621b2a.s390x.rpm podman-debuginfo-1.6.4-24.module+el8.2.0+14896+bf621b2a.s390x.rpm podman-debugsource-1.6.4-24.module+el8.2.0+14896+bf621b2a.s390x.rpm podman-remote-1.6.4-24.module+el8.2.0+14896+bf621b2a.s390x.rpm podman-remote-debuginfo-1.6.4-24.module+el8.2.0+14896+bf621b2a.s390x.rpm podman-tests-1.6.4-24.module+el8.2.0+14896+bf621b2a.s390x.rpm python3-criu-3.12-9.module+el8.2.0+14896+bf621b2a.s390x.rpm runc-1.0.0-65.rc10.module+el8.2.0+14896+bf621b2a.s390x.rpm runc-debuginfo-1.0.0-65.rc10.module+el8.2.0+14896+bf621b2a.s390x.rpm runc-debugsource-1.0.0-65.rc10.module+el8.2.0+14896+bf621b2a.s390x.rpm skopeo-0.1.40-9.module+el8.2.0+14896+bf621b2a.s390x.rpm skopeo-debuginfo-0.1.40-9.module+el8.2.0+14896+bf621b2a.s390x.rpm skopeo-debugsource-0.1.40-9.module+el8.2.0+14896+bf621b2a.s390x.rpm skopeo-tests-0.1.40-9.module+el8.2.0+14896+bf621b2a.s390x.rpm slirp4netns-0.4.2-3.git21fdece.module+el8.2.0+14896+bf621b2a.s390x.rpm slirp4netns-debuginfo-0.4.2-3.git21fdece.module+el8.2.0+14896+bf621b2a.s390x.rpm slirp4netns-debugsource-0.4.2-3.git21fdece.module+el8.2.0+14896+bf621b2a.s390x.rpm x86_64: buildah-1.11.6-8.module+el8.2.0+14896+bf621b2a.x86_64.rpm buildah-debuginfo-1.11.6-8.module+el8.2.0+14896+bf621b2a.x86_64.rpm buildah-debugsource-1.11.6-8.module+el8.2.0+14896+bf621b2a.x86_64.rpm buildah-tests-1.11.6-8.module+el8.2.0+14896+bf621b2a.x86_64.rpm buildah-tests-debuginfo-1.11.6-8.module+el8.2.0+14896+bf621b2a.x86_64.rpm conmon-2.0.6-1.module+el8.2.0+14896+bf621b2a.x86_64.rpm containernetworking-plugins-0.8.3-4.module+el8.2.0+14896+bf621b2a.x86_64.rpm containernetworking-plugins-debuginfo-0.8.3-4.module+el8.2.0+14896+bf621b2a.x86_64.rpm containernetworking-plugins-debugsource-0.8.3-4.module+el8.2.0+14896+bf621b2a.x86_64.rpm containers-common-0.1.40-9.module+el8.2.0+14896+bf621b2a.x86_64.rpm crit-3.12-9.module+el8.2.0+14896+bf621b2a.x86_64.rpm criu-3.12-9.module+el8.2.0+14896+bf621b2a.x86_64.rpm criu-debuginfo-3.12-9.module+el8.2.0+14896+bf621b2a.x86_64.rpm criu-debugsource-3.12-9.module+el8.2.0+14896+bf621b2a.x86_64.rpm fuse-overlayfs-0.7.2-5.module+el8.2.0+14896+bf621b2a.x86_64.rpm fuse-overlayfs-debuginfo-0.7.2-5.module+el8.2.0+14896+bf621b2a.x86_64.rpm fuse-overlayfs-debugsource-0.7.2-5.module+el8.2.0+14896+bf621b2a.x86_64.rpm podman-1.6.4-24.module+el8.2.0+14896+bf621b2a.x86_64.rpm podman-debuginfo-1.6.4-24.module+el8.2.0+14896+bf621b2a.x86_64.rpm podman-debugsource-1.6.4-24.module+el8.2.0+14896+bf621b2a.x86_64.rpm podman-remote-1.6.4-24.module+el8.2.0+14896+bf621b2a.x86_64.rpm podman-remote-debuginfo-1.6.4-24.module+el8.2.0+14896+bf621b2a.x86_64.rpm podman-tests-1.6.4-24.module+el8.2.0+14896+bf621b2a.x86_64.rpm python3-criu-3.12-9.module+el8.2.0+14896+bf621b2a.x86_64.rpm runc-1.0.0-65.rc10.module+el8.2.0+14896+bf621b2a.x86_64.rpm runc-debuginfo-1.0.0-65.rc10.module+el8.2.0+14896+bf621b2a.x86_64.rpm runc-debugsource-1.0.0-65.rc10.module+el8.2.0+14896+bf621b2a.x86_64.rpm skopeo-0.1.40-9.module+el8.2.0+14896+bf621b2a.x86_64.rpm skopeo-debuginfo-0.1.40-9.module+el8.2.0+14896+bf621b2a.x86_64.rpm skopeo-debugsource-0.1.40-9.module+el8.2.0+14896+bf621b2a.x86_64.rpm skopeo-tests-0.1.40-9.module+el8.2.0+14896+bf621b2a.x86_64.rpm slirp4netns-0.4.2-3.git21fdece.module+el8.2.0+14896+bf621b2a.x86_64.rpm slirp4netns-debuginfo-0.4.2-3.git21fdece.module+el8.2.0+14896+bf621b2a.x86_64.rpm slirp4netns-debugsource-0.4.2-3.git21fdece.module+el8.2.0+14896+bf621b2a.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-1227 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/cve/cve-2022-1227 https://access.redhat.com/security/cve/cve-2022-27649 https://access.redhat.com/security/cve/cve-2022-27651 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYoWMsdzjgjWX9erEAQhnUA//c+KE1m9Vd3QLQ20ai1Y+EHG6aGLT4QY0 /ZW6vyN/2kLRYiOh5O+RGurLQE7IPmfJHWTuHzWylIvAdNw9B3/lo7G3oupIv8k9 YfP6PgbLW/jDisXDPK40L+u68/YkWTO/yToiavnyhf1C13ISM5KtKV1FDS1Wuh5b AfYySN5H79o+K6IyLRcnqem1sTr4NYYuta8lFmoFVlXD9JF/85Lw9dEC7IuCKKuT gvmjj0a76klTQvuaKV7IzauNG/QnyU6LiiIApihTQNINwjovdm72WhvNJ0lSiFR8 KJA3shiVwVD3MMNOW7n1/cR1lSCLAt1AovLb31j0WKUED6UMrMn4oLgJm7SvfRRU SxyRZ9DSo+Izyjv3fVCS2Lpd5dQ5n9B6UKIEUGSWGOUOdcOQ4Xpd7ziYevFaFkXf uTY2GLhsv3vN9PBYATDTKoehTvhpg13ngwSA4YKGDq2fAJ8RDuy8G6LoYsW32/D1 aG0FAZvYMt/dI0Z65Htqo0lOdsC/M94MiSXJujKHe5TIMD+zT46P//1dWMzHLbfJ TFlHCl5bK0CkfmRYKYTHw0ACnTbImSQ+HAo6mi8gKkrheOSOi9djZjZFRO8dM2PE uK633gci0fn9zCB7gTUpu/jQ9MyAjSr+AI9AJPvEFkfhWhly6pjh+yBllX2Fgxz9 gR7CvwQYiEA= =fHV+ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobVgskNZI30y1K9AQiLig//aj/kD++nKJuyV5FSigiYQ5qNv6/yENst 2qeGle2idaTiwUtndzvfZNkQe8TrJppb0chIsI5sUFiwS26aeaE4Am+Qe9bBORvf ihs4GHtWTeppQITWqQRzdfvbHumL4t1ZlvsJJ6mJA7Kfiam1rVeB/nlQc0CWvKPc SdiSN3Nfar0mUDzm4RydMK68+sInWyAU7lUNwMtxJ9h4328F42/GIi2ZBBlAzwMV S/bi8OLrdyQMJQtSGTtnHvFY+wWWqpRTKs7I3jXBJ/E/ECizRbIROFRvpxEIApZh Q6ye1NIw4aJ3yp76IZzTrzAAa2I3lwTrfe1p4e4VqHzhrva1PWIPGK0SPzEE/jQn +wVmhw7RfEpMRgsNcd3Vmh9AtTkUY1izHABbUQG2USdUnbYyF75en6QTjGQ62pXt Ev/jlqcGJW28zZ28j6MRWiUwNafJgDaievbWWEWQYdSrvR2wZL+HcQiFiQHQXuWX zymoaVaH6/AHa1YKcpaRAIaqojMzMa4Tibu4NJ4fVSYHQBuP7tl2lxT2+XJoxjtz NE3pMn3p5azFVBpJ4L/wukDzJcXZibalEGbI37G0U0tqN+3NiqHYYT0Hxn7/mq30 5G/Uj9mUu1BBOaaIOPdqvwdzOyc0ZIBWUUZ7rdLNeeI8hhlgxt8FKRI5FCYufVh7 i8IF1otv9uI= =JGni -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2469 - [RedHat] kpatch-patch: CVSS (Max): 7.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2469 kpatch-patch security update 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kpatch-patch Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-0492 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:4655 Comment: CVSS (Max): 7.0 CVE-2022-0492 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kpatch-patch security update Advisory ID: RHSA-2022:4655-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:4655 Issue date: 2022-05-18 CVE Names: CVE-2022-0492 ===================================================================== 1. Summary: An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (v. 7) - ppc64le, x86_64 3. Description: This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Security Fix(es): * kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2051505 - CVE-2022-0492 kernel: cgroups v1 release_agent feature may allow privilege escalation 6. Package List: Red Hat Enterprise Linux Server (v. 7): Source: kpatch-patch-3_10_0-1160_31_1-1-8.el7.src.rpm kpatch-patch-3_10_0-1160_36_2-1-7.el7.src.rpm kpatch-patch-3_10_0-1160_41_1-1-6.el7.src.rpm kpatch-patch-3_10_0-1160_42_2-1-5.el7.src.rpm kpatch-patch-3_10_0-1160_45_1-1-4.el7.src.rpm kpatch-patch-3_10_0-1160_49_1-1-3.el7.src.rpm kpatch-patch-3_10_0-1160_53_1-1-3.el7.src.rpm kpatch-patch-3_10_0-1160_59_1-1-2.el7.src.rpm kpatch-patch-3_10_0-1160_62_1-1-1.el7.src.rpm ppc64le: kpatch-patch-3_10_0-1160_31_1-1-8.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_31_1-debuginfo-1-8.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_36_2-1-7.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_36_2-debuginfo-1-7.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_41_1-1-6.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_41_1-debuginfo-1-6.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_42_2-1-5.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_42_2-debuginfo-1-5.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_45_1-1-4.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_45_1-debuginfo-1-4.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_49_1-1-3.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_49_1-debuginfo-1-3.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_53_1-1-3.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_53_1-debuginfo-1-3.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_59_1-1-2.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_59_1-debuginfo-1-2.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_62_1-1-1.el7.ppc64le.rpm kpatch-patch-3_10_0-1160_62_1-debuginfo-1-1.el7.ppc64le.rpm x86_64: kpatch-patch-3_10_0-1160_31_1-1-8.el7.x86_64.rpm kpatch-patch-3_10_0-1160_31_1-debuginfo-1-8.el7.x86_64.rpm kpatch-patch-3_10_0-1160_36_2-1-7.el7.x86_64.rpm kpatch-patch-3_10_0-1160_36_2-debuginfo-1-7.el7.x86_64.rpm kpatch-patch-3_10_0-1160_41_1-1-6.el7.x86_64.rpm kpatch-patch-3_10_0-1160_41_1-debuginfo-1-6.el7.x86_64.rpm kpatch-patch-3_10_0-1160_42_2-1-5.el7.x86_64.rpm kpatch-patch-3_10_0-1160_42_2-debuginfo-1-5.el7.x86_64.rpm kpatch-patch-3_10_0-1160_45_1-1-4.el7.x86_64.rpm kpatch-patch-3_10_0-1160_45_1-debuginfo-1-4.el7.x86_64.rpm kpatch-patch-3_10_0-1160_49_1-1-3.el7.x86_64.rpm kpatch-patch-3_10_0-1160_49_1-debuginfo-1-3.el7.x86_64.rpm kpatch-patch-3_10_0-1160_53_1-1-3.el7.x86_64.rpm kpatch-patch-3_10_0-1160_53_1-debuginfo-1-3.el7.x86_64.rpm kpatch-patch-3_10_0-1160_59_1-1-2.el7.x86_64.rpm kpatch-patch-3_10_0-1160_59_1-debuginfo-1-2.el7.x86_64.rpm kpatch-patch-3_10_0-1160_62_1-1-1.el7.x86_64.rpm kpatch-patch-3_10_0-1160_62_1-debuginfo-1-1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-0492 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYoWMqtzjgjWX9erEAQihhQ/9GzhoRQBcjGaJGAub9yQdBhxzXrU9B5J/ N99UPA96K16X8brCeG9EKIlmMbnqzvoq8fRkb7bYzcXq+F/YtXwkvZEvDyGERnC0 4MU+m+yfg92mNsjDxxxeoft0yBALLb6AV9a89lFvtS+7qTMBu+xWEQEDTkaBNTUe e9e0oRDH3QPfMpX9DN9S3ccdZPpiXzjzn+AuWFd0p55/kWRR+8H7BOufR6uUgK2w of7mQ4tKJZ2ghohG0mJnyw8c0vXSRNkZ3kVKVdp0wqF141RfzZpdoGTWLIOaW3I9 PICqCO96Pp9NyRhseV4H91e0yUQLCQniuuqTujUlqWDU8psXGBancQdEtXOJZLpZ S6M4Z15GEwdAs0IGNkXLWgWj5Ew/nhEOrwqn2FjBcE0D6fdlFM5oK7NgJB7Ca2NQ eNnZBAD8W10ugeyaQ0Vfg2lzy8nRq4eGnuw+gufCuGvILgpn9eCR4IssGp1d7F2s Ty/fYgC23NSCyF5Bmx3mwZ3qUWZwsOiXXi7FMqQUJFKaperUvvb3cfmb7W5a60L7 NdNP5Gr8DhghdWYyKdF4FH7jEv8ErEMcoIZHhjIeczbY+jYj2zZJkTxl37g9fa+t IqXMU/GV9J8AG0oWSJx49ccb+G3fKkY7IxI9LUvecWVSx06oRo1XaS34GdHeapfS fyG71tg/u/A= =Zc85 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobVQMkNZI30y1K9AQg0hw//Z0yi3Y/xqcyyb855GTr9pFwPNn3q9FMd rimyO+LUGD2lkHObQGRYPJWOoTfiGRUY4N8Q7dzgzS8m3HvvHnvWik1DM2FJWgh2 uOLdc8oCm8S30jN4bu+fOOH8gsNL5BAMrzuqN0YiQIrKR5gvEqiwBwoAe0Dp4OUF 2hRAJtfB2gCzyMXenJlJpLfQYqPvVXxbFYZqeVtYAcWJxNqGm0HIMLs1i+6oetVw sPmB6fWp7NdSoZgB0Q2UOqyQBsBNAQRq988C6NQ3K9dTm4Yw0QNAQ6FL0FW7CzHf E820lSVJIXRKCYwLsPOOgn2qJxMJOpdzm02HeEWvZbod9mf6OY0YS3NGUNh5Emco EJdutm/gtN5wApla0224jPIGXKaOaGvhQTRR3EeCGuq7yG75WvNkWeOedagTAhV6 kUHgrO8DarIUOiGPI4j/Ib38Dsev+kAk/XI1vypFXBJR8njQUSVBWAuZvoNodOAe bJIAudJNx8nuxX/Hxi2djcGQ/Jbk1hkRFQ+uWOouwJjq3nRANyXw2dFZ/FE2ikPt SlY/zh0wkaQGjU48iVzx9HjwoVYO5m0A78J5QaB06lYq3VgmZQ6D9DEkG5sD4RzI 9rFE1jW30ACa7XphinSQBrzG6SCNQpBrEApgIbBzuNeH6z5mEeLy+YbI6BY0/JaV vPWyaLj5olc= =2tII -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2468 - [RedHat] pcs: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2468 pcs security update 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: pcs Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-29970 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:4661 Comment: CVSS (Max): 7.5 CVE-2022-29970 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: pcs security update Advisory ID: RHSA-2022:4661-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:4661 Issue date: 2022-05-18 CVE Names: CVE-2022-29970 ===================================================================== 1. Summary: An update for pcs is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux High Availability (v. 8) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Resilient Storage (v. 8) - ppc64le, s390x, x86_64 3. Description: The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Security Fix(es): * sinatra: path traversal possible outside of public_dir when serving static files (CVE-2022-29970) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2081096 - CVE-2022-29970 sinatra: path traversal possible outside of public_dir when serving static files 6. Package List: Red Hat Enterprise Linux High Availability (v. 8): Source: pcs-0.10.12-6.el8_6.1.src.rpm aarch64: pcs-0.10.12-6.el8_6.1.aarch64.rpm pcs-snmp-0.10.12-6.el8_6.1.aarch64.rpm ppc64le: pcs-0.10.12-6.el8_6.1.ppc64le.rpm pcs-snmp-0.10.12-6.el8_6.1.ppc64le.rpm s390x: pcs-0.10.12-6.el8_6.1.s390x.rpm pcs-snmp-0.10.12-6.el8_6.1.s390x.rpm x86_64: pcs-0.10.12-6.el8_6.1.x86_64.rpm pcs-snmp-0.10.12-6.el8_6.1.x86_64.rpm Red Hat Enterprise Linux Resilient Storage (v. 8): Source: pcs-0.10.12-6.el8_6.1.src.rpm ppc64le: pcs-0.10.12-6.el8_6.1.ppc64le.rpm pcs-snmp-0.10.12-6.el8_6.1.ppc64le.rpm s390x: pcs-0.10.12-6.el8_6.1.s390x.rpm pcs-snmp-0.10.12-6.el8_6.1.s390x.rpm x86_64: pcs-0.10.12-6.el8_6.1.x86_64.rpm pcs-snmp-0.10.12-6.el8_6.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-29970 https://access.redhat.com/security/updates/classification/#important https://bugzilla.redhat.com/show_bug.cgi?id=2081331 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYoWMpdzjgjWX9erEAQg3Sg/7B9P0pm5vBl+hvvVO149E65d0Jnhhmsgm D297zJkKxZg3tj8Y+5wfQkKfG6m2vNW2VhRxUkge2p9vMRFiMMi6K9nQuKDRpUq5 xY0Mya8clN55qps5hIUAFcLWJ/eHKAYKU7Bj7YOjZvM4wx7wnIDQBOG4KCXpG/mf f3C6v/feuV4+5iDQr1c0RxGkYx0UjZdcci7H0hbpXk0jrXTwgXW4xObVUQ4RJpjU GJ24aoHlumCxwZMIqMxQS5HeJaqn8eZsCEY1xq8muGxyRTWgilC24k6AeY4Hfcir rl5NsDug4A1Z9MCsh9vxst+LulqyJ2X+EMgvwqPUPZ1Zuxno93JFPGbembScmEQW eJVFSto3KLRbZ4b3XIcBu/tRXYxvn1jHU3gHjrd1G/TvfJlbkcl+QnpV+0HWMdFp bjOI8OE11TsTIVsE6vme3lDKRy94EleGwGH3lh0v7fnwxdS2Rg4oH99KNhSQFFjQ XbaJf5wkFgkuhfIZWtyJrc2KP7SDS4u5MzHQset8SqC9ho6xu10c+2LdFi/SYrVx HifQizmtwULgw/GJCZmlZlpDhT6OtmUk7ijs+09XIkDGl+Emq6M2MCp6IzbfUkq8 geicPwW0W+3pUSHN27MjdLRG2/k8/hDnMw4ILq/Agxof3VQ8CUaxZHTmrDhE2GaX OlKAJ82Ovd4= =BVts - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobVEskNZI30y1K9AQgbHA//RV6nq0T+3As5FY49PU8xB0k4lNpvmoxK hu2f9Ei+v32XundoKGcDpEagiPJn8piIl/ryA3mDH/MPEPQhsCMZpJl/XLGdoIUr RwuoowTGD3xoHO89ZfrnJhwlT4pYS139uZINuxuwvnh46K+qHH+3f4UGfbxq9Dmi b+/FMo0yLobi/cL+fQGi/sr+itSCGGek6vnKyZVx/Kca+ZwMGbwSuE87N5CGWFdz HoYX6Pl7urOVlf9zfgWv2ocDs1Ml4P3oUxGhEsL+CWa02zxjI7nVIOATUg/j+kL3 87UBokXshlwKQUWge11Csy2pw+CI86ExUCzAnw7KYBobMcqXjGGozp+AV2qCMW1X xvKAm2yuYf/ovvQIU6UBYQtNQQDO7NMRgIhdHTxNHniiyix79V099d9xVWcKlxdE vjR8UqImmMYNElnoWVmHioWxAIQzwKKvb8iwTqEysdFnZvXwj4Oye3Q7TfvDqV/q CYVWWtX02ZadCqgLf5rvVo/cOiE6UjNnFiFjrPg+fJ7OEpPucoPvlTsjdeipuVG+ wM4qKLOMZ6TwxNUD35aPTrFCSdXVt5YLaq+XVNwcCHEJ2YYuTqTOz5AXpZExxW6S MDLNUHoIPfCzDqkw4oKsPFOSNzey5DR2fs2F9KVKPwAHmkFArWW4IbSz6vm0ol95 bvD40LQgr84= =kZWM -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2467 - [RedHat] kernel: CVSS (Max): 7.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2467 kernel security and bug fix update 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-0492 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:4642 Comment: CVSS (Max): 7.0 CVE-2022-0492 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2022:4642-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:4642 Issue date: 2022-05-18 CVE Names: CVE-2022-0492 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel panic in mlx5_ib driver RHEL/CentOS 7.9 VM (BZ#2046571) * [RHEL-7.9] Get Call Trace about "kernel/timer.c:1270 requeue_timers+0x15e/0x170" on specified AMD x86_64 system (BZ#2048502) * kernel NULL pointer dereference while calling dma_pool_alloc from the mlx5_core module (BZ#2055457) * Rhel 7.9 NFS Clients takes very long time to resume operations in an NFS Server failover scenario (BZ#2066699) * perf stat shows unsupported counters for Intel IceLake cpu (BZ#2072317) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2051505 - CVE-2022-0492 kernel: cgroups v1 release_agent feature may allow privilege escalation 2055457 - kernel NULL pointer dereference while calling dma_pool_alloc from the mlx5_core module [rhel-7.9.z] 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-1160.66.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1160.66.1.el7.noarch.rpm kernel-doc-3.10.0-1160.66.1.el7.noarch.rpm x86_64: bpftool-3.10.0-1160.66.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.66.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.66.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.66.1.el7.x86_64.rpm perf-3.10.0-1160.66.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm python-perf-3.10.0-1160.66.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: bpftool-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.66.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-1160.66.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1160.66.1.el7.noarch.rpm kernel-doc-3.10.0-1160.66.1.el7.noarch.rpm x86_64: bpftool-3.10.0-1160.66.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.66.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.66.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.66.1.el7.x86_64.rpm perf-3.10.0-1160.66.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm python-perf-3.10.0-1160.66.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: bpftool-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.66.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-1160.66.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1160.66.1.el7.noarch.rpm kernel-doc-3.10.0-1160.66.1.el7.noarch.rpm ppc64: bpftool-3.10.0-1160.66.1.el7.ppc64.rpm bpftool-debuginfo-3.10.0-1160.66.1.el7.ppc64.rpm kernel-3.10.0-1160.66.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-1160.66.1.el7.ppc64.rpm kernel-debug-3.10.0-1160.66.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1160.66.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-1160.66.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-1160.66.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1160.66.1.el7.ppc64.rpm kernel-devel-3.10.0-1160.66.1.el7.ppc64.rpm kernel-headers-3.10.0-1160.66.1.el7.ppc64.rpm kernel-tools-3.10.0-1160.66.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1160.66.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-1160.66.1.el7.ppc64.rpm perf-3.10.0-1160.66.1.el7.ppc64.rpm perf-debuginfo-3.10.0-1160.66.1.el7.ppc64.rpm python-perf-3.10.0-1160.66.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1160.66.1.el7.ppc64.rpm ppc64le: bpftool-3.10.0-1160.66.1.el7.ppc64le.rpm bpftool-debuginfo-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-debug-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-devel-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-headers-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-tools-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-1160.66.1.el7.ppc64le.rpm perf-3.10.0-1160.66.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-1160.66.1.el7.ppc64le.rpm python-perf-3.10.0-1160.66.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1160.66.1.el7.ppc64le.rpm s390x: bpftool-3.10.0-1160.66.1.el7.s390x.rpm bpftool-debuginfo-3.10.0-1160.66.1.el7.s390x.rpm kernel-3.10.0-1160.66.1.el7.s390x.rpm kernel-debug-3.10.0-1160.66.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-1160.66.1.el7.s390x.rpm kernel-debug-devel-3.10.0-1160.66.1.el7.s390x.rpm kernel-debuginfo-3.10.0-1160.66.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-1160.66.1.el7.s390x.rpm kernel-devel-3.10.0-1160.66.1.el7.s390x.rpm kernel-headers-3.10.0-1160.66.1.el7.s390x.rpm kernel-kdump-3.10.0-1160.66.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-1160.66.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-1160.66.1.el7.s390x.rpm perf-3.10.0-1160.66.1.el7.s390x.rpm perf-debuginfo-3.10.0-1160.66.1.el7.s390x.rpm python-perf-3.10.0-1160.66.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-1160.66.1.el7.s390x.rpm x86_64: bpftool-3.10.0-1160.66.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.66.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.66.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.66.1.el7.x86_64.rpm perf-3.10.0-1160.66.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm python-perf-3.10.0-1160.66.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: bpftool-debuginfo-3.10.0-1160.66.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1160.66.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-1160.66.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1160.66.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1160.66.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-1160.66.1.el7.ppc64.rpm perf-debuginfo-3.10.0-1160.66.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1160.66.1.el7.ppc64.rpm ppc64le: bpftool-debuginfo-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1160.66.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-1160.66.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-1160.66.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1160.66.1.el7.ppc64le.rpm x86_64: bpftool-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.66.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-1160.66.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1160.66.1.el7.noarch.rpm kernel-doc-3.10.0-1160.66.1.el7.noarch.rpm x86_64: bpftool-3.10.0-1160.66.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.66.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.66.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.66.1.el7.x86_64.rpm perf-3.10.0-1160.66.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm python-perf-3.10.0-1160.66.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: bpftool-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.66.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.66.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-0492 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYoWMn9zjgjWX9erEAQhMiA/7B08ElIS7Yi4PPTGdMHo3gS5DMPiFqGzv 1tvJ/qUTQg07zXM/duwmnH0Y7v33hl55JiMwSETvZcOF/lXIqRtf6PYJm2wqRSOj GZE9yjJs963FZb0ykfPiz8gVxkHUAp+3lilgtcQJpDs/NHQ7YhNwLCTGA4kwfUWt XVLQ+1hTXK+J5JaSI7ZOCf8sMURFJewfyTz3KQlIb1A2m7TDVyo2yYKrClOiAanv hP66yIhHJPygE5ihoR4HVTosLaVZ2EjDhvHOzngAcyXvgCprQQ3eiO7tPKDl0LjV XOhK0V7wjtDJV69Nrgkhgb4PGLMs6bO6Nc9xXuvsEWZUXNSPAR2zDCyqjNBF9Rsh nTleOKOFUR9oc1EJ3zumN9bdmO7g3sjgkN9hTAouFxBUEqTdzsP77Yg+OIRrLq0N iSn0EfVSm0RmP3Jh5IlbRyH42WdfQT5vvnpYSZemQ9EvMfCYoG4pvaC/DTzFJrkS SRVoBZy0hqqcat8zCETcoETqrVFtaOhxXOpL3YH+Y1Xg3Y2ESyBg9aEFosiOK0lh JIoPJLAwUAx0pw1JMUBjygnWtyItMDqezqIpvb0A/7SWkvc6Ha1+dx5/sJFfsaDm CefHzb+7pxe/XoziTXXvsRD1/eoeUwdiJbf9qbq/Oc8qor1yTyxZbGSXEY0DNX6J ych3Hb212/A= =2HeK - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobUq8kNZI30y1K9AQjX5Q/+P7e/GTEJPe99u66JX6Qm/TDAVH2GwSIV QUPOONoA97HOUr9j8M1fHwM1mVu+YkHOZoC3JFwXJx5vrCqbcR0KcE5YIXfdZysN BUcbKc26CHpaGGXJKySJmaylWwNnlEOOGtGZ8rqb56AZCZqc5nszOUiubLg+7F9d 8F+vrFL5xEYDvERrVPk03n3i2gfVFr1DqoRqk2BCUp2oLXvzfnV3BAGvJBHyOgt1 MMTC0Vw75B/2ZBy8zVN5L0GONimbETIg1+i5OIgFrf+Y1XJdtqj2bbqzM7BRtxlW rL/klCnoTw/gefC+C4bSXN08AUsR2k2JgeybxQ2X7A0jjPdPP26NK+H9DkmvYtcJ Gg+FLi7kNURRTb9UQU8z4Ch+hX6B+DYmnFn5tj/UFBtQctjQH6Xgj91i0nDjOGvT AVLJozKlmbBg55ZGsvhnEmVW073J50KBuv+SGAu5o1cF3ymd62eSNON9jl8fIYLn jvTvoCXbbGSYJJzR9rr+zacFhthRqZnGojjjkDMMaqW3p3Y+73Q1P/e+0helBOP0 XSNweu8rFpQjowjqGrqp2uOxPc4+YNsDMOjVOmMzrefUTGPPNz0egdN7U1Sd9VZe lRSnC+yUc65rYDLFBWCYZJoheinvxrcYPfZHI9gTdwE6mFTDYo3FxNBo79Ej2Hf7 AZcOAlVstkc= =Cvk1 -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2466 - [RedHat] kernel-rt: CVSS (Max): 7.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2466 kernel-rt security and bug fix update 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel-rt Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-0492 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:4644 Comment: CVSS (Max): 7.0 CVE-2022-0492 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2022:4644-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:4644 Issue date: 2022-05-18 CVE Names: CVE-2022-0492 ===================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux for Real Time (v. 7) - noarch, x86_64 Red Hat Enterprise Linux for Real Time for NFV (v. 7) - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel-rt: update to the latest RHEL7.9.z14 source tree (BZ#2071179) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2051505 - CVE-2022-0492 kernel: cgroups v1 release_agent feature may allow privilege escalation 6. Package List: Red Hat Enterprise Linux for Real Time for NFV (v. 7): Source: kernel-rt-3.10.0-1160.66.1.rt56.1207.el7.src.rpm noarch: kernel-rt-doc-3.10.0-1160.66.1.rt56.1207.el7.noarch.rpm x86_64: kernel-rt-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-debug-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-debug-kvm-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-debug-kvm-debuginfo-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-devel-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-kvm-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-kvm-debuginfo-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-trace-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-trace-kvm-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-trace-kvm-debuginfo-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm Red Hat Enterprise Linux for Real Time (v. 7): Source: kernel-rt-3.10.0-1160.66.1.rt56.1207.el7.src.rpm noarch: kernel-rt-doc-3.10.0-1160.66.1.rt56.1207.el7.noarch.rpm x86_64: kernel-rt-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-debug-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-devel-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-trace-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-1160.66.1.rt56.1207.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-0492 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYoWMl9zjgjWX9erEAQhCBBAAhnuC4vIXR5GVCjk70trIpRXjVBi6m7Qk bBrsulQnTrokq8GX1cCfKOZDry+irCpEHItbQ63WrtCZfUSTQW9ccSj1yWKqQal8 aDsSLvNh3m7k2w5n9BIHzANK/RQqC6S4lrDoVVzQRGZ1Z9hzfFXZR/bK32LCNl13 MFDY6ErzMdP5JFPqOaMB2aa430LGo7uS7KbDpzWuCZ+pag+IgEp5WdwQHhX8acGO Gf0Y8GjIbmKJT8n5PD1kWRbAmwrvKIeiJ76z0jX9hV+3KAYyvH3GTydNj0C/8xKN 8J9/5XqIshVWqUhm7P1wq0kPR/tMgdh+FgGons3KD+joHZK0GBrlbVDViQBGtz0S UiwKH8MME1+3+FVcR5Hlz0Q1N0b9/wbiWkErqnZ13jUhbuqebYyd+X/e5lZcHElj FK3CHlxLvaPJG15DIozswtPngycIBWPYhFmHRSsm79XHgN7Jz+0548j++R1dXuYA 5Da0wQImMXr0fJZxNyvBOaylGyhA5VTo68YG24PYPXOW9t8dNZshlpmrOsA4+deH kt3ubaTYdA+NO3wpIdEV8Zgp/E4CSbsNfNyk+OTwQMWssdvAb7yGNkG1aMJ+sn1M 8VWrtg9PSCMZTNJwuH91BzZCFccH2MeW9rX8ZaDlV7mvpuw62w6ow3r1owlJBbH3 KvuUbpqxuaU= =nbCP - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobT3MkNZI30y1K9AQg0hhAAgekL8wGWNESpafpoAuWt0rYkipXx2UrE Vm6nlojbaBvP2oLkkGM9zvX0DnFcq5YKvKoj0elGsxwk9PiXDeNfuT+tDdgLSC4/ WmEr2nlwkqFmMyt0KqBfFB0G8o4EEV0QTsD4xELBUr9CP9xkNFhFr1esKFWNcPTX 29VOQtVP8oS1VhL3VNey0W9ft2DB8O87VXFux3ieQDkVzJ6NHAB40+jspKSi6dTB b1twjtT5bTxBu1nj2CRhPF8TPq7LqNQ7dvOq3MImGrqtXWHHrvJcJzJyVr8cRe59 +R/rCz3X6bswo5KlAutR6hYqq2l0y0RM/F4b4Im806sUYW0V7mzWOR5D8cDMdBc5 vYxQnZw2lqneLQFFwYNluyhOb7wyLZDVg7BayudHkRmNmB+WE+fp2sMz7/IVvLas l/5f287v9vU2w+ausWViQQZ2kEBez9FSZdiVm7cAJ/bIwRRdshCxx/e6NumesUZg dCSU8gWtv2KxjFheMuSzE5QdD3fp/wCTRoyCVgHrMne6n4pqEjIOTiIpB4hdSnPu XqNqZUzvbxB+eNcLX5PyakofIf5Asf5jK/YhXwy+2EhfQcOJHYRzaj3TbON3qNTs DPKYEZ3arN3mMlhSBnWG51IgDgGoTlr5/ObrxndWoNWkfLeMKMiKmveR7t6u3RNO Dv5UeObrKhY= =g1D1 -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2465 - [RedHat] OpenShift Virtualization 4.10.1 RPMs: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2465 OpenShift Virtualization 4.10.1 RPMs security and bug fix update 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: OpenShift Virtualization 4.10.1 RPMs Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-21698 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:4667 Comment: CVSS (Max): 7.5 CVE-2022-21698 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift Virtualization 4.10.1 RPMs security and bug fix update Advisory ID: RHSA-2022:4667-01 Product: cnv Advisory URL: https://access.redhat.com/errata/RHSA-2022:4667 Issue date: 2022-05-18 CVE Names: CVE-2022-21698 ===================================================================== 1. Summary: Red Hat OpenShift Virtualization release 4.10.1 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: CNV 4.10 for RHEL 7 - x86_64 CNV 4.10 for RHEL 8 - x86_64 3. Description: OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.10.1 RPMs. Security Fix(es): * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * 4.10.1 rpms (BZ#2065755) 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter 2065755 - 4.10.1 rpms 6. Package List: CNV 4.10 for RHEL 7: Source: kubevirt-4.10.1-489.el7.src.rpm x86_64: kubevirt-virtctl-4.10.1-489.el7.x86_64.rpm kubevirt-virtctl-redistributable-4.10.1-489.el7.x86_64.rpm CNV 4.10 for RHEL 8: Source: kubevirt-4.10.1-489.el8.src.rpm x86_64: kubevirt-virtctl-4.10.1-489.el8.x86_64.rpm kubevirt-virtctl-redistributable-4.10.1-489.el8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-21698 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYoWMktzjgjWX9erEAQgyFA/8DIMP4f+xqWaMEn4gBHrml6OvQvX3VvWH ZhhBozmF+4rMSj7OPQmZWDCPwxBRwL2X4Kl9Tj12RMR8/yjlQjfb8QnvVEsQDiQx wrzjH/fIFrguVntn7xzUWp1bF6ILCTjrpNp7s8mK/MP6UOEIVFXT3CYTOR3R0Vjk rK5yM1w0CNxzk2kXx7nQm7UHms+CEVBTJDsYY4lFZwkoXC2gYepWQeLrF2QwBcNL dNyzZE404VF0DQoC3UtKD6tNqOTx/iVGfqnRYTEPSdxVuSDPJnjsorcHYruGwpY7 NkaYUZWVnyUVyL9moFAETC3editDwM2qvCOU6sJjgs1g9v8FygkTWCPBYyUQXRgr hBdnoNilb1GPhGDWT1fkZ5020iVnjgVDlEqI4NCTVwzvnpjVMocZykCSFi3EkPKD Gssf+tdZEtIIsDPTfPdQNJmflh4SB462ZRwQQ7kRgYw1qLtqQqP+zNkZrOrZrmdu II7bhD9Zk8RGYGFWIq2ffp5Xqh93C2tu9AZ3gI/jiIj4flB5zEu5tILYpxjRT4pL 4hESeuJ8G2ctP8Z1Rv7VaY1VDcaf84uujvPquOb15JE15vfxJ3E0YNgXQNhBx1Li xyD3g1LUIhOGbBRQ4a2WziR3IiD8SCrIs8s+WFgzDhacVQKXBPSkv0J9qLoH9Jxn bARoPlu+u4E= =lItE - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobTp8kNZI30y1K9AQjmZw//cNKw95QqncQITb/QWd/uRav/eQ+DS07A ZQm7lTsuUn0AJbrbLkMbdat8IlK0nLD1pXZOBIJY6Rgkro9KFTpNVb9ol+cVqFcW e8E0l6m9d+/EgEgx5rzaED/dfOCdGj8AWs+JvNm8f4X6mHRSj699zUr/gIhKHWL2 4eCTDajc2afMW+EYkoxHSAttp3izH1fT6l2Zu6FyyxpEJGxwWe6ONyBJlXjlvNeO bTvGbaGDPFbCUN1MUw9bbvZetganFuwpMlWvTR+AaumXmNa6ZeHhsC5ldf10uXgI fM9Sazl6+qNNKLvJDlFtDASoyM+cUm7lNAJaX08XtoLq0/+wduwCQGiBckdT6FZ8 DBt8CpD+PGEDHYeE7gjj94oMIaJ06UwORaG7J9V6J2/uslOpCktj9NoQcNiAX0hO Eim2u+cUwVt2fTbCT0Sca742cov1OSIFrXwgD9AmMXHJwydS4COYmJglNF2mwOHq lNJBBYg0JzRGuuEasGTSRaXFAYsZnFs9Hfsa9rrQqD+ZDRzE8EMgnPl+lleaSlrp U/DBUbXJQQNC8yo0b23toEb2n/TW1XzNhHWVTQ0zRZtufLkSOFnOmhDwSwQBXEK5 APoKwXu+2AOv8L4n9UJ9gSK5jiAXbPJChFTnZ35qQUyWFAumGg8US/qlYO1/A2YW f+odsdGVz2o= =l+BD -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2464 - [SUSE] poppler: CVSS (Max): 5.3

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2464 Security update for poppler 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: poppler Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2020-27778 CVE-2019-14494 CVE-2019-10872 CVE-2019-10871 CVE-2019-9959 CVE-2019-9903 CVE-2019-9631 CVE-2019-7310 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221723-1 Comment: CVSS (Max): 5.3 CVE-2020-27778 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for poppler ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1723-1 Rating: moderate References: #1124150 #1129202 #1130229 #1131696 #1131722 #1142465 #1143950 #1179163 Cross-References: CVE-2019-10871 CVE-2019-10872 CVE-2019-14494 CVE-2019-7310 CVE-2019-9631 CVE-2019-9903 CVE-2019-9959 CVE-2020-27778 Affected Products: SUSE Linux Enterprise Server 12-SP5 SUSE Linux Enterprise Server for SAP Applications 12-SP5 SUSE Linux Enterprise Software Development Kit 12-SP5 ______________________________________________________________________________ An update that fixes 8 vulnerabilities is now available. Description: This update for poppler fixes the following issues: o CVE-2020-27778: Fixed a buffer overflow in pdftohtml (bsc#1179163). o CVE-2019-14494: Fixed a divide-by-zero error in pdftoppm (bsc#1143950). o CVE-2019-9959: Fixed an integer overflow in pdftocairo (bsc#1142465). o CVE-2019-10871: Fixed an invalid memory access in pdftops (bsc#1131696). o CVE-2019-10872: Fixed an invalid memory access in pdftoppm (bsc#1131722). o CVE-2019-9903: Fixed a buffer overflow in pdfunite (bsc#1130229). o CVE-2019-7310: Fixed an application crash in pdftocairo (bsc#1124150). o CVE-2019-9631: Fixed an invalid memory access in pdftocairo (bsc#1129202). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-1723=1 o SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-1723=1 Package List: o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64): libpoppler-cpp0-0.43.0-16.19.3 libpoppler-cpp0-debuginfo-0.43.0-16.19.3 libpoppler-devel-0.43.0-16.19.3 libpoppler-glib-devel-0.43.0-16.19.3 libpoppler-qt4-devel-0.43.0-16.19.3 poppler-debugsource-0.43.0-16.19.3 poppler-qt-debugsource-0.43.0-16.19.3 typelib-1_0-Poppler-0_18-0.43.0-16.19.3 o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): libpoppler-glib8-0.43.0-16.19.3 libpoppler-glib8-debuginfo-0.43.0-16.19.3 libpoppler-qt4-4-0.43.0-16.19.3 libpoppler-qt4-4-debuginfo-0.43.0-16.19.3 libpoppler60-0.43.0-16.19.3 libpoppler60-debuginfo-0.43.0-16.19.3 poppler-debugsource-0.43.0-16.19.3 poppler-qt-debugsource-0.43.0-16.19.3 poppler-tools-0.43.0-16.19.3 poppler-tools-debuginfo-0.43.0-16.19.3 References: o https://www.suse.com/security/cve/CVE-2019-10871.html o https://www.suse.com/security/cve/CVE-2019-10872.html o https://www.suse.com/security/cve/CVE-2019-14494.html o https://www.suse.com/security/cve/CVE-2019-7310.html o https://www.suse.com/security/cve/CVE-2019-9631.html o https://www.suse.com/security/cve/CVE-2019-9903.html o https://www.suse.com/security/cve/CVE-2019-9959.html o https://www.suse.com/security/cve/CVE-2020-27778.html o https://bugzilla.suse.com/1124150 o https://bugzilla.suse.com/1129202 o https://bugzilla.suse.com/1130229 o https://bugzilla.suse.com/1131696 o https://bugzilla.suse.com/1131722 o https://bugzilla.suse.com/1142465 o https://bugzilla.suse.com/1143950 o https://bugzilla.suse.com/1179163 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobTackNZI30y1K9AQg+GQ//bs+42gfQGhVd0IaFhMD7wFrXkF8XlcJZ ivApcFZyF8gBdbTwwc9NtvZlOHPcVk8VHvODhEcoX4Ee/A1l8e2Kh32O6Zx0/EuE lHlh0LNrCuw2ucYgufd7LmOON9uTMD7OdrOjoocbGhbxwCcPt80ViyF2yQkR9rvF e0MwpRVwF73U96+vxr2/obweHCO0zr7f4cwlGJ/Ooo8CLlz2MZ/84z9X2tXt1FE2 hM2pfZlhRwGvRZaxmBiExFhZr6YWhBWNA5XzJCKhEZ+pkuZ6ulg0uhCKqtlp+/ch 0Q5kq3WgkHyvbOr1NEgRbRI1eSHHfPwXhMElhB7jDTXyXR3DJnZBrK60es/J1dUP oqZwkqOzHu7xQo6DU3G2StMjnKBsLb2A0RIRs8GOt0juW1x14tgOJR5pKDMU7PB5 ZV4Avt8k6TepUNUcftlk7WzSTIlQS/0ifVfIPzBb8obgh09dLzIM3VzJzk+wea6e a/zY6C/sggdTFUgmyZxApbzw9QOMjBkwCxoSQHvewOHI+ZO1ZwgEG3khw0R/o82C bcrtItfIP7cEZM5EFr1tWbFRGENteagD6qmcCKrcA6zlc6HIuF76arYhW3RUN7dL lIW9Uw6PcwFdzfhxonuYzzZhuyPGZ7Zgjk5UicjwuuV7jGf7FQXpLoXHzjIxEVWH 6Ucnp5DPgrk= =NBTk -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2463 - [SUSE] poppler: CVSS (Max): 5.3

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2463 Security update for poppler 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: poppler Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2020-27778 CVE-2019-14494 CVE-2019-10872 CVE-2019-10871 CVE-2019-9959 CVE-2019-9903 CVE-2019-9631 CVE-2019-7310 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221724-1 Comment: CVSS (Max): 5.3 CVE-2020-27778 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for poppler ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1724-1 Rating: moderate References: #1124150 #1129202 #1131696 #1131722 #1142465 #1143950 #1179163 Cross-References: CVE-2019-10871 CVE-2019-10872 CVE-2019-14494 CVE-2019-7310 CVE-2019-9631 CVE-2019-9959 CVE-2020-27778 Affected Products: SUSE Linux Enterprise Server 12-SP5 SUSE Linux Enterprise Server for SAP Applications 12-SP5 SUSE Linux Enterprise Software Development Kit 12-SP5 ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. Description: This update for poppler fixes the following issues: o CVE-2020-27778: Fixed a buffer overflow in pdftohtml (bsc#1179163). o CVE-2019-14494: Fixed a divide-by-zero error in pdftoppm (bsc#1143950). o CVE-2019-9959: Fixed an integer overflow in pdftocairo (bsc#1142465). o CVE-2019-10871: Fixed an invalid memory access in pdftops (bsc#1131696). o CVE-2019-10872: Fixed an invalid memory access in pdftoppm (bsc#1131722). o CVE-2019-9903: Fixed a buffer overflow in pdfunite (bsc#1130229). o CVE-2019-7310: Fixed an application crash in pdftocairo (bsc#1124150). o CVE-2019-9631: Fixed an invalid memory access in pdftocairo (bsc#1129202). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-1724=1 Package List: o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64): libpoppler44-0.24.4-14.20.2 libpoppler44-debuginfo-0.24.4-14.20.2 References: o https://www.suse.com/security/cve/CVE-2019-10871.html o https://www.suse.com/security/cve/CVE-2019-10872.html o https://www.suse.com/security/cve/CVE-2019-14494.html o https://www.suse.com/security/cve/CVE-2019-7310.html o https://www.suse.com/security/cve/CVE-2019-9631.html o https://www.suse.com/security/cve/CVE-2019-9959.html o https://www.suse.com/security/cve/CVE-2020-27778.html o https://bugzilla.suse.com/1124150 o https://bugzilla.suse.com/1129202 o https://bugzilla.suse.com/1131696 o https://bugzilla.suse.com/1131722 o https://bugzilla.suse.com/1142465 o https://bugzilla.suse.com/1143950 o https://bugzilla.suse.com/1179163 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobTEskNZI30y1K9AQjOSw//cYm6NuDi92Sc0XxBdFL88a3KWoLljUbw DtoEEdmahS+KJR6QU9/Mv3r9qBbeFEQo/4DnrZP1UkrwBwj6Y7kn3Fh5bMmQfzjz P6Fx+nLjih6Ph94Q8g8HBzclg4vGI8s50rJEZSFBiW36NPcrBzKd5BRFAu0hlfHG g/okD0hpzvBOlq7hP11aV8PEM7dV32C47uh2wYJfWgbjmUbHXCQatx/xPJ2NwL8J Bs93LWun7hSZ3ACVVlfZJsRb0ZhJBjik0bfewNgd4VdoGeGvgbN20xt70c5HXL3e Kx1TWTdJF6PMgy3OzVwDH0qXZMxc3f047Ax9sSYX8YS2gcHLTabYFmcBNMrrOyaM lW29tjPWZWf47R9kYkSHEHbQumcebFFNiFHEYWB0UgIC8oyeA2bNOhr9jfnHJEwl 1svMDX/SZqoayrZZBQSStnrur+q4wjnKzjsZ3WPv+DBxwtmqmjxvyS+oK9faYofi 8ly5GgRSxr//yDL5lzKHmOQqvCFBVWNF9HKr71OHA0EkeRnCxDkmC4xQdh8ayQ2x yCVNcW6RFwQDOYS5W/Q5KqXkfjUrZKkxHdfu6ep4SCxYuFDvnfRiA2h5ADe2SgCB M2lJsbp97BPyZqSol5R6B2hBVrcxR1Cd04bY/nDHjXeD4NxebmnvWYgHVpMnzBIv TjW53CzH/jA= =C8uJ -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2462 - [SUSE] php7: CVSS (Max): None

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2462 Security update for php7 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: php7 Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221725-1 Comment: CVSS (Max): None available when published - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for php7 ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1725-1 Rating: low References: #1197644 Affected Products: openSUSE Leap 15.4 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: This update for php7 fixes the following issues: o Fixed filter_var bypass vulnerability (bsc#1197644). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-1725=1 Package List: o openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64): php7-wddx-7.2.5-150000.4.92.1 php7-wddx-debuginfo-7.2.5-150000.4.92.1 References: o https://bugzilla.suse.com/1197644 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobS0skNZI30y1K9AQj/SBAAk620djVdyUa5Z0AZj7nFtW0kCk05SkDd p+9f/6yRKNWw4/1xN0/cF/RUE/F4LOc5IbOCl9LzO5STmbFWgL+EEPJSfvF1Rt0T fbNRmNPAsKGVJilNEWNgfdk7klnk+ArVKD03CVbjDCFeJtQvmfFGMoZtEr5bbO2G wdAd/CioJ6jSBuRtaq33Xh7AwmkoPDhDOS05mxzI0wEKh3kOGMcnnusfcHUl39R/ DkJA1iQSYs97GwRcoI37sWHNOjUabV52yOWPlFk8mhQWG5C2DDtoIUbYjnJJFczr C0fVkqagDQqQU2PyX8Igl4LYCZE97SiZ37CNgkmT7Y0T95bng8VyXZHNSJ4F7HZH 2IecOIIiTOAXhfMLkf0x0NI2D77g0r0lepE27K/ROFNK/tYXRema5+daqcOtvsol kdsNIlxnDQP/uiuCqlbvOYuKxuFk6RIj1GAJSKKt9//VLDEDeAUMbPznbQXl4uae U7Kat0jAaiqAtlGp2bNbOZ5rQtZ+UALalaRok7HKBHFIeYhzUz1ktNNbsSmnhPPz AY6xlKLNAI/viZINGNtVIwv1+jgG9Oe4w36F9rB0bvQefBYD45osNBpE3eDIBJWE dMTTywLTn/x/E8GTd8s8WBqf6C10bruCqM+NpZSoxEMYFNQoowhjaTN65eJlxrqJ V7V2Enn4Kr0= =vIGn -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2461 - [SUSE] slurm_20_11: CVSS (Max): 9.9

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2461 Security update for slurm_20_11 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: slurm_20_11 Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-29501 CVE-2022-29500 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221726-1 Comment: CVSS (Max): 9.9 CVE-2022-29500 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for slurm_20_11 ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1726-1 Rating: important References: #1199278 #1199279 Cross-References: CVE-2022-29500 CVE-2022-29501 Affected Products: SUSE Linux Enterprise Module for HPC 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for slurm_20_11 fixes the following issues: o CVE-2022-29500: Fixed architectural flaw that could have been exploited to allow an unprivileged user to execute arbitrary processes as root (bsc# 1199278). o CVE-2022-29501: Fixed a problem that an unprivileged user could have sent data to arbitrary unix socket as root (bsc#1199279). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for HPC 12: zypper in -t patch SUSE-SLE-Module-HPC-12-2022-1726=1 Package List: o SUSE Linux Enterprise Module for HPC 12 (aarch64 x86_64): libnss_slurm2_20_11-20.11.9-3.11.1 libnss_slurm2_20_11-debuginfo-20.11.9-3.11.1 libpmi0_20_11-20.11.9-3.11.1 libpmi0_20_11-debuginfo-20.11.9-3.11.1 libslurm36-20.11.9-3.11.1 libslurm36-debuginfo-20.11.9-3.11.1 perl-slurm_20_11-20.11.9-3.11.1 perl-slurm_20_11-debuginfo-20.11.9-3.11.1 slurm_20_11-20.11.9-3.11.1 slurm_20_11-auth-none-20.11.9-3.11.1 slurm_20_11-auth-none-debuginfo-20.11.9-3.11.1 slurm_20_11-config-20.11.9-3.11.1 slurm_20_11-config-man-20.11.9-3.11.1 slurm_20_11-debuginfo-20.11.9-3.11.1 slurm_20_11-debugsource-20.11.9-3.11.1 slurm_20_11-devel-20.11.9-3.11.1 slurm_20_11-doc-20.11.9-3.11.1 slurm_20_11-lua-20.11.9-3.11.1 slurm_20_11-lua-debuginfo-20.11.9-3.11.1 slurm_20_11-munge-20.11.9-3.11.1 slurm_20_11-munge-debuginfo-20.11.9-3.11.1 slurm_20_11-node-20.11.9-3.11.1 slurm_20_11-node-debuginfo-20.11.9-3.11.1 slurm_20_11-pam_slurm-20.11.9-3.11.1 slurm_20_11-pam_slurm-debuginfo-20.11.9-3.11.1 slurm_20_11-plugins-20.11.9-3.11.1 slurm_20_11-plugins-debuginfo-20.11.9-3.11.1 slurm_20_11-slurmdbd-20.11.9-3.11.1 slurm_20_11-slurmdbd-debuginfo-20.11.9-3.11.1 slurm_20_11-sql-20.11.9-3.11.1 slurm_20_11-sql-debuginfo-20.11.9-3.11.1 slurm_20_11-sview-20.11.9-3.11.1 slurm_20_11-sview-debuginfo-20.11.9-3.11.1 slurm_20_11-torque-20.11.9-3.11.1 slurm_20_11-torque-debuginfo-20.11.9-3.11.1 slurm_20_11-webdoc-20.11.9-3.11.1 References: o https://www.suse.com/security/cve/CVE-2022-29500.html o https://www.suse.com/security/cve/CVE-2022-29501.html o https://bugzilla.suse.com/1199278 o https://bugzilla.suse.com/1199279 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobST8kNZI30y1K9AQi9tQ//fK/kLybcrI7xhNznnqPeFa+4SF+XpeBq Cm4JqUQlRUHQ+rx0/5GE4MX3bTpRg1gSDCuvKsiKolOgSytTLALDiqMDsZqh6hg6 Lj7qdXZlNND04LKyAtH2DgNsqGQB7PvyRBrGpQvGX9qpK05MyASeSBpGcbxTPScT tWzH1aa/4Bs1JQyUvu7960mFDVAq8slQSRzDQinq3DJzl3ohvWmRGQkAG8gLcTtq 9bOX+IJ11cH2j0WtDEyoeaFACB+tK9nYG9cEtrpwaQqstgDhF25DMyAg00Im8amj WB+aXaz6qs48a79GiQoUWXFc1q5nYytHx9CFFVQT39NSi8dpv7SAx+w5aB2oJhRr ZaNBuebmi6DpGuDBWeBfSpRU4OxtqVYWKjDNL4Ye1nq09XRtTD2U+JpM2kj9+s3z 2eJE7ugy4W4Z+zkWMXnBoRsaT8pvSzReEDK6sapTmm+VHQaQ/cwJqPeEkeEMDkOb JIWDiXcd+AKkJrDVs2NxXC7raB8pgksF2oFDDW/oGGgvcVcT604z6kBxra3ijA1N IGaOJo+e0jpAyz2Mathc5Zrfj9BiKob+cWfTKMZQGNWKDSid1DrR85lu4S5NyiVF kvp98jU2i8mX1L+5ObpJoZ4vXo1TOsUyFzHEQ3zEZKzTMXoEzKWPn/Ti+l/ZcJO/ Fjdqc40XFmA= =AKc4 -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2460 - [SUSE] ucode-intel: CVSS (Max): 5.3

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2460 Security update for ucode-intel 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ucode-intel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-21151 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221727-1 Comment: CVSS (Max): 5.3 CVE-2022-21151 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for ucode-intel ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1727-1 Rating: moderate References: #1198717 #1199423 Cross-References: CVE-2022-21151 Affected Products: SUSE Enterprise Storage 7 SUSE Linux Enterprise Desktop 15-SP3 SUSE Linux Enterprise Desktop 15-SP4 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS SUSE Linux Enterprise High Performance Computing 15-SP3 SUSE Linux Enterprise High Performance Computing 15-SP4 SUSE Linux Enterprise Micro 5.1 SUSE Linux Enterprise Micro 5.2 SUSE Linux Enterprise Module for Basesystem 15-SP3 SUSE Linux Enterprise Module for Basesystem 15-SP4 SUSE Linux Enterprise Server 15-SP2-BCL SUSE Linux Enterprise Server 15-SP2-LTSS SUSE Linux Enterprise Server 15-SP3 SUSE Linux Enterprise Server 15-SP4 SUSE Linux Enterprise Server for SAP 15-SP2 SUSE Linux Enterprise Server for SAP Applications 15-SP3 SUSE Linux Enterprise Server for SAP Applications 15-SP4 SUSE Manager Proxy 4.1 SUSE Manager Proxy 4.2 SUSE Manager Retail Branch Server 4.1 SUSE Manager Server 4.1 SUSE Manager Server 4.2 openSUSE Leap 15.3 openSUSE Leap 15.4 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update for ucode-intel fixes the following issues: Updated to Intel CPU Microcode 20220510 release. (bsc#1199423) Updated to Intel CPU Microcode 20220419 release. (bsc#1198717) o CVE-2022-21151: Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (bsc#1199423). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-1727=1 o openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-1727=1 o SUSE Manager Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1727=1 o SUSE Manager Retail Branch Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1727=1 o SUSE Manager Proxy 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1727=1 o SUSE Linux Enterprise Server for SAP 15-SP2: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1727=1 o SUSE Linux Enterprise Server 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1727=1 o SUSE Linux Enterprise Server 15-SP2-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1727=1 o SUSE Linux Enterprise Module for Basesystem 15-SP4: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-1727=1 o SUSE Linux Enterprise Module for Basesystem 15-SP3: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1727=1 o SUSE Linux Enterprise Micro 5.2: zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1727=1 o SUSE Linux Enterprise Micro 5.1: zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1727=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1727=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1727=1 o SUSE Enterprise Storage 7: zypper in -t patch SUSE-Storage-7-2022-1727=1 Package List: o openSUSE Leap 15.4 (x86_64): ucode-intel-20220510-150200.14.1 o openSUSE Leap 15.3 (x86_64): ucode-intel-20220510-150200.14.1 o SUSE Manager Server 4.1 (x86_64): ucode-intel-20220510-150200.14.1 o SUSE Manager Retail Branch Server 4.1 (x86_64): ucode-intel-20220510-150200.14.1 o SUSE Manager Proxy 4.1 (x86_64): ucode-intel-20220510-150200.14.1 o SUSE Linux Enterprise Server for SAP 15-SP2 (x86_64): ucode-intel-20220510-150200.14.1 o SUSE Linux Enterprise Server 15-SP2-LTSS (x86_64): ucode-intel-20220510-150200.14.1 o SUSE Linux Enterprise Server 15-SP2-BCL (x86_64): ucode-intel-20220510-150200.14.1 o SUSE Linux Enterprise Module for Basesystem 15-SP4 (x86_64): ucode-intel-20220510-150200.14.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (x86_64): ucode-intel-20220510-150200.14.1 o SUSE Linux Enterprise Micro 5.2 (x86_64): ucode-intel-20220510-150200.14.1 o SUSE Linux Enterprise Micro 5.1 (x86_64): ucode-intel-20220510-150200.14.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (x86_64): ucode-intel-20220510-150200.14.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (x86_64): ucode-intel-20220510-150200.14.1 o SUSE Enterprise Storage 7 (x86_64): ucode-intel-20220510-150200.14.1 References: o https://www.suse.com/security/cve/CVE-2022-21151.html o https://bugzilla.suse.com/1198717 o https://bugzilla.suse.com/1199423 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobRy8kNZI30y1K9AQhMHg/+L4eaPYkkJix7srB6LXTGR5yAV4fKO21H lKWr2abXQtiwmGG+4huoSeOWxd0O0PpbdzWBLR0OsPlfk11SaM9rJB0hrYMSvdL1 isSdmwTJSFDFiNfckGagMPsaEag24GiMkuWWfkiAcWeOtirXdUQbYSUSInF2MB2n sibq/RONY0xfFlNuBQBb3cWjfYJnLxQ8mgH2L1BVQCvGJ5L+M4tm98upNmEjsc3X 2yGwKeySAzfW5Svqse2/lkVvpiRoqxatLFv9/hLTkMoptAxiyV5nK+MFCX0LJWwv qapWf0Tl6X5LYsfgvTCAZeT0SZvNN1EgP3pbXy6R5t+n/3tM5qR0wbMGR85W7Kgt YZT19Covo0Q0KQWHNK8Iq24dX5DLaj0bMo+mcsgJIuVtLfch610kac5rSEDG+Pg9 hFCw0EthC/d3Z89RHVsdOcRAGg6jx9NylaTegr0gblqdG/t+xqhJV4T90j17rz95 sFxS65maVWUoWDB2SH7qhDUuYAh5MaLVk+QXW2j07iu8VjzJByFaHe1pXHDex11x 2Ks0oF59E7dk/jAS7zCb20WlrJ0P34aCr++/Zz1XiHWBXthsBb6avKt7qPhKKDFG BU7OuJNQpch4H2MZr6cIam91tl0k0hOdwqp3QXyFD+N2GnFkUUCO6z/mGYP6TtbD LJ9vgvBY//Y= =9FPm -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2459 - [SUSE] ucode-intel: CVSS (Max): 5.3

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2459 Security update for ucode-intel 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ucode-intel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-21151 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221728-1 Comment: CVSS (Max): 5.3 CVE-2022-21151 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for ucode-intel ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1728-1 Rating: moderate References: #1198717 #1199423 Cross-References: CVE-2022-21151 Affected Products: SUSE CaaS Platform 4.0 SUSE Enterprise Storage 6 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS SUSE Linux Enterprise Server 15-SP1-BCL SUSE Linux Enterprise Server 15-SP1-LTSS SUSE Linux Enterprise Server for SAP 15-SP1 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update for ucode-intel fixes the following issues: Updated to Intel CPU Microcode 20220510 release. (bsc#1199423) Updated to Intel CPU Microcode 20220419 release. (bsc#1198717) o CVE-2022-21151: Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access (bsc#1199423). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Server for SAP 15-SP1: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1728=1 o SUSE Linux Enterprise Server 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1728=1 o SUSE Linux Enterprise Server 15-SP1-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1728=1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1728=1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1728=1 o SUSE Enterprise Storage 6: zypper in -t patch SUSE-Storage-6-2022-1728=1 o SUSE CaaS Platform 4.0: To install this update, use the SUSE CaaS Platform 'skuba' tool. I will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. Package List: o SUSE Linux Enterprise Server for SAP 15-SP1 (x86_64): ucode-intel-20220510-150100.3.210.1 o SUSE Linux Enterprise Server 15-SP1-LTSS (x86_64): ucode-intel-20220510-150100.3.210.1 o SUSE Linux Enterprise Server 15-SP1-BCL (x86_64): ucode-intel-20220510-150100.3.210.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (x86_64): ucode-intel-20220510-150100.3.210.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (x86_64): ucode-intel-20220510-150100.3.210.1 o SUSE Enterprise Storage 6 (x86_64): ucode-intel-20220510-150100.3.210.1 o SUSE CaaS Platform 4.0 (x86_64): ucode-intel-20220510-150100.3.210.1 References: o https://www.suse.com/security/cve/CVE-2022-21151.html o https://bugzilla.suse.com/1198717 o https://bugzilla.suse.com/1199423 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobRkMkNZI30y1K9AQirLBAAogFw5b0UrSpJJjYGPvDDnBwoKbVFJ8jU FSDjmnP6QnPF0D5XvZKX7gX3eddYhJCvSbPpSw1B54CU8tMwvSn4rIVtFZ2vurC7 PFPpUcdRYlrtZz/TAmzAF9Grnrmy5MCTaVowgjOgQxTPb/ijj62zL6UERa0Vtrd9 PJAOlI03FQof61+M+fdJaGukegXsqDa2zE8PgYJjVmw1fPOjEfNcGOnynjDMdkQo PT6kAwOleEUyRg0OhWdNgkZsMfbX8vjmnIAPabFFxj4G4ZHIIp8PelKSIC7bDsFh CP05ffsi3pByJUaxCElqZK7KxWJwSh9dCfzJ53+8xRVuURL2iu8boUJ8YJdzJsDB 4yHgdJQQk53CjQqnGCAddYQa/KszP6CrH506ZksScPBZ+wCU9YBgjUzcaGsy544a tq8Eek91J/RsB5UY6MfCdxQ4Ngc2h1euUM681AJj5hdCYYW9OXDlDiH0oYh4dZGU 8CMF9BqyPncR5JTegfn/u+MU7fCtDIeBBh74WYQbhQDVXbxa6pOhH7ZwlDcQTxrD 7Df/01l+y14vlIiPs46XzWhNIdo1216/9NwuO5HKigh8hajVcPxRZ0a20KA2CNlU nuTIloBt8SJzv5sAgQg6XuN7OI2zAtGEEMJSrXwnPTFtdwXxVqc/UkOp/wY7UABX ykvgF45K7g0= =Sat4 -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2458 - [SUSE] SUSE OpenStack Cloud 9 and Crowbar 9: CVSS (Max): 8.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2458 Security update for ardana-barbican, grafana, openstack-barbican, openstack-cinder, openstack-heat-gbp, openstack-horizon-plugin-gbp-ui, openstack-ironic, openstack-keystone, openstack-neutron-gbp, python-lxml, release-notes-suse-openstack-cloud 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: SUSE OpenStack Cloud 9 SUSE OpenStack Cloud Crowbar 9 Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-29970 CVE-2022-23452 CVE-2022-23451 CVE-2022-22817 CVE-2022-22816 CVE-2022-22815 CVE-2021-44716 CVE-2021-43818 CVE-2021-43813 CVE-2021-41184 CVE-2021-41183 CVE-2021-41182 CVE-2021-40085 CVE-2021-38155 CVE-2021-28957 CVE-2020-27783 CVE-2018-19787 CVE-2014-3146 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221729-1 Comment: CVSS (Max): 8.0 CVE-2021-40085 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for ardana-barbican, grafana, openstack-barbican, openstack-cinder, openstack-heat-gbp, openstack-horizon-plugin-gbp-ui, openstack-ironic, openstack-keystone, openstack-neutron-gbp, python-lxml, release-not ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1729-1 Rating: important References: #1118088 #1179534 #1184177 #1186380 #1189390 #1189794 #1192070 #1192073 #1192075 #1193597 #1193688 #1193752 #1194521 #1194551 #1194552 #1194952 #1194954 #1199138 Cross-References: CVE-2018-19787 CVE-2020-27783 CVE-2021-28957 CVE-2021-38155 CVE-2021-40085 CVE-2021-41182 CVE-2021-41183 CVE-2021-41184 CVE-2021-43813 CVE-2021-43818 CVE-2021-44716 CVE-2022-22815 CVE-2022-22816 CVE-2022-22817 CVE-2022-23451 CVE-2022-23452 CVE-2022-29970 Affected Products: SUSE OpenStack Cloud 9 SUSE OpenStack Cloud Crowbar 9 ______________________________________________________________________________ es-suse-openstack-cloud An update that solves 17 vulnerabilities, contains two features and has one errata is now available. Description: This update for ardana-barbican, grafana, openstack-barbican, openstack-cinder, openstack-heat-gbp, openstack-horizon-plugin-gbp-ui, openstack-ironic, openstack-keystone, openstack-neutron-gbp, python-lxml, release-notes-suse-openstack-cloud fixes the following issues: Security fixes included on the update: ardana-barbican: o Update policies to protect container secret access (SOC-11621) o Update policies to protect secret metadata access (SOC-11620) openstack-neutron: o CVE-2021-40085: Fixed arbitrary dnsmasq reconfiguration via extra_dhcp_opts (bsc#1189794). rubygem-sinatra: o CVE-2022-29970: Fixed path traversal possible outside of public_dir when serving static files (bsc#1199138). python-XStatic-jquery-ui: o CVE-2021-41182: Fixed XSS in the `altField` option of the Datepicker widget (bsc#1192070) o CVE-2021-41183: Fixed XSS in the `of` option of the `.position()` util (bsc #1192073) o CVE-2021-41184: Fixed XSS in `*Text` options of the Datepicker widget (bsc# 1192075) python-lxml: o CVE-2018-19787: Fixed that the lxml.html.clean module does remove javascript in lxml/html/clean.py (bsc#1118088). o CVE-2020-27783: Fixed mXSS due to the use of improper parser (bsc#1179534). o CVE-2021-28957: Fixed missing input sanitization for formaction HTML5 attributes that may have led to XSS (bsc#1184177). o CVE-2021-43818: Fixed HTML Cleaner that allowed crafted and SVG embedded scripts to pass through (bsc#1193752). openstack-barbican: o CVE-2022-23451: Disallows authenticated users to add/modify/delete arbitrary metadata on any secret (bsc#1194952). o CVE-2022-23452: Disallows anyone with an admin role to add their secrets to a different project's containers (bsc#1194954). grafana: o CVE-2021-44716: Fixed net/http: limit growth of header canonicalization cache (bsc#1193597). openstack-keystone: o CVE-2021-38155: Fixed information disclosure during account locking (bsc# 1189390). Non-security fixes included on the update: Changes in ardana-barbican: o Update to version 9.0+git.1644879908.8a641c1: * Update policies to protect container secret access (SOC-11621) o Update to version 9.0+git.1643052417.9a3348e: * update policies to protect secret metadata access (SOC-11620) Changes in grafana: o Add CVE-2021-43813.patch (bsc#1193688, CVE-2021-43813) * directory traversal vulnerability for .md files o Bump Go to 1.16 (bsc#1193597, CVE-2021-44716) * Fix Go net/http: limit growth of header canonicalization cache Changes in openstack-barbican: o Add patches (0001-Fix-RBAC-and-ACL-access-for-managing-secret-containe.patch and 0001-Fix-policy-for-adding-a-secret-to-a-container.patch) to fix the legacy policy rules for adding a secret to a container and removing a secret from a container. bsc#1194954,CVE-2022-23452 o Add patch (0001-Fix-secret-metadata-access-rules.patch) to fix the legacy policy rules for accessing secret metadata by checking that the user making the request is authenticated for the project that owns the secret. bsc# 1194952,CVE-2022-23451 Changes in openstack-cinder: o Update to version cinder-13.0.10.dev24: * Correct group:reset\_group\ _snapshot\_status policy Changes in openstack-cinder: o Update to version cinder-13.0.10.dev24: * Correct group:reset\_group\ _snapshot\_status policy Changes in openstack-heat-gbp: o Update to version group-based-policy-automation-14.0.1.dev4: * Add support for yoga o Update to version group-based-policy-automation-14.0.1.dev3: * Python2/3 compatibility fixes o Update to version group-based-policy-automation-14.0.1.dev2: * Add support for xena o Update to version group-based-policy-automation-14.0.1.dev1: * Remove py27 from gate jobs 14.0.0 Changes in openstack-horizon-plugin-gbp-ui: o Update to version group-based-policy-ui-14.0.1.dev3: * Add support for yoga o Update to version group-based-policy-ui-14.0.1.dev2: * Python2/3 compatibility changes o Update to version group-based-policy-ui-14.0.1.dev1: * Add support for xena 14.0.0 Changes in openstack-ironic: o Update to version ironic-11.1.5.dev18: * Cleanup stable/rocky legacy jobs Changes in openstack-ironic: o Update to version ironic-11.1.5.dev18: * Cleanup stable/rocky legacy jobs Changes in openstack-keystone: o Update to version keystone-14.2.1.dev9: * Delete system role assignments from system\_assignment table Changes in openstack-keystone: o Add patch (0001-Hide-AccountLocked-exception-from-end-users.patch) to fix the problem where AccountLocked exception discloses sensitive information. bsc#1189390,CVE-2021-38155 o Update to version keystone-14.2.1.dev9: * Delete system role assignments from system\_assignment table Changes in openstack-neutron-gbp: o Update to version group-based-policy-14.0.1.dev33: * Populate network mtu for erspan o Update to version group-based-policy-14.0.1.dev32: * ERSPAN config error when Openstack port is created in a different project than network it belongs to 2014.2.rc1 o Update to version group-based-policy-14.0.1.dev31: * Python2/3 compatibility fixes 2014.2.0rc1 o Update to version group-based-policy-14.0.1.dev29: * Fix oslo\_i18n usage o Update to version group-based-policy-14.0.1.dev27: * Update mechanism\ _driver cache 2014.2.rc1 o Update to version group-based-policy-14.0.1.dev26: * Add support for xena o Update to version group-based-policy-14.0.1.dev24: * update\_floatingip\ _status\_while\_deleting\_the\_vm o Update to version group-based-policy-14.0.1.dev22: * Updating host id by appending pid in existing host id 2014.2.0rc1 o Update to version group-based-policy-14.0.1.dev20: * Revert "Add workaround to get\_subnets" Changes in python-lxml: o Fix bsc#1179534 (CVE-2020-27783) mXSS due to the use of improper parser Patch files: 0001-CVE-2020-27783.patch 0002-CVE-2020-27783.patch o Fix bsc#1118088 (CVE-2018-19787) lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks Patch file: 0001-CVE-2018-19787.patch o Fix bsc#1184177 (CVE-2021-28957) missing input sanitization for formaction HTML5 attributes may lead to XSS Patch file: 0001-CVE-2021-28957.patch o Fix bsc#1193752 (CVE-2021-43818) Cleaner: Remove SVG image data URLs since they can embed script content. Reported as GHSL-2021-1037 and GHSL-2021-1038 Patch files 0001-CVE-2021-43818.patch 0002-CVE-2021-43818.patch Changes in openstack-neutron-doc: o Update to version neutron-13.0.8.dev206: * Wait longer before deleting DPDK vhu trunk bridges o Update to version neutron-13.0.8.dev205: * Do no use "--strict" for OF deletion in TRANSIENT\_TABLE o Update to version neutron-13.0.8.dev203: * Populate self.floating\_ips\ _dict using "ip rule" information o Update to version neutron-13.0.8.dev201: * [Functional] Wait for the initial state of ha router before test * Don't setup bridge controller if it is already set o Update to version neutron-13.0.8.dev198: * Remove dhcp\_extra\_opt name after first newline character o Update to version neutron-13.0.8.dev196: * [L3] Use processing queue for network update events * Add extra logs to the network update callback in L3 agent o Update to version neutron-13.0.8.dev192: * Remove dhcp\_extra\_opt value after first newline character o Update to version neutron-13.0.8.dev190: * Don't use singleton in routes.middleware.RoutesMiddleware o Update to version neutron-13.0.8.dev189: * Fix notify listener syntax for SEGMENT\_HOST\_MAPPING o Update to version neutron-13.0.8.dev188: * Clean port forwarding cache when router is DOWN o Update to version neutron-13.0.8.dev186: * Remove FIP agent's gw port when L3 agent is deleted o Update to version neutron-13.0.8.dev184: * Force to close http connection after notify about HA router status o Update to version neutron-13.0.8.dev183: * Don't configure dnsmasq entries for "network" ports o Update to version neutron-13.0.8.dev181: * Exclude fallback tunnel devices from netns cleanup o Update to version neutron-13.0.8.dev180: * [DVR] Send allowed address pairs info to the L3 agents * designate: allow PTR zone creation to fail * Don't try to create default SG when security groups are disabled o Update to version neutron-13.0.8.dev174: * Fix update of trunk subports during live migration o Update to version neutron-13.0.8.dev172: * [ovs fw] Restrict IPv6 NA and DHCP(v6) IP and MAC source addresses o Update to version neutron-13.0.8.dev170: * Call install\_ingress\_direct\ _goto\_flows() when ovs restarts o Update to version neutron-13.0.8.dev168: * Fix multicast traffic with IGMP snooping enabled o Update to version neutron-13.0.8.dev166: * Fix OVS conjunctive IP flows cleanup Changes in openstack-neutron: o Update to version neutron-13.0.8.dev206: * Wait longer before deleting DPDK vhu trunk bridges o Update to version neutron-13.0.8.dev205: * Do no use "--strict" for OF deletion in TRANSIENT\_TABLE o Update to version neutron-13.0.8.dev203: * Populate self.floating\_ips\ _dict using "ip rule" information o Update to version neutron-13.0.8.dev201: * [Functional] Wait for the initial state of ha router before test * Don't setup bridge controller if it is already set o Update to version neutron-13.0.8.dev198: * Remove dhcp\_extra\_opt name after first newline character o Update to version neutron-13.0.8.dev196: * [L3] Use processing queue for network update events * Add extra logs to the network update callback in L3 agent o Remove cve-2021-40085-stable-rocky.patch (merged upstream) o Update to version neutron-13.0.8.dev192: * Remove dhcp\_extra\_opt value after first newline character o Update to version neutron-13.0.8.dev190: * Don't use singleton in routes.middleware.RoutesMiddleware o Update to version neutron-13.0.8.dev189: * Fix notify listener syntax for SEGMENT\_HOST\_MAPPING o Add cve-2021-40085-stable-rocky.patch (bsc#1189794, CVE-2021-40085) * Remove dhcp_extra_opt value after first newline character o Update to version neutron-13.0.8.dev188: * Clean port forwarding cache when router is DOWN o Update to version neutron-13.0.8.dev186: * Remove FIP agent's gw port when L3 agent is deleted o Update to version neutron-13.0.8.dev184: * Force to close http connection after notify about HA router status o Update to version neutron-13.0.8.dev183: * Don't configure dnsmasq entries for "network" ports o Update to version neutron-13.0.8.dev181: * Exclude fallback tunnel devices from netns cleanup o Update to version neutron-13.0.8.dev180: * [DVR] Send allowed address pairs info to the L3 agents * designate: allow PTR zone creation to fail * Don't try to create default SG when security groups are disabled o Update to version neutron-13.0.8.dev174: * Fix update of trunk subports during live migration o Update to version neutron-13.0.8.dev172: * [ovs fw] Restrict IPv6 NA and DHCP(v6) IP and MAC source addresses o Update to version neutron-13.0.8.dev170: * Call install\_ingress\_direct\ _goto\_flows() when ovs restarts o Update to version neutron-13.0.8.dev168: * Fix multicast traffic with IGMP snooping enabled o Update to version neutron-13.0.8.dev166: * Fix OVS conjunctive IP flows cleanup Changes in python-Pillow: o Add 030-CVE-2022-22817.patch * From upstream, backported * Fixes CVE-2022-22817, bsc#1194521 * test from upstream updated for python2 o Add 028-CVE-2022-22815.patch * From upstream, backported * Fixes CVE-2022-22815, bsc#1194552 o Add 029-CVE-2022-22816.patch * From upstream, backported * Fixes CVE-2022-22816, bsc#1194551 Changes in python-XStatic-jquery-ui: o Update to version 1.13.0.1 (bsc#1192070, CVE-2021-41182, bsc#1192073, CVE-2021-41184, bsc#1192075, CVE-2021-41183) * Fix XSS in the altField option of the Datepicker widget (CVE-2021-41182) * Fix XSS in *Text options of the Datepicker widget (CVE-2021-41183) * Fix XSS in the of option of the .position() util (CVE-2021-41184) * Drop support for Query 1.7 * Accordion: allow function parameter for selecting header elements * Datepicker: add optional onUpdateDatepicker callback Changes in release-notes-suse-openstack-cloud: o Update to version 9.20220413: * Update release notes to indicate support for SES7 o Update to version 9.20220112: * Add reference to keystone bcrypt issue to known limitations (bsc#1186380) Changes in rubygem-sinatra: o Add CVE-2022-29970.patch (bsc#1199138, CVE-2022-29970) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE OpenStack Cloud Crowbar 9: zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2022-1729=1 o SUSE OpenStack Cloud 9: zypper in -t patch SUSE-OpenStack-Cloud-9-2022-1729=1 Package List: o SUSE OpenStack Cloud Crowbar 9 (x86_64): grafana-6.7.4-3.26.1 grafana-debuginfo-6.7.4-3.26.1 python-Pillow-5.2.0-3.17.1 python-Pillow-debuginfo-5.2.0-3.17.1 python-Pillow-debugsource-5.2.0-3.17.1 python-lxml-4.2.4-3.3.1 python-lxml-debuginfo-4.2.4-3.3.1 python-lxml-debugsource-4.2.4-3.3.1 ruby2.1-rubygem-sinatra-1.4.6-4.3.1 o SUSE OpenStack Cloud Crowbar 9 (noarch): openstack-barbican-7.0.1~dev24-3.14.1 openstack-barbican-api-7.0.1~dev24-3.14.1 openstack-barbican-keystone-listener-7.0.1~dev24-3.14.1 openstack-barbican-retry-7.0.1~dev24-3.14.1 openstack-barbican-worker-7.0.1~dev24-3.14.1 openstack-cinder-13.0.10~dev24-3.34.2 openstack-cinder-api-13.0.10~dev24-3.34.2 openstack-cinder-backup-13.0.10~dev24-3.34.2 openstack-cinder-scheduler-13.0.10~dev24-3.34.2 openstack-cinder-volume-13.0.10~dev24-3.34.2 openstack-heat-gbp-14.0.1~dev4-3.9.1 openstack-horizon-plugin-gbp-ui-14.0.1~dev3-3.9.1 openstack-ironic-11.1.5~dev18-3.28.2 openstack-ironic-api-11.1.5~dev18-3.28.2 openstack-ironic-conductor-11.1.5~dev18-3.28.2 openstack-keystone-14.2.1~dev9-3.28.2 openstack-neutron-13.0.8~dev206-3.40.1 openstack-neutron-dhcp-agent-13.0.8~dev206-3.40.1 openstack-neutron-gbp-14.0.1~dev33-3.31.1 openstack-neutron-ha-tool-13.0.8~dev206-3.40.1 openstack-neutron-l3-agent-13.0.8~dev206-3.40.1 openstack-neutron-linuxbridge-agent-13.0.8~dev206-3.40.1 openstack-neutron-macvtap-agent-13.0.8~dev206-3.40.1 openstack-neutron-metadata-agent-13.0.8~dev206-3.40.1 openstack-neutron-metering-agent-13.0.8~dev206-3.40.1 openstack-neutron-openvswitch-agent-13.0.8~dev206-3.40.1 openstack-neutron-server-13.0.8~dev206-3.40.1 python-XStatic-jquery-ui-1.13.0.1-4.3.1 python-barbican-7.0.1~dev24-3.14.1 python-cinder-13.0.10~dev24-3.34.2 python-heat-gbp-14.0.1~dev4-3.9.1 python-horizon-plugin-gbp-ui-14.0.1~dev3-3.9.1 python-ironic-11.1.5~dev18-3.28.2 python-keystone-14.2.1~dev9-3.28.2 python-neutron-13.0.8~dev206-3.40.1 python-neutron-gbp-14.0.1~dev33-3.31.1 release-notes-suse-openstack-cloud-9.20220413-3.30.1 o SUSE OpenStack Cloud 9 (noarch): ardana-barbican-9.0+git.1644879908.8a641c1-3.13.1 openstack-barbican-7.0.1~dev24-3.14.1 openstack-barbican-api-7.0.1~dev24-3.14.1 openstack-barbican-keystone-listener-7.0.1~dev24-3.14.1 openstack-barbican-retry-7.0.1~dev24-3.14.1 openstack-barbican-worker-7.0.1~dev24-3.14.1 openstack-cinder-13.0.10~dev24-3.34.2 openstack-cinder-api-13.0.10~dev24-3.34.2 openstack-cinder-backup-13.0.10~dev24-3.34.2 openstack-cinder-scheduler-13.0.10~dev24-3.34.2 openstack-cinder-volume-13.0.10~dev24-3.34.2 openstack-heat-gbp-14.0.1~dev4-3.9.1 openstack-horizon-plugin-gbp-ui-14.0.1~dev3-3.9.1 openstack-ironic-11.1.5~dev18-3.28.2 openstack-ironic-api-11.1.5~dev18-3.28.2 openstack-ironic-conductor-11.1.5~dev18-3.28.2 openstack-keystone-14.2.1~dev9-3.28.2 openstack-neutron-13.0.8~dev206-3.40.1 openstack-neutron-dhcp-agent-13.0.8~dev206-3.40.1 openstack-neutron-gbp-14.0.1~dev33-3.31.1 openstack-neutron-ha-tool-13.0.8~dev206-3.40.1 openstack-neutron-l3-agent-13.0.8~dev206-3.40.1 openstack-neutron-linuxbridge-agent-13.0.8~dev206-3.40.1 openstack-neutron-macvtap-agent-13.0.8~dev206-3.40.1 openstack-neutron-metadata-agent-13.0.8~dev206-3.40.1 openstack-neutron-metering-agent-13.0.8~dev206-3.40.1 openstack-neutron-openvswitch-agent-13.0.8~dev206-3.40.1 openstack-neutron-server-13.0.8~dev206-3.40.1 python-XStatic-jquery-ui-1.13.0.1-4.3.1 python-barbican-7.0.1~dev24-3.14.1 python-cinder-13.0.10~dev24-3.34.2 python-heat-gbp-14.0.1~dev4-3.9.1 python-horizon-plugin-gbp-ui-14.0.1~dev3-3.9.1 python-ironic-11.1.5~dev18-3.28.2 python-keystone-14.2.1~dev9-3.28.2 python-neutron-13.0.8~dev206-3.40.1 python-neutron-gbp-14.0.1~dev33-3.31.1 release-notes-suse-openstack-cloud-9.20220413-3.30.1 venv-openstack-barbican-x86_64-7.0.1~dev24-3.35.2 venv-openstack-cinder-x86_64-13.0.10~dev24-3.38.1 venv-openstack-designate-x86_64-7.0.2~dev2-3.35.1 venv-openstack-glance-x86_64-17.0.1~dev30-3.33.1 venv-openstack-heat-x86_64-11.0.4~dev4-3.35.1 venv-openstack-horizon-x86_64-14.1.1~dev11-4.39.1 venv-openstack-ironic-x86_64-11.1.5~dev18-4.33.1 venv-openstack-keystone-x86_64-14.2.1~dev9-3.36.1 venv-openstack-magnum-x86_64-7.2.1~dev1-4.35.1 venv-openstack-manila-x86_64-7.4.2~dev60-3.41.1 venv-openstack-monasca-ceilometer-x86_64-1.8.2~dev3-3.35.1 venv-openstack-monasca-x86_64-2.7.1~dev10-3.37.1 venv-openstack-neutron-x86_64-13.0.8~dev206-6.39.1 venv-openstack-nova-x86_64-18.3.1~dev91-3.39.1 venv-openstack-octavia-x86_64-3.2.3~dev7-4.35.1 venv-openstack-sahara-x86_64-9.0.2~dev15-3.35.1 venv-openstack-swift-x86_64-2.19.2~dev48-2.30.1 o SUSE OpenStack Cloud 9 (x86_64): grafana-6.7.4-3.26.1 grafana-debuginfo-6.7.4-3.26.1 python-Pillow-5.2.0-3.17.1 python-Pillow-debuginfo-5.2.0-3.17.1 python-Pillow-debugsource-5.2.0-3.17.1 python-lxml-4.2.4-3.3.1 python-lxml-debuginfo-4.2.4-3.3.1 python-lxml-debugsource-4.2.4-3.3.1 References: o https://www.suse.com/security/cve/CVE-2018-19787.html o https://www.suse.com/security/cve/CVE-2020-27783.html o https://www.suse.com/security/cve/CVE-2021-28957.html o https://www.suse.com/security/cve/CVE-2021-38155.html o https://www.suse.com/security/cve/CVE-2021-40085.html o https://www.suse.com/security/cve/CVE-2021-41182.html o https://www.suse.com/security/cve/CVE-2021-41183.html o https://www.suse.com/security/cve/CVE-2021-41184.html o https://www.suse.com/security/cve/CVE-2021-43813.html o https://www.suse.com/security/cve/CVE-2021-43818.html o https://www.suse.com/security/cve/CVE-2021-44716.html o https://www.suse.com/security/cve/CVE-2022-22815.html o https://www.suse.com/security/cve/CVE-2022-22816.html o https://www.suse.com/security/cve/CVE-2022-22817.html o https://www.suse.com/security/cve/CVE-2022-23451.html o https://www.suse.com/security/cve/CVE-2022-23452.html o https://www.suse.com/security/cve/CVE-2022-29970.html o https://bugzilla.suse.com/1118088 o https://bugzilla.suse.com/1179534 o https://bugzilla.suse.com/1184177 o https://bugzilla.suse.com/1186380 o https://bugzilla.suse.com/1189390 o https://bugzilla.suse.com/1189794 o https://bugzilla.suse.com/1192070 o https://bugzilla.suse.com/1192073 o https://bugzilla.suse.com/1192075 o https://bugzilla.suse.com/1193597 o https://bugzilla.suse.com/1193688 o https://bugzilla.suse.com/1193752 o https://bugzilla.suse.com/1194521 o https://bugzilla.suse.com/1194551 o https://bugzilla.suse.com/1194552 o https://bugzilla.suse.com/1194952 o https://bugzilla.suse.com/1194954 o https://bugzilla.suse.com/1199138 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobRSckNZI30y1K9AQiEYw//Ua28W/gdiSnLYWnzcEFp4S3GWJTvPbg6 w9yDxwDWKD4EjZG4e0UdZwttbpt2tcy9GnhPbN67nYQEWAdSMP+qn/Uk9g7S3ha2 GGlQzZFCLuotYLRtp8dYC1qxIQP4kOQ0BIQfpCA3dHZR4oIFIfInnx6zSt1akepk Oy6srbA048Pg46eoxl8GxJBz/jr8ldg9+hdgOnxrp06FxHsl2EbrYfqi+UtyWr/0 /XxKYeQ0YIOYcUMm+YLijoNXe0qyQo1ZZXmm2UoaXV9Cd9VPbFpLZ9AtILfPORGC CYvtJYDg0573axzrZq8zKJYjln3pUeZn1XhKdsoZI5boUmoPWlgFs4AuUSx3aMNN WmQVYRBT2vkPYGdFUL+/oTD8ypmti6N6WtgSnYmD4YrBBvyNsTCbBEO6C+Q04MN+ JTRuF2g1zEiwa6hWw2MdbAZMLO9qmvCv/I5ZmcEq2SN73GNsYx//DOiN6Y4d5nXj RAddgavGtIltIGAOp92dGujwng42y8w/icW9xecky4IWY/fBpd7JWjbZgN4gdurl 1hmTvycAFziPrYG0/iQsezT223WsO1uVBLE2hMfZ6OOcYkfy5TPI0djt91A+byh1 GCLtKqE7Yz1DYHUgF4BI610EbFW8f12Y7EOfssHnK6D0I1Lcxtzamsy1jkZcrL+V ACulcNoJS3E= =6lxX -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2457 - [SUSE] libslirp: CVSS (Max): 3.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2457 Security update for libslirp 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: libslirp Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2021-3595 CVE-2021-3594 CVE-2021-3592 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221730-1 Comment: CVSS (Max): 3.8 CVE-2021-3595 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for libslirp ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1730-1 Rating: important References: #1187364 #1187366 #1187367 #1198773 Cross-References: CVE-2021-3592 CVE-2021-3594 CVE-2021-3595 Affected Products: SUSE Linux Enterprise High Performance Computing 15-SP3 SUSE Linux Enterprise High Performance Computing 15-SP4 SUSE Linux Enterprise Micro 5.1 SUSE Linux Enterprise Micro 5.2 SUSE Linux Enterprise Module for Server Applications 15-SP3 SUSE Linux Enterprise Module for Server Applications 15-SP4 SUSE Linux Enterprise Server 15-SP3 SUSE Linux Enterprise Server 15-SP4 SUSE Linux Enterprise Server for SAP Applications 15-SP3 SUSE Linux Enterprise Server for SAP Applications 15-SP4 SUSE Manager Proxy 4.2 SUSE Manager Server 4.2 openSUSE Leap 15.3 openSUSE Leap 15.4 ______________________________________________________________________________ An update that solves three vulnerabilities and has one errata is now available. Description: This update for libslirp fixes the following issues: o CVE-2021-3592: Fixed invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364). o CVE-2021-3594: Fixed invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367). o CVE-2021-3595: Fixed invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366). o Fix a dhcp regression [bsc#1198773] Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-1730=1 o openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-1730=1 o SUSE Linux Enterprise Module for Server Applications 15-SP4: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2022-1730=1 o SUSE Linux Enterprise Module for Server Applications 15-SP3: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-1730=1 o SUSE Linux Enterprise Micro 5.2: zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1730=1 o SUSE Linux Enterprise Micro 5.1: zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1730=1 Package List: o openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64): libslirp-debugsource-4.3.1-150300.6.2 libslirp-devel-4.3.1-150300.6.2 libslirp0-4.3.1-150300.6.2 libslirp0-debuginfo-4.3.1-150300.6.2 o openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): libslirp-debugsource-4.3.1-150300.6.2 libslirp-devel-4.3.1-150300.6.2 libslirp0-4.3.1-150300.6.2 libslirp0-debuginfo-4.3.1-150300.6.2 o SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64 ppc64le s390x x86_64): libslirp-debugsource-4.3.1-150300.6.2 libslirp-devel-4.3.1-150300.6.2 libslirp0-4.3.1-150300.6.2 libslirp0-debuginfo-4.3.1-150300.6.2 o SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64 ppc64le s390x x86_64): libslirp-debugsource-4.3.1-150300.6.2 libslirp-devel-4.3.1-150300.6.2 libslirp0-4.3.1-150300.6.2 libslirp0-debuginfo-4.3.1-150300.6.2 o SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64): libslirp-debugsource-4.3.1-150300.6.2 libslirp0-4.3.1-150300.6.2 libslirp0-debuginfo-4.3.1-150300.6.2 o SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64): libslirp-debugsource-4.3.1-150300.6.2 libslirp0-4.3.1-150300.6.2 libslirp0-debuginfo-4.3.1-150300.6.2 References: o https://www.suse.com/security/cve/CVE-2021-3592.html o https://www.suse.com/security/cve/CVE-2021-3594.html o https://www.suse.com/security/cve/CVE-2021-3595.html o https://bugzilla.suse.com/1187364 o https://bugzilla.suse.com/1187366 o https://bugzilla.suse.com/1187367 o https://bugzilla.suse.com/1198773 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobQ8skNZI30y1K9AQg6hg/+Ppvrm3oSimRY3YPzUpzl9u7EDRZFQhL6 VbKJnKD9LeNDmCvGZ+jXE97lMh8yBmvd3r8N6IWuA85f7jVo1PW/R9IaRwG8FTFK 2oQD86BOcujdeG1co2a7LDOxlYUOAEY44gLPh7NNGYLdSLghpsZ0tkImpaJwN7uO 5DmweK0VrehGhaDLGmVNJ7wOYB5SMWkXR3hYgpCmeeoZ1SgBkClbw3H42rCThJK5 2cTgSzn2sYBo9M+9UWSViwHWHK2OGDgBuPcCqyaAiRlwuHj5ujNQXHSypy6GveFQ LqoC3R6zswA/iF4XiZnfuYprCt/fzAsPbAKnSZGz808fUrA7JiiweN8KsFp3HBKX yR7ThDJgvTqh3hc99IPNQ50wPWZLlw+Bye5kbLFmkVyVW/z+WsfdAxGOJ53idz9v EqAFdm33idRBIDvhWEOEQBFWzgYWaj+OntvbAWoVFmHS0DMKTgs0hegxj4nVf7XT Doaf9WTT5UJok6Y9wwjE+mUyTKzt+M9/jR9g7hGvcUicYlGTQAivaoFxXEzO98dW koVQgPCpeF2vUlSgFc/yY9KxBDoNsA0Pv1ocj3uMMhEj6vAqXFrrD7ONYh6fFyAg b5jl1Xeu0+EOtgzT4Gf0hEIznscbxSpyFlRhNOM4ryUsb1WlmQHkkCQnd6sQJJcM B0Y6uULe09Y= =caD6 -----END PGP SIGNATURE-----
2022. május 20.

ESB-2022.2456 - [SUSE] MozillaFirefox: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2456 Security update for MozillaFirefox 20 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: MozillaFirefox Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-29917 CVE-2022-29916 CVE-2022-29914 CVE-2022-29912 CVE-2022-29911 CVE-2022-29909 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221731-1 Comment: CVSS (Max): 7.5 CVE-2022-29917 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for MozillaFirefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1731-1 Rating: important References: #1198970 Cross-References: CVE-2022-29909 CVE-2022-29911 CVE-2022-29912 CVE-2022-29914 CVE-2022-29916 CVE-2022-29917 Affected Products: SUSE CaaS Platform 4.0 SUSE Enterprise Storage 6 SUSE Linux Enterprise High Performance Computing 15-ESPOS SUSE Linux Enterprise High Performance Computing 15-LTSS SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS SUSE Linux Enterprise Server 15-LTSS SUSE Linux Enterprise Server 15-SP1-BCL SUSE Linux Enterprise Server 15-SP1-LTSS SUSE Linux Enterprise Server for SAP 15 SUSE Linux Enterprise Server for SAP 15-SP1 ______________________________________________________________________________ An update that fixes 6 vulnerabilities is now available. Description: This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 91.9.0 ESR (MFSA 2022-17)(bsc#1198970): o CVE-2022-29914: Fullscreen notification bypass using popups o CVE-2022-29909: Bypassing permission prompt in nested browsing contexts o CVE-2022-29916: Leaking browser history with CSS variables o CVE-2022-29911: iframe Sandbox bypass o CVE-2022-29912: Reader mode bypassed SameSite cookies o CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Server for SAP 15-SP1: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1731=1 o SUSE Linux Enterprise Server for SAP 15: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-1731=1 o SUSE Linux Enterprise Server 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1731=1 o SUSE Linux Enterprise Server 15-SP1-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1731=1 o SUSE Linux Enterprise Server 15-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-2022-1731=1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1731=1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1731=1 o SUSE Linux Enterprise High Performance Computing 15-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-2022-1731=1 o SUSE Linux Enterprise High Performance Computing 15-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-2022-1731=1 o SUSE Enterprise Storage 6: zypper in -t patch SUSE-Storage-6-2022-1731=1 o SUSE CaaS Platform 4.0: To install this update, use the SUSE CaaS Platform 'skuba' tool. I will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. Package List: o SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64): MozillaFirefox-91.9.0-150000.150.38.3 MozillaFirefox-debuginfo-91.9.0-150000.150.38.3 MozillaFirefox-debugsource-91.9.0-150000.150.38.3 MozillaFirefox-devel-91.9.0-150000.150.38.3 MozillaFirefox-translations-common-91.9.0-150000.150.38.3 MozillaFirefox-translations-other-91.9.0-150000.150.38.3 o SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64): MozillaFirefox-91.9.0-150000.150.38.3 MozillaFirefox-debuginfo-91.9.0-150000.150.38.3 MozillaFirefox-debugsource-91.9.0-150000.150.38.3 MozillaFirefox-devel-91.9.0-150000.150.38.3 MozillaFirefox-translations-common-91.9.0-150000.150.38.3 MozillaFirefox-translations-other-91.9.0-150000.150.38.3 o SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64): MozillaFirefox-91.9.0-150000.150.38.3 MozillaFirefox-debuginfo-91.9.0-150000.150.38.3 MozillaFirefox-debugsource-91.9.0-150000.150.38.3 MozillaFirefox-devel-91.9.0-150000.150.38.3 MozillaFirefox-translations-common-91.9.0-150000.150.38.3 MozillaFirefox-translations-other-91.9.0-150000.150.38.3 o SUSE Linux Enterprise Server 15-SP1-BCL (x86_64): MozillaFirefox-91.9.0-150000.150.38.3 MozillaFirefox-debuginfo-91.9.0-150000.150.38.3 MozillaFirefox-debugsource-91.9.0-150000.150.38.3 MozillaFirefox-devel-91.9.0-150000.150.38.3 MozillaFirefox-translations-common-91.9.0-150000.150.38.3 MozillaFirefox-translations-other-91.9.0-150000.150.38.3 o SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x): MozillaFirefox-91.9.0-150000.150.38.3 MozillaFirefox-debuginfo-91.9.0-150000.150.38.3 MozillaFirefox-debugsource-91.9.0-150000.150.38.3 MozillaFirefox-devel-91.9.0-150000.150.38.3 MozillaFirefox-translations-common-91.9.0-150000.150.38.3 MozillaFirefox-translations-other-91.9.0-150000.150.38.3 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64): MozillaFirefox-91.9.0-150000.150.38.3 MozillaFirefox-debuginfo-91.9.0-150000.150.38.3 MozillaFirefox-debugsource-91.9.0-150000.150.38.3 MozillaFirefox-devel-91.9.0-150000.150.38.3 MozillaFirefox-translations-common-91.9.0-150000.150.38.3 MozillaFirefox-translations-other-91.9.0-150000.150.38.3 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64): MozillaFirefox-91.9.0-150000.150.38.3 MozillaFirefox-debuginfo-91.9.0-150000.150.38.3 MozillaFirefox-debugsource-91.9.0-150000.150.38.3 MozillaFirefox-devel-91.9.0-150000.150.38.3 MozillaFirefox-translations-common-91.9.0-150000.150.38.3 MozillaFirefox-translations-other-91.9.0-150000.150.38.3 o SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64): MozillaFirefox-91.9.0-150000.150.38.3 MozillaFirefox-debuginfo-91.9.0-150000.150.38.3 MozillaFirefox-debugsource-91.9.0-150000.150.38.3 MozillaFirefox-devel-91.9.0-150000.150.38.3 MozillaFirefox-translations-common-91.9.0-150000.150.38.3 MozillaFirefox-translations-other-91.9.0-150000.150.38.3 o SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64): MozillaFirefox-91.9.0-150000.150.38.3 MozillaFirefox-debuginfo-91.9.0-150000.150.38.3 MozillaFirefox-debugsource-91.9.0-150000.150.38.3 MozillaFirefox-devel-91.9.0-150000.150.38.3 MozillaFirefox-translations-common-91.9.0-150000.150.38.3 MozillaFirefox-translations-other-91.9.0-150000.150.38.3 o SUSE Enterprise Storage 6 (aarch64 x86_64): MozillaFirefox-91.9.0-150000.150.38.3 MozillaFirefox-debuginfo-91.9.0-150000.150.38.3 MozillaFirefox-debugsource-91.9.0-150000.150.38.3 MozillaFirefox-devel-91.9.0-150000.150.38.3 MozillaFirefox-translations-common-91.9.0-150000.150.38.3 MozillaFirefox-translations-other-91.9.0-150000.150.38.3 o SUSE CaaS Platform 4.0 (x86_64): MozillaFirefox-91.9.0-150000.150.38.3 MozillaFirefox-debuginfo-91.9.0-150000.150.38.3 MozillaFirefox-debugsource-91.9.0-150000.150.38.3 MozillaFirefox-devel-91.9.0-150000.150.38.3 MozillaFirefox-translations-common-91.9.0-150000.150.38.3 MozillaFirefox-translations-other-91.9.0-150000.150.38.3 References: o https://www.suse.com/security/cve/CVE-2022-29909.html o https://www.suse.com/security/cve/CVE-2022-29911.html o https://www.suse.com/security/cve/CVE-2022-29912.html o https://www.suse.com/security/cve/CVE-2022-29914.html o https://www.suse.com/security/cve/CVE-2022-29916.html o https://www.suse.com/security/cve/CVE-2022-29917.html o https://bugzilla.suse.com/1198970 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYobNhckNZI30y1K9AQioTQ//e3D5h38xGSIRjUMLXfxChf5rDWlzpy17 qTVmg0+/KvN+5pI2l0PH4fJP45WGIl+8yfJ9ABDvH8xWijyY5flU8g5Vmy8zSZd4 eskkXdMPo/EJZIljTHYLIYZj2O0GnJxYd79NJprpNSX50+cbethKwHm2ybl5gX0k giU5A3ett8im48wzWc4g44qCmUQvDuIPhcSwMycgNSyZZtizFKzZIQZfJ22pE5xm t1RGQuwu9cpDAGfvM8YSJkjiEXUzUr6za27Z6j/zljLpk/qwAThGs/yx7CguPKsN 7BupkdrYbmnPT2jnzC92G+UzH9uQRlhARSSB2Jk7au+gl+lFcJUTs1ilcdJiM9yP 8lUQ/Ovq/D5WBKkFmsa4oJSfY2Lh4qra+f/d4/ArRuvDoI8yyb5gaA8TMmrzoCr5 GRL/D9FOSHUWdQWhhcOarv+R7n9S2SgFJw9j8mxykDPensBY5R95LC4MKJvD9Rmz U/ZopZ6xt+zM5vAhA6ACjqnVQq3ZrQE9D0EQYUgXRxUQiUz1c0TwHSpAVxGXcxHW IgOZz2i3iQMwQAIDJCh1LCbwnc1APAjNKxU8dcwGEl01XNI6gBaoOtn4d44hRR3K mh93zbCoFJ9y6oS0bmaefOt+qNBi/xE/qAHGnh71G5JoteU0xU9VdNgVE1NtcgZ+ CSYCRaS5F1g= =+dQ9 -----END PGP SIGNATURE-----