AusCERT - Security Bulletins

Subscribe to AusCERT - Security Bulletins hírcsatorna
Latest published security bulletins. See https://www.auscert.org.au/rss/ for feed information.
Frissítve: 14 perc 34 másodperc
2022. március 15.

ESB-2022.1066 - [RedHat] thunderbird: CVSS (Max): 9.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1066 thunderbird security update 15 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: thunderbird Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-26486 CVE-2022-26485 CVE-2022-26387 CVE-2022-26386 CVE-2022-26384 CVE-2022-26383 CVE-2022-26381 CVE-2022-25315 CVE-2022-25236 CVE-2022-25235 CVE-2022-0566 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:0843 Comment: CVSS (Max): 9.8 CVE-2022-25315 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: thunderbird security update Advisory ID: RHSA-2022:0843-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:0843 Issue date: 2022-03-14 CVE Names: CVE-2022-0566 CVE-2022-25235 CVE-2022-25236 CVE-2022-25315 CVE-2022-26381 CVE-2022-26383 CVE-2022-26384 CVE-2022-26386 CVE-2022-26387 CVE-2022-26485 CVE-2022-26486 ===================================================================== 1. Summary: An update for thunderbird is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream EUS (v. 8.2) - aarch64, ppc64le, x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 91.7.0. Security Fix(es): * Mozilla: Use-after-free in XSLT parameter processing (CVE-2022-26485) * Mozilla: Use-after-free in WebGPU IPC Framework (CVE-2022-26486) * expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235) * expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236) * expat: Integer overflow in storeRawNames() (CVE-2022-25315) * Mozilla: Use-after-free in text reflows (CVE-2022-26381) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-26383) * Mozilla: iframe allow-scripts sandbox bypass (CVE-2022-26384) * Mozilla: Time-of-check time-of-use bug when verifying add-on signatures (CVE-2022-26387) * thunderbird: Crafted email could trigger an out-of-bounds write (CVE-2022-0566) * Mozilla: Temporary files downloaded to /tmp and accessible by other local users (CVE-2022-26386) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of Thunderbird must be restarted for the update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2055591 - CVE-2022-0566 thunderbird: Crafted email could trigger an out-of-bounds write 2056363 - CVE-2022-25315 expat: Integer overflow in storeRawNames() 2056366 - CVE-2022-25235 expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution 2056370 - CVE-2022-25236 expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution 2061735 - CVE-2022-26486 Mozilla: Use-after-free in WebGPU IPC Framework 2061736 - CVE-2022-26485 Mozilla: Use-after-free in XSLT parameter processing 2062220 - CVE-2022-26383 Mozilla: Browser window spoof using fullscreen mode 2062221 - CVE-2022-26384 Mozilla: iframe allow-scripts sandbox bypass 2062222 - CVE-2022-26387 Mozilla: Time-of-check time-of-use bug when verifying add-on signatures 2062223 - CVE-2022-26381 Mozilla: Use-after-free in text reflows 2062224 - CVE-2022-26386 Mozilla: Temporary files downloaded to /tmp and accessible by other local users 6. Package List: Red Hat Enterprise Linux AppStream EUS (v. 8.2): Source: thunderbird-91.7.0-2.el8_2.src.rpm aarch64: thunderbird-91.7.0-2.el8_2.aarch64.rpm thunderbird-debuginfo-91.7.0-2.el8_2.aarch64.rpm thunderbird-debugsource-91.7.0-2.el8_2.aarch64.rpm ppc64le: thunderbird-91.7.0-2.el8_2.ppc64le.rpm thunderbird-debuginfo-91.7.0-2.el8_2.ppc64le.rpm thunderbird-debugsource-91.7.0-2.el8_2.ppc64le.rpm x86_64: thunderbird-91.7.0-2.el8_2.x86_64.rpm thunderbird-debuginfo-91.7.0-2.el8_2.x86_64.rpm thunderbird-debugsource-91.7.0-2.el8_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-0566 https://access.redhat.com/security/cve/CVE-2022-25235 https://access.redhat.com/security/cve/CVE-2022-25236 https://access.redhat.com/security/cve/CVE-2022-25315 https://access.redhat.com/security/cve/CVE-2022-26381 https://access.redhat.com/security/cve/CVE-2022-26383 https://access.redhat.com/security/cve/CVE-2022-26384 https://access.redhat.com/security/cve/CVE-2022-26386 https://access.redhat.com/security/cve/CVE-2022-26387 https://access.redhat.com/security/cve/CVE-2022-26485 https://access.redhat.com/security/cve/CVE-2022-26486 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYi9a19zjgjWX9erEAQjuIg//frp2rAuQBPDNFmzKsDqM1CFgx6upAiGC BqwlrAyqVbi21vrKtGGNCacIVrfIkc95oV5kJv3jMtKHmmG4RuYQABFLLBUZFrk/ VRiuy1C75cmN2Pc+5tCGVfYYYTkvzIT3f0r8QkiSrv36ilq970EcT7snqO4wZ/Jm cwFzbfgWs6jvIaDexRy5I+TIFhsvURJFqZwvrrAHKGMsDq+jivdX/xRB5+hJbm8J +JuL78RMsIiDwHRwTftFZeuoc4ypNHvJKxH72hoKN4Bl1PS6kiy6WdNnxds7O4aH W2Jhtdqvv5SXX92i1TCnNm4ZFN6B/o/jT4AyO3YU3K5b3DeHx/YjKgO5dLAqNcM/ iwsnIDrOVHJXtjgMk895PRp65DZeEAZFO6BWlYSzSRMRQCH6HMXH/kU9RAMKObeO SqyQ3Vkcg7LBq8OYPUrjeeC2hzZc8cXf0zHC91qP0kQxXT8MPT0hTUfJpJzfIFwP 3UOr102PJrvbitMnzCnwNl9J3k5P8OUXZqbpK3TD+UeT+cq3eX2kpstesL1XmyC3 rYQBiQrdQLHbW7Mj9zUlt5cjE0icrBQkLW9k5X+yyEtXNT5Ipo86WOzezqFnSjgc LuH+CtUe2di0eGwLyxCm9XuTz1N/0ylG0KIdp7JcFg0CsiZeR+UoNTazYyPLlgt/ gAuhredQEic= =PUmF - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi/FqeNLKJtyKPYoAQhGFw//Y95uAQZPIJf+YKWiB1lv8pKOmouL4Y1W okJi0OvkqIxBNdIrG8i6imLwkYYPnE5U0DT01FV7A9HnS3ySkViHGxqvPU/ai3p7 ZKYFc7GoygLxkoRfyCfN7yeGvUie21R8VPYgIcGSDQHIZLochK8FeTLGiunJ/8gM cFvBbk/rHjMePEThHVYdxL2iai4hGEL7KxtnXN+C1zLd5PH8teFd4syUj9R5rvam imssdiS6raoq70Pkdx92ZJVJYeHEt15+MLBk2X4SWAeC9Wf/vXAWZcvetePsEzZp tzVDGjxdSX3A8UyH8eYPcaC7/Y827pLCuR4Q+F8NnTeFe/o8ED5zpLjMhulEDajW 7IB2XY0rUj1zyrexZkGA/jUoZ0alHKfHlSS7FmET1zwZUkmAsI+6xqrvAJmXk2Az HmoQ9iF/CJqV9HWS6RXqgg3ZlL2PbX6lyhJLIWeVt+Df8tKAE0eH0BmwoST97a3v TxGkcy+y/dGaQsfX5a9t1ymGmcemdUaLeKjnDwk77modSvVfykvIZs3AtEqdI+/4 cNgV7v4AIUX8r4zIZiNDDeiuw+eARqYT82095qSGy9GoiIoCkTRIpG5ylLqFh4tb BZH+E/mpPBWeEJMBGhEQoF5uxOEdfVy8LuaFUp3XZ3YIZUUG7xgiIr/d3Q2+pVRh pAxeIj0NwgI= =6v/s -----END PGP SIGNATURE-----
2022. március 15.

ESB-2022.1065 - [RedHat] Red Hat OpenStack Platform 16.2 (Train) director Operator containers: CVSS (Max): 9.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1065 Release of containers for OSP 16.2 director operator tech preview 15 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat OpenStack Platform 16.2 (Train) director Operator containers Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-24407 CVE-2021-44716 CVE-2021-42574 CVE-2021-36087 CVE-2021-36086 CVE-2021-36085 CVE-2021-36084 CVE-2021-35942 CVE-2021-33574 CVE-2021-33560 CVE-2021-28153 CVE-2021-27645 CVE-2021-22925 CVE-2021-22898 CVE-2021-22876 CVE-2021-20232 CVE-2021-20231 CVE-2021-4193 CVE-2021-4192 CVE-2021-4122 CVE-2021-4019 CVE-2021-3984 CVE-2021-3872 CVE-2021-3800 CVE-2021-3712 CVE-2021-3580 CVE-2021-3572 CVE-2021-3521 CVE-2021-3445 CVE-2021-3426 CVE-2021-3200 CVE-2020-24370 CVE-2020-16135 CVE-2020-14155 CVE-2020-13435 CVE-2020-12762 CVE-2019-20838 CVE-2019-19603 CVE-2019-18218 CVE-2019-17595 CVE-2019-17594 CVE-2019-13751 CVE-2019-13750 CVE-2019-5827 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:0842 Comment: CVSS (Max): 9.8 CVE-2019-18218 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Release of containers for OSP 16.2 director operator tech preview Advisory ID: RHSA-2022:0842-01 Product: Red Hat OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2022:0842 Issue date: 2022-03-14 CVE Names: CVE-2019-5827 CVE-2019-13750 CVE-2019-13751 CVE-2019-17594 CVE-2019-17595 CVE-2019-18218 CVE-2019-19603 CVE-2019-20838 CVE-2020-12762 CVE-2020-13435 CVE-2020-14155 CVE-2020-16135 CVE-2020-24370 CVE-2021-3200 CVE-2021-3426 CVE-2021-3445 CVE-2021-3521 CVE-2021-3572 CVE-2021-3580 CVE-2021-3712 CVE-2021-3800 CVE-2021-3872 CVE-2021-3984 CVE-2021-4019 CVE-2021-4122 CVE-2021-4192 CVE-2021-4193 CVE-2021-20231 CVE-2021-20232 CVE-2021-22876 CVE-2021-22898 CVE-2021-22925 CVE-2021-27645 CVE-2021-28153 CVE-2021-33560 CVE-2021-33574 CVE-2021-35942 CVE-2021-36084 CVE-2021-36085 CVE-2021-36086 CVE-2021-36087 CVE-2021-42574 CVE-2021-44716 CVE-2022-24407 ===================================================================== 1. Summary: Red Hat OpenStack Platform 16.2 (Train) director Operator containers are available for technology preview. 2. Description: Release osp-director-operator images Security Fix(es): * golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. 3. Solution: OSP 16.2.z Release - OSP Director Operator Containers 4. Bugs fixed (https://bugzilla.redhat.com/): 2025995 - Rebase tech preview on latest upstream v1.2.x branch 2030801 - CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache 2036784 - osp controller (fencing enabled) in downed state after system manual crash test 5. References: https://access.redhat.com/security/cve/CVE-2019-5827 https://access.redhat.com/security/cve/CVE-2019-13750 https://access.redhat.com/security/cve/CVE-2019-13751 https://access.redhat.com/security/cve/CVE-2019-17594 https://access.redhat.com/security/cve/CVE-2019-17595 https://access.redhat.com/security/cve/CVE-2019-18218 https://access.redhat.com/security/cve/CVE-2019-19603 https://access.redhat.com/security/cve/CVE-2019-20838 https://access.redhat.com/security/cve/CVE-2020-12762 https://access.redhat.com/security/cve/CVE-2020-13435 https://access.redhat.com/security/cve/CVE-2020-14155 https://access.redhat.com/security/cve/CVE-2020-16135 https://access.redhat.com/security/cve/CVE-2020-24370 https://access.redhat.com/security/cve/CVE-2021-3200 https://access.redhat.com/security/cve/CVE-2021-3426 https://access.redhat.com/security/cve/CVE-2021-3445 https://access.redhat.com/security/cve/CVE-2021-3521 https://access.redhat.com/security/cve/CVE-2021-3572 https://access.redhat.com/security/cve/CVE-2021-3580 https://access.redhat.com/security/cve/CVE-2021-3712 https://access.redhat.com/security/cve/CVE-2021-3800 https://access.redhat.com/security/cve/CVE-2021-3872 https://access.redhat.com/security/cve/CVE-2021-3984 https://access.redhat.com/security/cve/CVE-2021-4019 https://access.redhat.com/security/cve/CVE-2021-4122 https://access.redhat.com/security/cve/CVE-2021-4192 https://access.redhat.com/security/cve/CVE-2021-4193 https://access.redhat.com/security/cve/CVE-2021-20231 https://access.redhat.com/security/cve/CVE-2021-20232 https://access.redhat.com/security/cve/CVE-2021-22876 https://access.redhat.com/security/cve/CVE-2021-22898 https://access.redhat.com/security/cve/CVE-2021-22925 https://access.redhat.com/security/cve/CVE-2021-27645 https://access.redhat.com/security/cve/CVE-2021-28153 https://access.redhat.com/security/cve/CVE-2021-33560 https://access.redhat.com/security/cve/CVE-2021-33574 https://access.redhat.com/security/cve/CVE-2021-35942 https://access.redhat.com/security/cve/CVE-2021-36084 https://access.redhat.com/security/cve/CVE-2021-36085 https://access.redhat.com/security/cve/CVE-2021-36086 https://access.redhat.com/security/cve/CVE-2021-36087 https://access.redhat.com/security/cve/CVE-2021-42574 https://access.redhat.com/security/cve/CVE-2021-44716 https://access.redhat.com/security/cve/CVE-2022-24407 https://access.redhat.com/security/updates/classification/#important 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYi+u+dzjgjWX9erEAQgHbg/+KnDnid8f3BWNfmZE77w/U9Gn7NimIkZu gdVWuaseK2pIncyilEzFN2C1egjoQscbI6BWSjZI6h0066NN+i6q3dTjS6/sb9nv G71Unez1L2xQOcMtlY4gwJzJm1FEquE6gAqsr1fsNYR7cqWKWhcxvMgkUuvr6pGL TPbYatG2kj409YTu83wQQlPOY7kRJiU24KuPeSH0Nigmddk5JXqcsIn3h6lM7nzR uva7ngXJD3Fn2+FZ8VB3bKYFCugnWccleaIZC2m9HMuoPVOZbFwgggmxk1tPaQJk jxAHjX+fK2WLhFh8BZT9m41aY6oa1kKeQo24r1jGOdZVNxBuA28JxOgLja/87HIG SK06H5RRAFjwJRjsnnoy4LPW5o0tzPj7/u2D1C/KDhY7iHvKT3RoU+Wj5yQ4pUCM bxQvX+k4y70VPlfxCFsu7DhMX9EquH3QTGaBjMcDYJSrijMqn8fRP7hS0QsndtpQ /p9ltfqoxcI7MJWgnA62qlzar8/dnZXj94bq/jZEehtQp71FTEdtA1AgDW4uIw0y zVd2mqKRBfaq8MCCGf+R1L/e4OAL0nwWrWLG4K6yU+d4+HZGGBolb4nxgVZbn1k/ 2ohCJb8ZePHayYsNz8hWwU3f5IvEgYu65gxmedr5F6KfKyU6DrIGkIr7YAkUkmHU khjXTHG9e5w= =1SVS - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi/FjeNLKJtyKPYoAQh/vg//bdudHvJXfo64+1C+zUYd4NMRWTEJ5y25 wvEADXPOx7sZkmvvaQU3Lwc0R1SG/wpt+zA94B5lBQcQ5nBAH2eG5UXjEYs99Jbw /j2TWn1/HIL/PFst04Wv8aBS+9SsnbZGlTtaak6n9PaO+Tx5s0t5ce7KkbQ81rRq y1npyO3Nndfyz6OJjQuVwRRBqcjf/L1fU9vaJ7Obyat/cjl5CVXXKnwtQxd/jElY GCNbYJXggUTSZ1lD0iU450xWb4d6jW2hQyWrJCOsa39McuD75MjJ9tdDmRIvpff+ +UnrKXU7FXguDmajIjXnHszu8cviZ+YOA7kk1yOaJ5F9l9Dt4ru2t6Z3+14TkoTr b7fIDgJkuvGPPycOhsO2Qf6uOMCnXIYd2deNk0sQrEdaKBYvx42oJPADIckpoGcE 0mx6oYlvOAJX5opw70sMumryPJTXTWmmaPSCxHOWAp/TykYsNIzHzL6pfAEXd8wI AcUdxzEeaW7MYv10athjakccPGa1xX8rXKEU/7fpdmnPqiWqmXYVYT+doJhqIhUc EeKUwH1vX0ZaPIT+vUmAMoG18guM5TK1gC8qO6H1PDO8FCLzwNxS3XqxFizgrsQr 4cKr3uXt4e+aF6CkCXrVtWU0gIF98ImxVt6J4IdXSNO1nCjkN//ORcxOF1qqf43W 8AVpJQdye8E= =hm27 -----END PGP SIGNATURE-----
2022. március 15.

ESB-2022.1064 - [RedHat] Red Hat Virtualization Host: CVSS (Max): 8.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1064 Red Hat Virtualization Host security and bug fix update [ovirt-4.4.10] Async #1 15 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat Virtualization Host Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-24407 CVE-2022-22942 CVE-2022-0847 CVE-2022-0435 CVE-2022-0330 CVE-2021-4154 CVE-2021-0920 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:0841 Comment: CVSS (Max): 8.8 CVE-2022-24407 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.10] Async #1 Advisory ID: RHSA-2022:0841-01 Product: Red Hat Virtualization Advisory URL: https://access.redhat.com/errata/RHSA-2022:0841 Issue date: 2022-03-14 CVE Names: CVE-2021-0920 CVE-2021-4154 CVE-2022-0330 CVE-2022-0435 CVE-2022-0847 CVE-2022-22942 CVE-2022-24407 ===================================================================== 1. Summary: An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: RHEL 8-based RHEV-H for RHEV 4 (build requirements) - noarch, x86_64 Red Hat Virtualization 4 Hypervisor for RHEL 8 - x86_64 3. Description: The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Security Fix(es): * kernel: improper initialization of the "flags" member of the new pipe_buffer (CVE-2022-0847) * kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920) * kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout (CVE-2021-4154) * kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330) * kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435) * kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942) * cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/2974891 5. Bugs fixed (https://bugzilla.redhat.com/): 2031930 - CVE-2021-0920 kernel: Use After Free in unix_gc() which could result in a local privilege escalation 2034514 - CVE-2021-4154 kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout 2042404 - CVE-2022-0330 kernel: possible privileges escalation due to missing TLB flush 2044809 - CVE-2022-22942 kernel: failing usercopy allows for use-after-free exploitation 2048738 - CVE-2022-0435 kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS 2055326 - CVE-2022-24407 cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands 2060795 - CVE-2022-0847 kernel: improper initialization of the "flags" member of the new pipe_buffer 6. Package List: Red Hat Virtualization 4 Hypervisor for RHEL 8: Source: redhat-virtualization-host-4.4.10-202203101736_8.5.src.rpm x86_64: redhat-virtualization-host-image-update-4.4.10-202203101736_8.5.x86_64.rpm RHEL 8-based RHEV-H for RHEV 4 (build requirements): Source: redhat-release-virtualization-host-4.4.10-2.el8ev.src.rpm noarch: redhat-virtualization-host-image-update-placeholder-4.4.10-2.el8ev.noarch.rpm x86_64: redhat-release-virtualization-host-4.4.10-2.el8ev.x86_64.rpm redhat-release-virtualization-host-content-4.4.10-2.el8ev.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-0920 https://access.redhat.com/security/cve/CVE-2021-4154 https://access.redhat.com/security/cve/CVE-2022-0330 https://access.redhat.com/security/cve/CVE-2022-0435 https://access.redhat.com/security/cve/CVE-2022-0847 https://access.redhat.com/security/cve/CVE-2022-22942 https://access.redhat.com/security/cve/CVE-2022-24407 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/RHSB-2022-002 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYi9a3tzjgjWX9erEAQgLLQ/+IAkXeu1C8POOtQTWriDPquGCvWziTjML rV1GT9Wml6WjFPTG7X4KxKTz8D/adSLmbTbtq6tpVvQZK8LCCLhTtmWTAr1LDHqs tyZSd2gyX33YgKubGq3K0VYTpYlXuw6tHkIzsTDeejrGDs2q/N2+yXgDMOCqA0A7 wJjPrhn7bZZ+uz3mKV8x632d2CBuPaPakFrriEKs2geJy0S/3Htm5dtESUNSjRqi 74USXZ65YRDaZwbY1TtUrJ09FdvOfH4Xdk5TY2PuBjKR0eI0BSb5AiyvmzBWaJRm iGZVVPqfftpKKTMUMQ3XPIxP1tVhhlVpadw8AiBrfk5t4wCcMS5DcKGtud6Z4EGZ gVZdb8xkgpKiFgF29/jZUX7xAGdXxVXcaSl8nz7hbNUWXPhZvbIM2rQFxZAD0a86 nM2fGGgyzNVrgpNeop2irvidrkDRU8yLbtoVYPRkAdPmXuRSKgCmEk1tS6VZ+eXH NgDRVsjCBawTv71dMhm60qNS7SxVRU1KWnCXanmsQBhMJC2xmKrAuBd/vd4b5Ybt hVp2se8Ao3CCUmhquBaJr+RKyIG+WE3+SwR0ceN3+rE0YRvITgyqFfG3tzvO/NQT w2Yvh9VCaxCHar44YE3JJJSbQ4t/0iVGS9j4XE079HnZhEcB6YIn1Yl58BeTahHT 3AqkD91dcqc= =Ka4y - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi/Fe+NLKJtyKPYoAQghgw/8D6ACfvWG7RbcukUupAxfnoKI80HvhVMd ucfsHuJOgnzQXY6BE2XEn5RC35O5o8ijFasMX6RD2tNrOQNpbdl9zbnTGOs//u+q qDjYd7bFJ/TOwf0IrnrWdu5vH9IvyYwe4BHyNYOk9/TjjS9czyKoOslK0YJKML2R RzwF3TkANVwH/rE/jW3SM0g7nYO4I5xu3jxiRHcOKbLldY2Gys57G3fgMbNtXZLn UXqmW+1KhxTpuVXLBxGsTyE/spgpvP7PxRpuqIG58qoR9jRi5pdrCqFf3gqfKfUp +cgJb5WkjALJweWBqlwiSWQlk/0dePbTervZkujDoMuicYdez2TxmbvQxfVQOnIH 5UmR5E/lsRjLwGxVZnaMpvng5t+5/wf2b/S8ZjPCJ6TS3/dg5H+GkcuVxzV+mtFg 28k3puZOZF/3rx8tMjoz12FuPzKgQmDr0boFR86No07V5JIgGfOODN3WEHrzAdHo l6oJROjCJwWw/8X5DeyH0G+/kPCPDOVzisUeTbxC0bGmdjflyxrgsU6CSJpoOU6T b+O5isqribznwOJ5yRMGBls4QAD85/zIpRwrgWXvbvOP7OFAnHBbA2dSf1zzCZ7m hxGEJ+0l0tMP6MamN7YkbqWOcGCf+8lojtNmOY3AXpPiiJBAQtDxbpP1UlNzhUGy yVBdKNhxWX8= =KEi+ -----END PGP SIGNATURE-----
2022. március 14.

ESB-2022.1063 - MozillaFirefox: CVSS (Max): 8.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1063 Security update for MozillaFirefox 14 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: MozillaFirefox Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-26486 CVE-2022-26485 CVE-2022-26387 CVE-2022-26386 CVE-2022-26384 CVE-2022-26383 CVE-2022-26381 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-202214906-1 Comment: CVSS (Max): 8.8 CVE-2022-26486 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: [SUSE], Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:14906-1 Rating: important References: #1196809 #1196900 Cross-References: CVE-2022-26381 CVE-2022-26383 CVE-2022-26384 CVE-2022-26386 CVE-2022-26387 CVE-2022-26485 CVE-2022-26486 Affected Products: SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Server 11-SP4-LTSS ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. Description: This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 91.7.0 ESR (bsc#1196900): o CVE-2022-26383: Browser window spoof using fullscreen mode o CVE-2022-26384: iframe allow-scripts sandbox bypass o CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures o CVE-2022-26381: Use-after-free in text reflows o CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users Firefox Extended Support Release 91.6.1 ESR (bsc#1196809): o CVE-2022-26485: Use-after-free in XSLT parameter processing o CVE-2022-26486: Use-after-free in WebGPU IPC Framework Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Server 11-SP4-LTSS: zypper in -t patch slessp4-MozillaFirefox-14906=1 o SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-MozillaFirefox-14906=1 Package List: o SUSE Linux Enterprise Server 11-SP4-LTSS (x86_64): MozillaFirefox-91.7.0-78.167.1 MozillaFirefox-translations-common-91.7.0-78.167.1 MozillaFirefox-translations-other-91.7.0-78.167.1 o SUSE Linux Enterprise Debuginfo 11-SP4 (x86_64): MozillaFirefox-debuginfo-91.7.0-78.167.1 References: o https://www.suse.com/security/cve/CVE-2022-26381.html o https://www.suse.com/security/cve/CVE-2022-26383.html o https://www.suse.com/security/cve/CVE-2022-26384.html o https://www.suse.com/security/cve/CVE-2022-26386.html o https://www.suse.com/security/cve/CVE-2022-26387.html o https://www.suse.com/security/cve/CVE-2022-26485.html o https://www.suse.com/security/cve/CVE-2022-26486.html o https://bugzilla.suse.com/1196809 o https://bugzilla.suse.com/1196900 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi6cj+NLKJtyKPYoAQieNw/9EFale1R7BQL3AXKvBI5tqWTUUNf49IfO PuDQXzq7P/iHUgX8BZA50Nzmx3AWhZ+Cl3E1w5s+rubhUdg9fRrgKvb1yUpZ81gf zi36wsPav0eieTubYbkpf/gGJmAnFRXEem3rWzHnLSaefnomh90QjdQNZizztGiH bakwKNIpe6iA1ns82spiwNTa1jCXMiXiFKh1fSloXxgYwHxqYzRJMSJxvH0C6IoR CN4tNeQW31MO6LJ0o90ZF5LHXyADNnrlEFQiGWjNOyvBDZ+g1atmtpMzGcIvz9hq x+TZp5QHUKyNMrQN49dbzQYuHVTL69NqCGx7y69pR8N4IPPC2oAnRUXxNVA+nTOT YiyqifqjC13wKeMt+5P0mQkjPNtKGdaCdXqizHuBQ1S8IqOlTzaLDTKvg3R2DO2w BAJDSbHU2Dsc+Dci7RDxYqjMPQGjPFKZs+GsDmEVpyqCt5JZ/V6KB8RLUk15i1Yp PHQG0WsHaKZ+LoADqn2jbVy/zI9H38AvjCi/2VlpwKBxeioTAxCiEUE+KBUMnavQ FyFaM4zRriNkOUT8ZmPTvq+pwXWD41wCVJZlMOzzvvT6mzlITL7EpfVCUhn5zsOv 4ASqhGd9FKkYbohgmp6rCgGOX2c7TofHvRmUrGTUoWKWESq9M9qTsIxxE8GdyBMv MrH999ka6O4= =QqUE -----END PGP SIGNATURE-----
2022. március 14.

ESB-2022.1062 - [Debian] haproxy: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1062 haproxy security update 14 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: haproxy Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2022-0711 Original Bulletin: http://www.debian.org/security/2022/dsa-5102 Comment: CVSS (Max): 7.5 CVE-2022-0711 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-5102-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso March 13, 2022 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : haproxy CVE ID : CVE-2022-0711 A flaw was discovered in the way HAProxy, a fast and reliable load balancing reverse proxy, processes HTTP responses containing the "Set-Cookie2" header, which can result in an unbounded loop, causing a denial of service. For the stable distribution (bullseye), this problem has been fixed in version 2.2.9-2+deb11u3. We recommend that you upgrade your haproxy packages. For the detailed security status of haproxy please refer to its security tracker page at: https://security-tracker.debian.org/tracker/haproxy Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmIuGfxfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RrZw//aNpAVlMRbWU7tIGnQpJvX0zYPeNhRw+bfJxFLU8qQTjRXY7Qhhab29R5 +YjLFmrEAP7JAGDdxsVN5tR1cB8wyO7lCI9bBFoSXMv2JK8g8AJWkERq/3AgVbV6 FLGD6652E0fb51e5Ai9pUo7af1Pm8bzjasu6IKf6DnDTeHjUpHxGNhHddp/JEA0Z 0YoVVKl8DGTG+q8qJMy5+IRHMceWJbfmSEa/djItJD1J9oAUq8FHV4ttRoyjORs6 ZbL/qOA8PBtdnOp0Y64TCzVxQdcJZBja7lUkGtCljIjdDr19V3BS1+ZZQ/LPS+rM CA1kmXSRIlLtPVhwkqCeI763NSw7nvBUbZ5/fDn29y3r1knqGYJHMT5Z7skVKxmG Csu1KbfoCnok5ZwTCAFHmmdxNy+386pUkY0HmRU2PEgLPlmmNKIHDIY9Rp1DXvPo 0AR3fEyCKIgU8LZDtSEACovaZbdxiwU/MjcHd2SQ/U19upEAcVH2zb7LX3DKk0JY Cxy0/mJglCN/X3jMgERWcHTGMlhbkXgKprg2LnONS5VTOsrYifWaIl5wYBZVcBRe yFBvevl/28drsDCFgbvjAGo0cN0r8zBxFUY97/RTXGNCrcPSar+qBhd/ja8lqz4p qcXCEehBiU8hrtIvPKZ2mLOm4N96KfbyUhYhWQwoguv+aM2lj7I= =WVe1 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi6Z7uNLKJtyKPYoAQh9FRAAgPo5MuifXwnP6CeuzDMAnbI3dnZ9aW8T T6K9dsYWGs8rMduIWA0M+TrT4aiiHlWHB390O72sUHQgbgFmeya+QAEu8gkQzBD9 dzLSpB4QvYhqB/Rk4D4G6FUk0qvftAwoI5GwQEZWmEhD4dWV4lpBq9l+AGvhT7qI wHkvKpJ2+eOHHl8ObqpHk9YjY8eIv2OQo+4KXULwxOeufvVFbc7Ep5y3VOHVSADb 3qXtB3met2Uh86gMxNNIej926QW687YizY/ls0S7TyHBrVuxmkKrTtplw/hH2dMn QN+apsM0SZ9N94T+odj3+AsYCkCTk5XDwayfg6d717G1P6zB/ldxfgjSp1U9NKBL /mgQmUjiprBhi2ta4HfN+tbZT6HHrRYI5Dr2VtmiKZre46laTdSQcTY+VUOqAXsy WLDv0M43cG8oaDB0GsJlxAG5neF+h6QY+n1mZ4hY+8dPOnyYmIJuBCNRihB4ZLZo hp6yVHJsoDY+vUTBCKIHhaHw8oZ+uDUodzgok+sJocSQUE0Kcjm4b8JC1vZkDxyW fz68m4NucTIel3rbH3wv53PDn7dw70guN1AxnuMnLQsVtgPnHOdqCqZ/gxWS0kw9 xA3qrGBuo8dn7cOcFGt8xDTlNu7/d2AUzTeFzfe+JX5/q63BGn9j1NiioouG90C+ l0jzqylmLjA= =JYAq -----END PGP SIGNATURE-----
2022. március 14.

ESB-2022.1061 - [Debian] debian-archive-keyring: CVSS (Max): None

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1061 debian-archive-keyring security update 14 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: debian-archive-keyring Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade Original Bulletin: https://lists.debian.org/debian-lts-announce/2022/03/msg00019.html Comment: CVSS (Max): None available when published - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2948-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Anton Gladky March 13, 2022 https://wiki.debian.org/LTS - - ------------------------------------------------------------------------- Package : debian-archive-keyring Version : 2017.5+deb9u2 debian-archive-keyring is a package containing GnuPG archive keys of the Debian archive. New GPG-keys are being constantly added with every new Debian release. For Debian 9 stretch, GPG-keys for 11/bullseye Debian release are added in the version 2017.5+deb9u2. We recommend that you upgrade your debian-archive-keyring packages only if you need to work with packages from 11/bullseye release. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEu71F6oGKuG/2fnKF0+Fzg8+n/wYFAmIuZCUACgkQ0+Fzg8+n /waPghAAkwzNN9hJtIvTnsMflkD43JE8QpNJwuFAaaOdOPADmGFAE6OH3+ZxuBHi 7QKSpEHx0wlfosHRxcqTYs34Gn16ZKscLD6ZExB2c71ZdsIJ15WQyOuqroL9Rajb pBhB1KddBKuyfTYYHMvyT9XZGSYgR3yKW5/9lUQv8ip83e1DmgN1y+osd0mu5DTB u8FUM87Qy5vYmmynWwnVxqRK1u0gzx3xXP4elbp90pAQQHBrhUWVhD0C5Gb6Udca NywnIgldI4/zx/WZAi6ROfDV5xpHV8ODCEPV1Bdm6ut3GZTg0ZUfthbQq9xLhqQZ n6KXcHAsNsmP2sEzxrkCVOqiSBaEUV2lKYs0sdGe3HTO3TTuo67/l6MnOTljsUgv G8NRmBxnjADagK5IJQ+b07yqgCc7B1RSqV9mjZST55N30Qzya4xdfzlc3h74ad9Z O8Akxo+4bjzdPyBxo4g5wyj2c0jbJ+3qJV5cJvPnyXGsO49q+8wlK96cNDiatSY4 gePNf7Z6qq6B9BmuTcksAZFTPtgyX6MyGJOXSBP9nZn0XBno59TVD3YcFbErvJqk 9blpEfmpttKLrAeDkaaNagBrXDNlM4eHTHuPfh9m3FHz5aUHu1ef78XbuYdM5mrq P48Sr8L52A4CM+DHXV7FBWQmop/53v8D0jCXfxAvTM4wG4SjhD4= =87Ag - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi59YeNLKJtyKPYoAQghrw//cuuD+S0r87C75eMSwrGlz/xF8Y03OvNn 9e2dolrSbSdaT7vFW/+FTy3bEijrjBlIji32glxcXq6rsDpyPQ/BdnuE5tYd477y TX6uSbJzu2YW6wZ+hxCvUBC+uzt9OkmwaTqg3IAWUqBPN0QdHbyVu6HPbIC9bkhx dPbJ78igmXCeahIGPoZL0icmsz4MQYCaeiQUu2Ch+n8096l0LEo3ru5pV8ebp3S6 0VRc8iJCr788eE1q+p1DdUp0AhCMkaxb/caRjR/ZrELxMtEd/P/ZuqrmbSdqHVzD t30/mlMyBu9XAL5pnbCVqf+XcFKRsFzkISyB0geneD5W1hCnM/VvJawHwjm3JQoN 5hIxHL7oHIVJrR7EHCwvIED4cosfmR4AIJAbe1Xg0o9pILrctXL2SP+y3vLSxv0S fgELW/ash5JTN7/lv+DbLCaILj2Z5/PcZvr1QKSyzC4k66dyGt4wCk2GHex+S1JH Iw/Ft+zADxZb9bnPfUY8Dws6y7/yO9Ys93ibgohp82k+WGT6ixMjQYG2sERhJL9E DwpZ4C9ncUrRBidv5S7KIXu3Ju57dDwBZNpHei2jpSHcwP/rYAIYPXoCro2lHCTQ FwTtYjvZAA49hikx7DDRtAqTzme2KYpY8UDglq/xbf4f+Rt5QY9TyLcfmsIjPMOp 3AGaOQRATE8= =n3pp -----END PGP SIGNATURE-----
2022. március 14.

ESB-2022.1060 - [SUSE] SUSE Manager Server 4.1: CVSS (Max): 5.7

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1060 Security update for SUSE Manager Server 4.1 14 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: SUSE Manager Server 4.1 Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2019-5427 CVE-2018-20433 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20220798-1 Comment: CVSS (Max): 5.7 CVE-2019-5427 (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for SUSE Manager Server 4.1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:0798-1 Rating: moderate References: #1097531 #1133198 #1190781 #1191360 #1192510 #1192566 #1192822 #1193565 #1194044 #1194363 #1194464 #1195043 #1195282 Cross-References: CVE-2018-20433 CVE-2019-5427 Affected Products: SUSE Linux Enterprise Module for SUSE Manager Server 4.1 SUSE Manager Server 4.1 ______________________________________________________________________________ An update that solves two vulnerabilities and has 11 fixes is now available. Description: This update fixes the following issues: c3p0: o Update to version c3p0 0.9.5.5 and mchange-commons-java 0.2.19 * Address CVE-2018-20433 * Address CVE-2019-5427 - XML-config parsing related attacks (bsc#1133198) * Properly implement the JDBC 4.1 abort method o Build with log4j mapper o Enhanced for RHEL8 dhcpd-formula: o Update to version 0.1.1641480250.d5bd14c * make routers option optional o Add arm64 support o Update to version 0.1.1615805990.f15c8d9 hub-xmlrpc-api: o Updated to build on Enterprise Linux 8. py26-compat-msgpack-python: o Adapted to build on OBS for Enterprise Linux. py27-compat-salt: o Fix inspector module export function (bsc#1097531) o Fix possible traceback on ip6_interface grain (bsc#1193565) o Don't check for cached pillar errors on state.apply (bsc#1190781) o Simplify "transactional_update" module to not use SSH wrapper and allow more flexible execution o Add "--no-return-event" option to salt-call to prevent sending return event back to master. o Make "state.highstate" to acts on concurrent flag. o Fix the regression with invalid syntax in test_parse_cpe_name_v23. spacecmd: o Version 4.1.17-1 * Fix interactive mode for "system_applyerrata" and "errata_apply" (bsc#1194363) spacewalk-java: o Version 4.1.44-1 * allow SCC to display the last check-in time for registered systems * Suggest Product Migration when patch for CVE is in a successor Product (bsc#1191360) * Add store info to Equals and hash methods to fix CVE audit process (bsc#1195282) * fix ClassCastException during action processing (bsc#1195043) * Fix disappearing metadata key files after channel change (bsc#1192822) * Pass only selected servers to taskomatic for cancelation (bsc#1194044) spacewalk-web: o Version 4.1.32-1 * Suggest Product Migration when patch for CVE is in a successor Product (bsc#1191360) susemanager: o Version 4.1.33-1 * set default for registration batch size susemanager-doc-indexes: o Added a warning about the origin of the salt-minion package in the Register on the Command Line (Salt) section of the Client Configuration Guide o In the Client Configuration Guide, explain how you find channel names to register older SUSE Linux Enterprise clients. o Added grub.cfg for GRUB 2 in the Upgrade chapter of the Client susemanager-docs_en: o Added a warning about the origin of the salt-minion package in the Register on the Command Line (Salt) section of the Client Configuration Guide o In the Client Configuration Guide, explain how you find channel names to register older SUSE Linux Enterprise clients. o Added grub.cfg for GRUB 2 in the Upgrade chapter of the Client Configuration Guide susemanager-schema: o Version 4.1.25-1 * Continue with index migration when the expected indexes do not exist (bsc#1192566) susemanager-sls: o Version 4.1.34-1 * Improve `pkgset` beacon with using `salt.cache` to notify about the changes made while the minion was stopped. * Align the code of pkgset beacon to prevent warnings (bsc#1194464) o Version 4.1.33-1 * Fix errors on calling sed -E ... by force_restart_minion with action chains * Postgres exporter package was renamed * fix deprecation warnings * enforce correct minion configuration similar to bootstrapping (bsc#1192510) How to apply this update: 1. Log in as root user to the SUSE Manager server. 2. Stop the Spacewalk service: `spacewalk-service stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-service start ` Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for SUSE Manager Server 4.1: zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-798=1 Package List: o SUSE Linux Enterprise Module for SUSE Manager Server 4.1 (ppc64le s390x x86_64): hub-xmlrpc-api-0.7-3.9.2 py26-compat-msgpack-python-0.4.6-3.6.2 py26-compat-msgpack-python-debuginfo-0.4.6-3.6.2 py26-compat-msgpack-python-debugsource-0.4.6-3.6.2 susemanager-4.1.33-3.45.2 susemanager-tools-4.1.33-3.45.2 o SUSE Linux Enterprise Module for SUSE Manager Server 4.1 (noarch): c3p0-0.9.5.5-3.3.2 dhcpd-formula-0.1.1641480250.d5bd14c-3.3.2 py27-compat-salt-3000.3-6.21.2 spacecmd-4.1.17-4.36.2 spacewalk-base-4.1.32-3.42.2 spacewalk-base-minimal-4.1.32-3.42.2 spacewalk-base-minimal-config-4.1.32-3.42.2 spacewalk-html-4.1.32-3.42.2 spacewalk-java-4.1.44-3.66.2 spacewalk-java-config-4.1.44-3.66.2 spacewalk-java-lib-4.1.44-3.66.2 spacewalk-java-postgresql-4.1.44-3.66.2 spacewalk-taskomatic-4.1.44-3.66.2 susemanager-doc-indexes-4.1-11.52.2 susemanager-docs_en-4.1-11.52.2 susemanager-docs_en-pdf-4.1-11.52.2 susemanager-schema-4.1.25-3.42.2 susemanager-sls-4.1.34-3.59.2 susemanager-web-libs-4.1.32-3.42.2 uyuni-config-modules-4.1.34-3.59.2 References: o https://www.suse.com/security/cve/CVE-2018-20433.html o https://www.suse.com/security/cve/CVE-2019-5427.html o https://bugzilla.suse.com/1097531 o https://bugzilla.suse.com/1133198 o https://bugzilla.suse.com/1190781 o https://bugzilla.suse.com/1191360 o https://bugzilla.suse.com/1192510 o https://bugzilla.suse.com/1192566 o https://bugzilla.suse.com/1192822 o https://bugzilla.suse.com/1193565 o https://bugzilla.suse.com/1194044 o https://bugzilla.suse.com/1194363 o https://bugzilla.suse.com/1194464 o https://bugzilla.suse.com/1195043 o https://bugzilla.suse.com/1195282 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi58L+NLKJtyKPYoAQgXHxAAnvF4E9eP8IdaTLvQR2JysZdPV5VorpoA PnJc1qvF6+9Yb6FlKRqdMKjqdRqNlXzrDztXnKgwiPr9U3ReMYJaKPWedKdF9fom RbL6rtA+6uMDvkI7qub08/uTnozVPUzmdR/XqL33vQePKhAKPT20ljMfLttSP516 fQSx8geifNPO3mvEyC3B1fSv8f5yGamy8dsOLEJHwvxWSMn5+pfMaN+bJlliHgSr e5DIJXVs6gpZyzWb6SGtFkDBuU497IU3lEAsp1rZHF9g5YMRyq2a4Yd49L0Ngo3I JyS4+hX68GGWu7fsoXn1LzcmEJP4uEi4w1KlgDTSxI6ENeaVvUW7v1ty1oNCG7dZ yTB2pOlt82qDABgHAEVSDCfAV6AChd0EiDmM4D+LgqQJRsmzv2yX91ztTsWQVGad fsuR0OVjlJu0Vnyq2onbmymqZa7V8jFplg6dph2DMuCNo8zpHvXDmN/hpEU6KZB5 HjB9jXPBb2weFHT+3WYgRfKxICWtERGbl173TgoEiDE6YIoLDzW3UW3A7mcvAmbu CBJx1RXuojR9vSO3SzD2PDky2ypPN7hx9M0M+KBav2BoSHYDq6c82cS4fLru2Xhc Islyq3HCsx5sKSDTkCHAEx4ZFHzsS/yteMkSuGMHxdUg8AqUjzy5NVg7+5KMaSVK bgD/xMKGp/k= =/CMf -----END PGP SIGNATURE-----
2022. március 14.

ESB-2022.1059 - [Debian] libphp-adodb: CVSS (Max): 9.1

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1059 libphp-adodb security update 14 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: libphp-adodb Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2021-3850 Original Bulletin: https://lists.debian.org/debian-security-announce/2022/msg00068.html Comment: CVSS (Max): 9.1 CVE-2021-3850 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-5101-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso March 13, 2022 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : libphp-adodb CVE ID : CVE-2021-3850 Debian Bug : 1004376 Emmet Leahy reported that libphp-adodb, a PHP database abstraction layer library, allows to inject values into a PostgreSQL connection string. Depending on how the library is used this flaw can result in authentication bypass, reveal a server IP address or have other unspecified impact. For the oldstable distribution (buster), this problem has been fixed in version 5.20.14-1+deb10u1. For the stable distribution (bullseye), this problem has been fixed in version 5.20.19-1+deb11u1. We recommend that you upgrade your libphp-adodb packages. For the detailed security status of libphp-adodb please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libphp-adodb Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmIuA5pfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0TpVA//bYjd0FcCYTX2H6P0oFaaKYORpHb9YnGaXU/44hinNCzizRNOThHBWDQP yhQrFjls6MuEYDCk3nfolJH/PMU3fShTpTtxWYOjgdnu1jqRIHD4A0hXMIXSR8Ru 1LS0oMcRjbnbM5uV/v+wDKCsor2PcdUMB0EQPu3Lv6o2rxJ5HaKRNjtk3tZWI3Xn wo9i7ufVmyaOiPsgyYryAUnmi1wG9HLmKdHRNbOUH91SaZvV4Iu+6JExVm+NUn1W tP5I+BC2VDcGVkFUKNUXAG0Ly35mytXNLlIGZ+ciJVJhJPEGBJQy1917FvhPkZdk CR30PcIyJtKQ5ykrvBRuSMai0gCzy2R21JpgPTXOzQYTPO1KIjQgmXPZucsaVMbJ XWBxV0mb+yi7He/qCkgqXFMJ8wSz4Wu2q+k+yeNmJdZryD0624uQCsykDi8tCMh3 IuA2nHJelpUOyei7M6sWa8MEbboBTMgvnyjcPEwGsC65OnmqOAFw3mG26YmLWLXM Z4oKTGs1nQO1XP3tyOoKDDuY30Q8uq1k+6qOEKd/OIQNSAm+y7tEzRahIAbr7RyW WoqtZE7JuOop+FxOVxFVuxK+/f4ItinN1swPYu4AMvxlaxauAzdsDdTYhk9vKkW0 RA3yGG/b8L4wYeekLwVTtaSLHpQnE1Oh6S9vMNqPX5VpFGHb5uA= =/KVi - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi57ueNLKJtyKPYoAQj/Zw//bRuAPAQNBgTFa9Je59z0ORUki0bnyU9m HW+l9fynCXNTJPUGhSA2Vmd5Kdssdg70491WZeoqHAYfIR5etRa9RYwLnwwc0x/z d4nl6MzZZ+FuVPKiyo8mN669iOVGbrTGaMgcX+AxgQlLQNXAUTXb4eP+YpJ15Tsu AC1gj9o20EEzMK0RZixwLyuigmbmKgLcUiq7Alq7yponm7lJiJJRUPox0cekC11Y pcR6sxXf7UoogdKZTfr7lWJnqflGCcKso0srN7xyrfvM0WCEd42j0hA2EvrgxKa1 IBj83wXq6lsCEuiprFDNp25hAveD0hbCZB+Y27RkRARrNMqfHKdkBJaIlzc/f8Ze vo9UHnMjhGX9nUdn1KgrrQGNhGTrUU9abI92At5hZg7WBmjkKcIfBEd1jPcKDzOP 0PuYKA9Quw+bmIY6h/KlCSXdT4vlPJQVpDz072qNcmscYGDlruuJDqFScR4b2s+Z pSmpki7vPH1KvHz1LTNwPYp4VhhrwZ781tXJFpdWK4F/EywyDPoG9it6+sYHVF0W mwcm9zKUS0jRD61cailWeJO/X83BrCLSHYo2fJpBOFlR1O1GUQU3njJVvnbMBpxj FGue4QFgH0aN8YfwRezGhcs7cJ94BggCgv6gIao64BAJ1WZPJAkuQENwKsXgjXdf 0Ra2LYYYyhc= =teMb -----END PGP SIGNATURE-----
2022. március 14.

ESB-2022.1058 - [Debian] nbd: CVSS (Max): 9.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1058 nbd security update 14 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: nbd Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2022-26496 CVE-2022-26495 Original Bulletin: http://www.debian.org/security/2022/dsa-5100 Comment: CVSS (Max): 9.8 CVE-2022-26496 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-5100-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff March 12, 2022 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : nbd CVE ID : CVE-2022-26495 CVE-2022-26496 Debian Bug : 1003863 1006915 Two vulnerabilities were discovered in the server for the Network Block Device (NBD), which could result in the execution of arbitrary code. For the oldstable distribution (buster), these problems have been fixed in version 1:3.19-3+deb10u1. For the stable distribution (bullseye), these problems have been fixed in version 1:3.21-1+deb11u1. We recommend that you upgrade your nbd packages. For the detailed security status of nbd please refer to its security tracker page at: https://security-tracker.debian.org/tracker/nbd Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmIsw1YACgkQEMKTtsN8 TjY8EQ//doPYe1GfwDQToibTBSS29D4T2nMX9NXLRgDEC6Vpg2NjlWqcL+B7os3c wGPfIrZXjGN+CqwQdFNAWoSd1IyNIS5KrR4vK50PvQhpefa6ZVv4D2yiG/J0tIK2 T77Hp4CuGrjK2Ej5dGh4TnbLPVhGT2KV6kG1wnqfHe+M+gIVAe4sRm3OSArDGAfu 1wCPS8k+UbqPiRU4fHE1bxW6E9SoePCDUYGS8rbOImsRaEq5ZfDMRLBeDEBm8X7B c3OaZDpYgLA4CdYjqz/WmlIE5pzKIfbJhnzA6EhAYxlP4r+L2gzEWXFkMNyJKmMd aoYTD6RjKYhcGSysq4VsPAEVCo6n3/7ivAlv/b1YuH5RfTXPXuDSlKJwjXMtjPS7 V1U0G3ufP9wOgLY4JFIInNBAmCRcxza8P6sqzCiQznnKwB85nZRXAtz3Jd5R9pb+ 0suLb+Qb/LyferCQEy/tl98A9qqJeyyNXidsQb7XNK2o7K1uMRq3TnI4AFIaBQSM oEJnFXTfyiLPfqNTjImIz9R6/yX66HyJ/Z7dSRINj9UhKufe0rR0+VzIMTg9zDi8 UmKfjgX7UYOKhxmgvGLKN0iUt56A6QAVNWAkdB7rkHyRVaQLsNJz5jaZx6peEgY4 9C6XSg42QgmW25hrVCZbwUzwJ13cb/vNxoDBbeHU6lctJUELPqk= =Z+vM - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi57qeNLKJtyKPYoAQhT0Q/+Izf2C+5e7La5macJD9StrWAXXR2SqGvM NfaPrES5uekST7cEB8XpWWC37+GT2AebSH+3YY/xIK2dsXJUkLSIHumj/FKf2G+R fzMUv3rOQqJdbI7zaGoR3SuZfMdPOkm8IDe8mdMwrLhWsz4OiAKA+PA+5bKYcQoB 19FxCm0KV5YEjkUioTOzu+IYxlS5NHyVAhQUa8/nK5Fv4H7LTsCYMuM4Aotz0SSU sqnBIt8wwy2B8bi8TUUk6SRzO4a/Q27zg8SGM/pnaZvjCWDZ40QXN445TxNlPr3t KwuS3B3y8p0egCLmb5d68rq2ooozV8Sm0hJx/R3AuyM3EnI4aFNaQHHgOyRT5wws 3/0aCey/9Skil+6SMJ6gFmAY80py77jnlc83B0048f0y2lPNVqcw8HBU9a4VAzNb VnBNnuyj+05Ku581+CiVS0WWW2K5QV18MBPKQCGk/uWYSFSncMr73BFBTgZKO+Mt amlKESoUq4K2n3DRKr0BQ+J7sgnhAFcFrTPibszyBj/cGw5KBfSgdCO/MqVSfd+/ C6l5v+5CWpdUyXwVmVdkilUWcssPLZgBmnBVn3z8BbS5wRujJX+MI5JrJJ0eb9xS k0vxeu+igoc2tr0nBgtu535YlJwGdsqTjreaDld5gXcGOeG1wAQhSZPoKL7EtKFM JFnhNjWdPCg= =yz9a -----END PGP SIGNATURE-----
2022. március 14.

ESB-2022.1057 - [Debian] expat: CVSS (Max): 9.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1057 expat regression update 14 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: expat Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2022-25236 Original Bulletin: https://lists.debian.org/debian-security-announce/2022/msg00069.html Comment: CVSS (Max): 9.8 CVE-2022-25236 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-5085-2 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso March 13, 2022 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : expat The update for expat released as DSA 5085-1 introduced regressions for applications using URI characters (':' in particular) for a namespace separator (while the HTML API docs of function XML_ParserCreateNS have been advising against their use). Updated expat packages are now available which relax the fix for CVE-2022-25236 with regard to RFC 3986 URI characters. For the oldstable distribution (buster), this problem has been fixed in version 2.2.6-2+deb10u4. For the stable distribution (bullseye), this problem has been fixed in version 2.2.10-2+deb11u3. We recommend that you upgrade your expat packages. For the detailed security status of expat please refer to its security tracker page at: https://security-tracker.debian.org/tracker/expat Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmIuCg1fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0T4Qg/9FtaNcCnoiyq8BwF4PCakVyzNS3wtnYgzrrG7mT1K9cxBEw9soLFEvEGE Lxig6KVBzIcFS1iXVJCXLu8yAYGuNDSXeZpitzZgwjP7eo/zYQwhVmwUsDiDCQGb CaxFlGGPV/KnWSkKJ5M0AF+kz8fHFm6RYyN/KxahL8z6iYlQN26P7YvDAAdY5r8q IDiQ17x69gwGb3rHByFidMXRZSYeZYdoFdz+g+gjVNExe/9cQ/c2DxoElSK2pKOL VKG6hVZA+ieQX286VqrCbjqmzwyHO2mEv1OdVgLzPvl8bvPiQJM2pv7hlEA/WdjR XMbqCEwrsTkcl26m5zWdCzUC0b5UEWnBz5/uLGMHemmPUFo6cccX/Ozbzxucl5JI eqfAlTgsk/DQZY+soHCPfu0PrtnXGRMEpeaU+LFfGNHeHGKcFIWan1sQ5lBjP3Lu Jw7ewDtkpoiV5TMeMsc3kFOVlWNbI0AMiEtzx31IjMfvgsqKiYTH3R69YEx4Fm5L CDsTFsxrIVD7O9yyqIrqD8ZYuYRcLm9lwv8Ib0hIDZk9au8612Cr2JYJPlJqAkVi /exZ8bj5FAZ6wB5sU+CLcDt9kLe/Nj46i0PZJIfR6uHRy6SrhLxp8hP69+LXM+oP 33wNIvyGXSlzIL/ep7HvOn03areJmh514U2eL9EHPchp2Cqi5sQ= =kJLT - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi57f+NLKJtyKPYoAQjR1Q/9EwT5IdtsmK9sL60+byd92uBdS+vEBljL TuWu0Nl18J7p7IrYT0HVXrC9JIZ/pMRoN21lyn+sSX+O34d11BbfIKYoVL7dXNOP y0KGyNB3lq155O3rBsiezMPew5gNcFPU4iD86Z/fmq4GiaO44Piu9mvZ5tcfUD72 f72yycaoMQLI0loKTle1DqXPu/S69snP+qEOwyHD+qwzNDnrBhqZmBAMxAQZ4qKD 9ebQTyDaG9/UpUR5iq6TOFHz+6e+4K4p22wGuVmx5CFFhFK0HuxRJEInLFcX4H/D D1Z9cXuWbpTXVUKuWT9SUZCt7alG1EP5/QPCRx4Oel83sRwAXIDKKwhEUrFTIZLG cLNPk1+0qNclR5xRSwhZhIcS7NfcYQN29NFWPRYBP7TltFywun+o5SmO10gYq92f C7imSOP4LRgmU9i8CpWuVmoixsXgYoxdUZJ8Z0M1LTqdgdgKSM09twkFPGgYhWef vITYFwjVevOItNU3Q11+aI6LHMksmtUJvFWFsNJ/OLp9r8Nr5BBT5XAnO27d/RlX uMKpuIkPa5fI68zDU7WrPhnYwFdcy1Nrj6EMQXBQyezr8N9q1Z1cfFNKD9DVNmK4 MPFhk600iryHv2ZBHHY6TeyseQUxUHSW2wZYy3acbAyRV8w1RrV/BZECmPRN417A qf5+ecoT8+Q= =+0hZ -----END PGP SIGNATURE-----
2022. március 14.

ESB-2022.1056 - [Debian] vim: CVSS (Max): 8.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1056 vim security update 14 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: vim Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2022-0729 CVE-2022-0714 CVE-2022-0685 CVE-2022-0554 CVE-2022-0408 CVE-2022-0368 CVE-2022-0361 CVE-2022-0359 CVE-2022-0319 CVE-2022-0213 CVE-2021-4193 CVE-2021-4192 CVE-2021-4069 CVE-2021-4019 CVE-2021-3984 CVE-2021-3974 CVE-2021-3973 CVE-2021-3928 CVE-2021-3927 CVE-2021-3872 Original Bulletin: https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html Comment: CVSS (Max): 8.8 CVE-2022-0729 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2947-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Markus Koschany March 11, 2022 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : vim Version : 2:8.0.0197-4+deb9u5 CVE ID : CVE-2021-3984 CVE-2021-4019 CVE-2021-4069 CVE-2021-4193 CVE-2022-0213 CVE-2022-0319 CVE-2022-0368 CVE-2022-0554 CVE-2022-0361 CVE-2022-0408 CVE-2022-0685 CVE-2022-0714 CVE-2022-0359 CVE-2021-4192 CVE-2021-3872 CVE-2021-3927 CVE-2021-3928 CVE-2021-3973 CVE-2021-3974 CVE-2022-0729 Multiple security vulnerabilities have been discovered in vim, an enhanced vi editor. Buffer overflows, out-of-bounds reads and Null pointer dereferences may lead to a denial of service (application crash) or other unspecified impact. For Debian 9 stretch, these problems have been fixed in version 2:8.0.0197-4+deb9u5. We recommend that you upgrade your vim packages. For the detailed security status of vim please refer to its security tracker page at: https://security-tracker.debian.org/tracker/vim Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQKTBAABCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmIr0lBfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeSzkxAAnyUzuaj0u84n1b0rhtADZKhcYVk7L2yU6JcL/Gb0hMtU1he2fYvPB7PB L9qxMYrFgpNuuwQLNsNUBMuCTwlU0DIjYuMMCFiHHvurWSr8UOlCu10ViLFdDrnY 5l5ckZNG/vOy4kXApimmtbFn8PI71sB/3gUIJvFczl+cxH3JL9Hn8McPtGdT0M4X qfJkubxYd+xa4JcFs0GcTXHETd8FGotugh070bgLoS7i+KcuP9Ts++0KcKjqG8kI 9RJemYDNUNqenaVzsT9lB6d/jgS6xqnP4YYPpyvQlm4PFtTGiKIxWB7ex04R5Z9g ZtMndM4pu20yZNxSSW9zzaa6868QLMWEw5SNzffRUrb1J4nw2MsCVrc0LHafe7We O/7gdTOPwoSAe9+b0Eh6omNrvyZ4S/se0zxuXxsT4DehsW1f1QtqV5FxD6TEwunb 4CJp4ymiXxavtWAgkCW4vT8xi+CNIIpdjjzW+NCQyU5pxPOXFNrcnV55GsWT4A+U cTsIwRusmujk1BZjMPiirshao0ztwK64TSMK7lBH/YyVk7v8oIw0ehZRJKL3sHnm sA2sZxIVB96QToS4HlOmxonOK9VZ9Pn+ykRG30HQe1w481xnxKi+qyrSX22qGp7h h+xfTs6Cdk54xj+vgG/7zunDWj5fAY53ZJ7kJXKdyXVT7P3IZl0= =qDJV - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi56guNLKJtyKPYoAQhtIA//eeEiSFv1njYwEzDpaEKiON8jYOCyGN6l 9e2pPU8lUlyXS4dA/lY4aY/O5kD81T/A7uvRVIYLezH0S/M8APY4J19crIoM2nom PtrWPZWtSLRHF+Xn4GrEY/twCuX0esiawe6XqmY1dP5LR+rq4sCxJ1lLYKzKaaZY JpMPVccKe+/Xr4ekPZyLM+dwZHvfqDn59wT1ODvy1ty5exKY95fMWG3aKVHjuL7X CcJyRNeEFgY/+RahcOe1OJMOWy85DTNsLyuqb7/O0WsSdDXz8Lp30pZDBm5DoY8d itzTiDR+HEU2+XZBogtIRHWeUovh6XYEfCIGFbkYASmXOI0gPRvu1JTNqSRzGIVK kER7bWkUx+JFZv+Kgco1CVkL/FOwYYeH/Lyc/0XnVUnkJtUTOuRS5b24Uq3aSerk 10wEbM1RBNRezWEH8J2bZBTZtNETRxTo6BNn8rcmxEYLJtedegQKG7wVtoWjvTHg fAN/bA5K+nRWFg2UyQU2ktD+Kimeq6Mus22HgLMWVnpISnl9JlojEYRWxZCXO3aO pUKzpkegSKireevbjHTEWp+EEENPRZZypbhCgO0NLfRjsHVDNN2+JBSx8cRDcDho deJKSox1O3Jaz4DHEZ+G04qwD31sDQaIYgCzcz4kSC5PQ3B8OrGt9EP+ywFZwQGu bHPCv9A54a8= =l0As -----END PGP SIGNATURE-----
2022. március 14.

ESB-2022.1055 - [Debian] tryton-proteus: CVSS (Max): None

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1055 tryton-proteus security update 14 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: tryton-proteus Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2022-26662 CVE-2022-26661 Original Bulletin: http://www.debian.org/lts/security/2022/dla-2946 Comment: CVSS (Max): None available when published - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2946-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Emilio Pozuelo Monfort March 11, 2022 https://wiki.debian.org/LTS - - ------------------------------------------------------------------------- Package : tryton-proteus Version : 4.2.0-1+deb9u1 CVE ID : CVE-2022-26661 CVE-2022-26662 Jeremy Mousset discovered two XML parsing vulnerabilities in the Tryton application platform, which may result in information disclosure or denial of service. For Debian 9 stretch, these problems have been fixed in version 4.2.0-1+deb9u1. We recommend that you upgrade your tryton-proteus packages. For the detailed security status of tryton-proteus please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tryton-proteus Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAmIq9YgACgkQnUbEiOQ2 gwJ9jhAAxwp8zXRvjccqO2AkQdOLVroCWjSv2hhCkD53z/jP8cYOGGA3Bpyer2c1 BoPM3xHANbjqSnz3yuuqNqWy9uWyideVwS7uRuvA9lmnzYIy/05s/GrhAQiEsVxZ 42dxUND3OPMr1/8jZWlFn+v6EMjMGjftdcu3APNqYKGDvgg3gA0cfYbCRi5rsmFN k5fkmMAw3ksnUJRT0lqROU1rVBHR3wWQBcrWzzubfXrjWAQlsoqo08bpz3IyszEy 9CkV4EgfBff7Y5tz8/ESlx7gWXooCSRI4Ed+AbFX8wRs4IAubvC1eioXzjnwzyFV fRlC11WdHidWFVSSpJj0+RLsIKDJT2Ob2RtCJYrSGrFKF7NQWwKhyhgJdWm2Sc62 SIccJpFMQF5OCEZktvfKmSF3YbhAhBKTaEG8sFI7UKJX/c4gKyzMQaPw7J3TbTL0 5TZrt2ob7eT52X4c/vxrABzHMmPRK4R+yse5/bHIJaMk9Q1EKizChERm77tGQUAk 6qllD9FmMNc51GTZ6DLPqT2OAb4XpMwbSCHxs7su7c/eMQoqkOsDAxN+vygC1jsp hxliedSGIuB5bVQPl5AQ0PnoZtC8+YcV5mAR+gJ29kGS7Jf/5T0xPn8CMR+VwDt6 Hdl4d7SlWt3fpQl1DGfY2SX3hi6GKb9n2MpVoYxw2lR++pLlFb4= =HnIr - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi56beNLKJtyKPYoAQjPeg/+LZIkOghRNO+BYJmB9+gLbKgAwkA88Mtw WU5NADIPqe2/9b2Lu7zaWQPK4hb8dB8v3xwmctXEVOIqFYRyZCf8mwb/Gxi6TCBo 0vBMyusJBCPy2VvFzGzYzMr2YnqcLhsRRg9wOMb42dWusU2doyrx16muFwCaI5iR efh4epr2CQ8NWY8I0pEPQ5Ha447eD7qxf/T3O3929X23D/TO4JooaT02mJ/VfAU6 0NSIWvn31K5P7boaoFdHUKEt0+Daj3nN1eh1lGontXywhIM/2kK2mIweKKjbGxQe 5f+muWPPgHbY9M4iqjSECrAQXkoXT0cLdDOXpS1ovkYlTylOX3Ou6zeBNAAnTpL1 kU1W39LrT3UXg1tu+hMf3Qp9g76TWndhcpzao8k56CLW35ER63k5OrLvtBLi1sLp N6A9SUqe7lG78AAJS7uQ8aI5DfREvLtJLUdJxcKcXUlL8gc6Nu1xjcMc/UI0KZ9Z XOARQyUWot30qBHo+tr2aKcPfs4UGirv3omU+ArBGBVXo77fRQ+FC9kgA58jsA1B ToEXkzpLQqxdCCrYtODkVFmuzxX0MaKvUXN0nmnUrGJyZWSsKZ2js0hrEiM+3wvd +UQP0Vy8j7FCvHTzqlHUHgUnYhCmjMUNNUf2+jB4o9ebHoBLLSReKagVTRLIMTU1 ir2t4PF4u+k= =Qin9 -----END PGP SIGNATURE-----
2022. március 14.

ESB-2022.1054 - [SUSE] webkit2gtk3: CVSS (Max): 8.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1054 Security update for webkit2gtk3 14 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: webkit2gtk3 Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-22620 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20220811-1 Comment: CVSS (Max): 8.8 CVE-2022-22620 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for webkit2gtk3 ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:0811-1 Rating: important References: #1196133 Cross-References: CVE-2022-22620 Affected Products: HPE Helion Openstack 8 SUSE Linux Enterprise Server 12-SP2-BCL SUSE Linux Enterprise Server 12-SP3-BCL SUSE Linux Enterprise Server 12-SP3-LTSS SUSE Linux Enterprise Server 12-SP4-LTSS SUSE Linux Enterprise Server 12-SP5 SUSE Linux Enterprise Server for SAP 12-SP3 SUSE Linux Enterprise Server for SAP 12-SP4 SUSE Linux Enterprise Server for SAP Applications 12-SP5 SUSE Linux Enterprise Software Development Kit 12-SP5 SUSE OpenStack Cloud 8 SUSE OpenStack Cloud 9 SUSE OpenStack Cloud Crowbar 8 SUSE OpenStack Cloud Crowbar 9 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for webkit2gtk3 fixes the following issues: Update to version 2.34.6 (bsc#1196133): o CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE OpenStack Cloud Crowbar 9: zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2022-811=1 o SUSE OpenStack Cloud Crowbar 8: zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2022-811=1 o SUSE OpenStack Cloud 9: zypper in -t patch SUSE-OpenStack-Cloud-9-2022-811=1 o SUSE OpenStack Cloud 8: zypper in -t patch SUSE-OpenStack-Cloud-8-2022-811=1 o SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-811=1 o SUSE Linux Enterprise Server for SAP 12-SP4: zypper in -t patch SUSE-SLE-SAP-12-SP4-2022-811=1 o SUSE Linux Enterprise Server for SAP 12-SP3: zypper in -t patch SUSE-SLE-SAP-12-SP3-2022-811=1 o SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-811=1 o SUSE Linux Enterprise Server 12-SP4-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2022-811=1 o SUSE Linux Enterprise Server 12-SP3-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2022-811=1 o SUSE Linux Enterprise Server 12-SP3-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2022-811=1 o SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-811=1 o HPE Helion Openstack 8: zypper in -t patch HPE-Helion-OpenStack-8-2022-811=1 Package List: o SUSE OpenStack Cloud Crowbar 9 (noarch): libwebkit2gtk3-lang-2.34.6-2.88.1 o SUSE OpenStack Cloud Crowbar 9 (x86_64): libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 libjavascriptcoregtk-4_0-18-debuginfo-2.34.6-2.88.1 libwebkit2gtk-4_0-37-2.34.6-2.88.1 libwebkit2gtk-4_0-37-debuginfo-2.34.6-2.88.1 typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.34.6-2.88.1 webkit2gtk3-debugsource-2.34.6-2.88.1 o SUSE OpenStack Cloud Crowbar 8 (x86_64): libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 libjavascriptcoregtk-4_0-18-debuginfo-2.34.6-2.88.1 libwebkit2gtk-4_0-37-2.34.6-2.88.1 libwebkit2gtk-4_0-37-debuginfo-2.34.6-2.88.1 typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.34.6-2.88.1 webkit2gtk3-debugsource-2.34.6-2.88.1 o SUSE OpenStack Cloud Crowbar 8 (noarch): libwebkit2gtk3-lang-2.34.6-2.88.1 o SUSE OpenStack Cloud 9 (x86_64): libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 libjavascriptcoregtk-4_0-18-debuginfo-2.34.6-2.88.1 libwebkit2gtk-4_0-37-2.34.6-2.88.1 libwebkit2gtk-4_0-37-debuginfo-2.34.6-2.88.1 typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.34.6-2.88.1 webkit2gtk3-debugsource-2.34.6-2.88.1 o SUSE OpenStack Cloud 9 (noarch): libwebkit2gtk3-lang-2.34.6-2.88.1 o SUSE OpenStack Cloud 8 (noarch): libwebkit2gtk3-lang-2.34.6-2.88.1 o SUSE OpenStack Cloud 8 (x86_64): libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 libjavascriptcoregtk-4_0-18-debuginfo-2.34.6-2.88.1 libwebkit2gtk-4_0-37-2.34.6-2.88.1 libwebkit2gtk-4_0-37-debuginfo-2.34.6-2.88.1 typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.34.6-2.88.1 webkit2gtk3-debugsource-2.34.6-2.88.1 o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64): typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 webkit2gtk3-debugsource-2.34.6-2.88.1 webkit2gtk3-devel-2.34.6-2.88.1 o SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64): libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 libjavascriptcoregtk-4_0-18-debuginfo-2.34.6-2.88.1 libwebkit2gtk-4_0-37-2.34.6-2.88.1 libwebkit2gtk-4_0-37-debuginfo-2.34.6-2.88.1 typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.34.6-2.88.1 webkit2gtk3-debugsource-2.34.6-2.88.1 o SUSE Linux Enterprise Server for SAP 12-SP4 (noarch): libwebkit2gtk3-lang-2.34.6-2.88.1 o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64): libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 libjavascriptcoregtk-4_0-18-debuginfo-2.34.6-2.88.1 libwebkit2gtk-4_0-37-2.34.6-2.88.1 libwebkit2gtk-4_0-37-debuginfo-2.34.6-2.88.1 typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.34.6-2.88.1 webkit2gtk3-debugsource-2.34.6-2.88.1 o SUSE Linux Enterprise Server for SAP 12-SP3 (noarch): libwebkit2gtk3-lang-2.34.6-2.88.1 o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 libjavascriptcoregtk-4_0-18-debuginfo-2.34.6-2.88.1 libwebkit2gtk-4_0-37-2.34.6-2.88.1 libwebkit2gtk-4_0-37-debuginfo-2.34.6-2.88.1 typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.34.6-2.88.1 webkit2gtk3-debugsource-2.34.6-2.88.1 o SUSE Linux Enterprise Server 12-SP5 (noarch): libwebkit2gtk3-lang-2.34.6-2.88.1 o SUSE Linux Enterprise Server 12-SP4-LTSS (aarch64 ppc64le s390x x86_64): libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 libjavascriptcoregtk-4_0-18-debuginfo-2.34.6-2.88.1 libwebkit2gtk-4_0-37-2.34.6-2.88.1 libwebkit2gtk-4_0-37-debuginfo-2.34.6-2.88.1 typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.34.6-2.88.1 webkit2gtk3-debugsource-2.34.6-2.88.1 o SUSE Linux Enterprise Server 12-SP4-LTSS (noarch): libwebkit2gtk3-lang-2.34.6-2.88.1 o SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64): libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 libjavascriptcoregtk-4_0-18-debuginfo-2.34.6-2.88.1 libwebkit2gtk-4_0-37-2.34.6-2.88.1 libwebkit2gtk-4_0-37-debuginfo-2.34.6-2.88.1 typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.34.6-2.88.1 webkit2gtk3-debugsource-2.34.6-2.88.1 o SUSE Linux Enterprise Server 12-SP3-LTSS (noarch): libwebkit2gtk3-lang-2.34.6-2.88.1 o SUSE Linux Enterprise Server 12-SP3-BCL (x86_64): libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 libjavascriptcoregtk-4_0-18-debuginfo-2.34.6-2.88.1 libwebkit2gtk-4_0-37-2.34.6-2.88.1 libwebkit2gtk-4_0-37-debuginfo-2.34.6-2.88.1 typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.34.6-2.88.1 webkit2gtk3-debugsource-2.34.6-2.88.1 o SUSE Linux Enterprise Server 12-SP2-BCL (noarch): libwebkit2gtk3-lang-2.34.6-2.88.1 o SUSE Linux Enterprise Server 12-SP2-BCL (x86_64): libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 libjavascriptcoregtk-4_0-18-debuginfo-2.34.6-2.88.1 libwebkit2gtk-4_0-37-2.34.6-2.88.1 libwebkit2gtk-4_0-37-debuginfo-2.34.6-2.88.1 typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.34.6-2.88.1 webkit2gtk3-debugsource-2.34.6-2.88.1 webkit2gtk3-devel-2.34.6-2.88.1 o HPE Helion Openstack 8 (noarch): libwebkit2gtk3-lang-2.34.6-2.88.1 o HPE Helion Openstack 8 (x86_64): libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 libjavascriptcoregtk-4_0-18-debuginfo-2.34.6-2.88.1 libwebkit2gtk-4_0-37-2.34.6-2.88.1 libwebkit2gtk-4_0-37-debuginfo-2.34.6-2.88.1 typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.34.6-2.88.1 webkit2gtk3-debugsource-2.34.6-2.88.1 References: o https://www.suse.com/security/cve/CVE-2022-22620.html o https://bugzilla.suse.com/1196133 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi56XeNLKJtyKPYoAQiE1Q//U+s8BU0nUkk9ijoS6KmocAM4XItPM9RD 0y8QR2rZeoSdXseL/ca9piiis9YfUbZjuWyXVUe0FiYqnIdV6Z6bcbNqxTfDxfq5 MMH33h62PfYkC0DLCKxB0flqFjuXSmYWFbRyjeKpDTWVyUgX/SafyTIzTe3ZGsKB ZjU5bpwyesF0aU6HvgEF1eHe3Fq7sZgjboqfYbepbLIy0LiJZpXXAwDLaCToI8vH VKdUVlNIGhHDKSB3JK2ep7lrhn0UE30vTvpuF3NSi9OTTuB2+18HdhkX/SG5aGbm rpSc5QpBf+kxKqSNmRANx62XLLd+9E7dPUyqsOYIJLwQDWfhv0EvcUsFBLtN3ao4 Ul4d/eHgUCEDKQsG4OuFsjowGDm8/z6P06LzHQ/taiGi9Bdy4SROesRoP80Notfd ZijdeHrNphEcVUDsz3EvX288TRgb7LGfQiDRSkF1TzSy6UUYpfXN1e6xDoWacLM5 /Ja9ldIpHBamczRSUM5yIBw+uHFYdGigcHQ8ZA40w6sSEpnTBxkEDowr8fPOOOKQ RLWBlNesWfQFBZSTt6wW/TP9h40C2PS4lix66YVQ5CYreTtTl+L6KXC80M05ddyz bbgUfF9xqM70ug/Rl4Ai7bmLY7I/qqVJUrTRXhuGB2+vVuM3eZDZ5Ued281G2hdr Gwohsth4KTo= =kshz -----END PGP SIGNATURE-----
2022. március 14.

ESB-2022.1053 - [SUSE] tomcat: CVSS (Max): None

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1053 Security update for tomcat 14 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: tomcat Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20220810-1 Comment: CVSS (Max): None available when published - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for tomcat ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:0810-1 Rating: moderate References: #1196137 Affected Products: SUSE Linux Enterprise High Performance Computing 15-ESPOS SUSE Linux Enterprise High Performance Computing 15-LTSS SUSE Linux Enterprise Server 15-LTSS SUSE Linux Enterprise Server for SAP 15 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: This update for tomcat fixes the following issues: o Remove hard log4j dependency, as it is not required by tomcat itself (bsc# 1196137) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Server for SAP 15: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-810=1 o SUSE Linux Enterprise Server 15-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-2022-810=1 o SUSE Linux Enterprise High Performance Computing 15-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-2022-810=1 o SUSE Linux Enterprise High Performance Computing 15-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-2022-810=1 Package List: o SUSE Linux Enterprise Server for SAP 15 (noarch): tomcat-9.0.36-3.93.1 tomcat-admin-webapps-9.0.36-3.93.1 tomcat-el-3_0-api-9.0.36-3.93.1 tomcat-jsp-2_3-api-9.0.36-3.93.1 tomcat-lib-9.0.36-3.93.1 tomcat-servlet-4_0-api-9.0.36-3.93.1 tomcat-webapps-9.0.36-3.93.1 o SUSE Linux Enterprise Server 15-LTSS (noarch): tomcat-9.0.36-3.93.1 tomcat-admin-webapps-9.0.36-3.93.1 tomcat-el-3_0-api-9.0.36-3.93.1 tomcat-jsp-2_3-api-9.0.36-3.93.1 tomcat-lib-9.0.36-3.93.1 tomcat-servlet-4_0-api-9.0.36-3.93.1 tomcat-webapps-9.0.36-3.93.1 o SUSE Linux Enterprise High Performance Computing 15-LTSS (noarch): tomcat-9.0.36-3.93.1 tomcat-admin-webapps-9.0.36-3.93.1 tomcat-el-3_0-api-9.0.36-3.93.1 tomcat-jsp-2_3-api-9.0.36-3.93.1 tomcat-lib-9.0.36-3.93.1 tomcat-servlet-4_0-api-9.0.36-3.93.1 tomcat-webapps-9.0.36-3.93.1 o SUSE Linux Enterprise High Performance Computing 15-ESPOS (noarch): tomcat-9.0.36-3.93.1 tomcat-admin-webapps-9.0.36-3.93.1 tomcat-el-3_0-api-9.0.36-3.93.1 tomcat-jsp-2_3-api-9.0.36-3.93.1 tomcat-lib-9.0.36-3.93.1 tomcat-servlet-4_0-api-9.0.36-3.93.1 tomcat-webapps-9.0.36-3.93.1 References: o https://bugzilla.suse.com/1196137 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi56S+NLKJtyKPYoAQjpcQ/+KHx3xqb2aX+pZi2w1mFh6PIvYHzBCs+q 832+jqEp4HFc+XcdiUENZ8waLNaEIqne60KBqwGBAzerO319Xr2+Dzgu636C22MV hxLD3Yjhxn3C+r29T+pTIJLgfo35AMFzkp0VAlcJXGPgBT7H5xi2pQxM21VWXxJ7 RamcoAeXV/0iUKFoldao1tGz2k+1lH+GZ7LaLMLx1DXWmKC1/UTYBL29bgglviYG 6y1KNcgW+BqDeaS4o9kgTFj5Kthx8VxBLHHdN0uAo/lQ2IPEv6wYNzqgxXd8LCh3 FmGlMHWkPOtN82xEaM9MusPxPLqQb1jtjyjKvhxOC6Les9iHNJugZ3ZoDLyvbsUX +rAHrp2gjMRCLTxyUC0rm6djaKeRZxpFVYHZ4zoHj+W0DzBVE35v8IOcQWx9Ni5Q R+bLYt0eVgi857b1a63OIdAeElOSGMWwJxL2T8A5qFv8pf5SVz0bNYgQQjIGr6g+ LlO66eay0fBxGfDZo3WvfvZQj5oiqa2B5lnbNx2HfAnwXeKmEmsc/KQKKHj8Pnd8 rgwewaJzJ4Tl3m1P+JqUuNGnvUsZvMxAfH/MDIuVkPnvomt2sbCjniOGI01K7qxi c81KZLJF2ueDYibQDKnLyJIBZSA0jfwrJMsU0tz/d1/z/adyH43O8VkbyrHN4x38 HneHvQpNKNU= =5SUG -----END PGP SIGNATURE-----
2022. március 14.

ESB-2022.1052 - [SUSE] python-lxml: CVSS (Max): 6.1

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1052 Security update for python-lxml 14 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: python-lxml Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2021-43818 CVE-2021-28957 CVE-2020-27783 CVE-2018-19787 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20220803-1 Comment: CVSS (Max): 6.1 CVE-2021-43818 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for python-lxml ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:0803-1 Rating: important References: #1118088 #1179534 #1184177 #1193752 Cross-References: CVE-2018-19787 CVE-2020-27783 CVE-2021-28957 CVE-2021-43818 Affected Products: SUSE Enterprise Storage 7 SUSE Linux Enterprise Desktop 15-SP3 SUSE Linux Enterprise Desktop 15-SP4 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS SUSE Linux Enterprise High Performance Computing 15-SP3 SUSE Linux Enterprise High Performance Computing 15-SP4 SUSE Linux Enterprise Module for Basesystem 15-SP3 SUSE Linux Enterprise Module for Basesystem 15-SP4 SUSE Linux Enterprise Module for Python2 15-SP3 SUSE Linux Enterprise Realtime Extension 15-SP2 SUSE Linux Enterprise Server 15-SP2-BCL SUSE Linux Enterprise Server 15-SP2-LTSS SUSE Linux Enterprise Server 15-SP3 SUSE Linux Enterprise Server 15-SP4 SUSE Linux Enterprise Server for SAP 15-SP2 SUSE Linux Enterprise Server for SAP Applications 15-SP3 SUSE Linux Enterprise Server for SAP Applications 15-SP4 SUSE Manager Proxy 4.1 SUSE Manager Proxy 4.2 SUSE Manager Retail Branch Server 4.1 SUSE Manager Server 4.1 SUSE Manager Server 4.2 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This update for python-lxml fixes the following issues: o CVE-2018-19787: Fixed XSS vulnerability via unescaped URL (bsc#1118088). o CVE-2021-28957: Fixed XSS vulnerability ia HTML5 attributes unescaped (bsc# 1184177). o CVE-2021-43818: Fixed XSS vulnerability via script content in SVG images using data URIs (bnc#1193752). o CVE-2020-27783: Fixed mutation XSS with improper parser use (bnc#1179534). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Manager Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-803=1 o SUSE Manager Retail Branch Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-803=1 o SUSE Manager Proxy 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-803=1 o SUSE Linux Enterprise Server for SAP 15-SP2: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-803=1 o SUSE Linux Enterprise Server 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-803=1 o SUSE Linux Enterprise Server 15-SP2-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-803=1 o SUSE Linux Enterprise Realtime Extension 15-SP2: zypper in -t patch SUSE-SLE-Product-RT-15-SP2-2022-803=1 o SUSE Linux Enterprise Module for Python2 15-SP3: zypper in -t patch SUSE-SLE-Module-Python2-15-SP3-2022-803=1 o SUSE Linux Enterprise Module for Basesystem 15-SP4: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-803=1 o SUSE Linux Enterprise Module for Basesystem 15-SP3: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-803=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-803=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-803=1 o SUSE Enterprise Storage 7: zypper in -t patch SUSE-Storage-7-2022-803=1 Package List: o SUSE Manager Server 4.1 (ppc64le s390x x86_64): python-lxml-debuginfo-4.7.1-3.7.1 python-lxml-debugsource-4.7.1-3.7.1 python2-lxml-4.7.1-3.7.1 python2-lxml-debuginfo-4.7.1-3.7.1 python2-lxml-devel-4.7.1-3.7.1 python3-lxml-4.7.1-3.7.1 python3-lxml-debuginfo-4.7.1-3.7.1 python3-lxml-devel-4.7.1-3.7.1 o SUSE Manager Retail Branch Server 4.1 (x86_64): python-lxml-debuginfo-4.7.1-3.7.1 python-lxml-debugsource-4.7.1-3.7.1 python2-lxml-4.7.1-3.7.1 python2-lxml-debuginfo-4.7.1-3.7.1 python2-lxml-devel-4.7.1-3.7.1 python3-lxml-4.7.1-3.7.1 python3-lxml-debuginfo-4.7.1-3.7.1 python3-lxml-devel-4.7.1-3.7.1 o SUSE Manager Proxy 4.1 (x86_64): python-lxml-debuginfo-4.7.1-3.7.1 python-lxml-debugsource-4.7.1-3.7.1 python2-lxml-4.7.1-3.7.1 python2-lxml-debuginfo-4.7.1-3.7.1 python2-lxml-devel-4.7.1-3.7.1 python3-lxml-4.7.1-3.7.1 python3-lxml-debuginfo-4.7.1-3.7.1 python3-lxml-devel-4.7.1-3.7.1 o SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64): python-lxml-debuginfo-4.7.1-3.7.1 python-lxml-debugsource-4.7.1-3.7.1 python2-lxml-4.7.1-3.7.1 python2-lxml-debuginfo-4.7.1-3.7.1 python2-lxml-devel-4.7.1-3.7.1 python3-lxml-4.7.1-3.7.1 python3-lxml-debuginfo-4.7.1-3.7.1 python3-lxml-devel-4.7.1-3.7.1 o SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64): python-lxml-debuginfo-4.7.1-3.7.1 python-lxml-debugsource-4.7.1-3.7.1 python2-lxml-4.7.1-3.7.1 python2-lxml-debuginfo-4.7.1-3.7.1 python2-lxml-devel-4.7.1-3.7.1 python3-lxml-4.7.1-3.7.1 python3-lxml-debuginfo-4.7.1-3.7.1 python3-lxml-devel-4.7.1-3.7.1 o SUSE Linux Enterprise Server 15-SP2-BCL (x86_64): python-lxml-debuginfo-4.7.1-3.7.1 python-lxml-debugsource-4.7.1-3.7.1 python3-lxml-4.7.1-3.7.1 python3-lxml-debuginfo-4.7.1-3.7.1 python3-lxml-devel-4.7.1-3.7.1 o SUSE Linux Enterprise Realtime Extension 15-SP2 (x86_64): python-lxml-debuginfo-4.7.1-3.7.1 python-lxml-debugsource-4.7.1-3.7.1 python3-lxml-4.7.1-3.7.1 python3-lxml-debuginfo-4.7.1-3.7.1 python3-lxml-devel-4.7.1-3.7.1 o SUSE Linux Enterprise Module for Python2 15-SP3 (aarch64 ppc64le s390x x86_64): python-lxml-debuginfo-4.7.1-3.7.1 python-lxml-debugsource-4.7.1-3.7.1 python2-lxml-4.7.1-3.7.1 python2-lxml-debuginfo-4.7.1-3.7.1 python2-lxml-devel-4.7.1-3.7.1 o SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64): python-lxml-debuginfo-4.7.1-3.7.1 python-lxml-debugsource-4.7.1-3.7.1 python3-lxml-4.7.1-3.7.1 python3-lxml-debuginfo-4.7.1-3.7.1 python3-lxml-devel-4.7.1-3.7.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64): python-lxml-debuginfo-4.7.1-3.7.1 python-lxml-debugsource-4.7.1-3.7.1 python3-lxml-4.7.1-3.7.1 python3-lxml-debuginfo-4.7.1-3.7.1 python3-lxml-devel-4.7.1-3.7.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64): python-lxml-debuginfo-4.7.1-3.7.1 python-lxml-debugsource-4.7.1-3.7.1 python2-lxml-4.7.1-3.7.1 python2-lxml-debuginfo-4.7.1-3.7.1 python2-lxml-devel-4.7.1-3.7.1 python3-lxml-4.7.1-3.7.1 python3-lxml-debuginfo-4.7.1-3.7.1 python3-lxml-devel-4.7.1-3.7.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64): python-lxml-debuginfo-4.7.1-3.7.1 python-lxml-debugsource-4.7.1-3.7.1 python2-lxml-4.7.1-3.7.1 python2-lxml-debuginfo-4.7.1-3.7.1 python2-lxml-devel-4.7.1-3.7.1 python3-lxml-4.7.1-3.7.1 python3-lxml-debuginfo-4.7.1-3.7.1 python3-lxml-devel-4.7.1-3.7.1 o SUSE Enterprise Storage 7 (aarch64 x86_64): python-lxml-debuginfo-4.7.1-3.7.1 python-lxml-debugsource-4.7.1-3.7.1 python2-lxml-4.7.1-3.7.1 python2-lxml-debuginfo-4.7.1-3.7.1 python2-lxml-devel-4.7.1-3.7.1 python3-lxml-4.7.1-3.7.1 python3-lxml-debuginfo-4.7.1-3.7.1 python3-lxml-devel-4.7.1-3.7.1 References: o https://www.suse.com/security/cve/CVE-2018-19787.html o https://www.suse.com/security/cve/CVE-2020-27783.html o https://www.suse.com/security/cve/CVE-2021-28957.html o https://www.suse.com/security/cve/CVE-2021-43818.html o https://bugzilla.suse.com/1118088 o https://bugzilla.suse.com/1179534 o https://bugzilla.suse.com/1184177 o https://bugzilla.suse.com/1193752 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi56OONLKJtyKPYoAQim2BAAhcYhz3kxdEUG0Em9vbWBipjNcOjsfOWL /vSgMlowvoIN+iNKgrKQKZQKwJB9ozYmQ/L47iVsJClAowTN/lh2HqZxm47zKrpe 4An1/7OIrjZB4IbHH62UGvF22KRLJp6IZZzeL0VYa6CWIkw+slbe+30mHIS3E88E HxJZ9f4w4nPP+DDbLEiwsoRl50qWrOCf4BjJ6lKs13f3QINSnKsVda7B6QZaKHAj VjHMTZ9j388YHRD0/n81uwFp406gbOYX+YoFSt9Tf6j0QJCa4xGh/rETO56eAJA+ u5W2CNLvl4s+Jo5esJvCEH5qIZjoDNbllK4z7RPbsxv59GH278dT/HJuQ85gPG7L N4FEp6UnZnhDK9w5rEA6x7LFaa7dG9JhFTMcXIPzTm10m73913O/gkxm7XFOGBR/ hTHApYfGH1CT34WJmbiLbI8gv4x5RTsKQgOthbCDIcjWgBYSBaN5GDPYzcEDLZc4 06RaunKsV+gRdWbs7OMAuR67Sz5Zb6KXp9jRYy1rEQO26I2ABkHvOEZGLKI51RDQ Unffkxhr5tbGYRZD2RT4Vnganyyu47M+fllYjMkCN1SjPtrPICZEClUPTiwYQZvb SYZ7/20hsX1r4Hs1xZGBO5IctQggeocTTTBMvIrAdW2Nt6jFPN39jj2l/oiP9vbf rr0m24jlFFM= =Qg+c -----END PGP SIGNATURE-----
2022. március 14.

ESB-2022.1051 - [SUSE] python-libxml2-python: CVSS (Max): 7.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1051 Security update for python-libxml2-python 14 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: python-libxml2-python Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-23308 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20220802-1 Comment: CVSS (Max): 7.0 CVE-2022-23308 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for python-libxml2-python ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:0802-1 Rating: important References: #1196490 Cross-References: CVE-2022-23308 Affected Products: SUSE CaaS Platform 4.0 SUSE Enterprise Storage 6 SUSE Enterprise Storage 7 SUSE Linux Enterprise Desktop 15-SP3 SUSE Linux Enterprise High Performance Computing 15-ESPOS SUSE Linux Enterprise High Performance Computing 15-LTSS SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS SUSE Linux Enterprise High Performance Computing 15-SP3 SUSE Linux Enterprise Module for Basesystem 15-SP3 SUSE Linux Enterprise Module for Python2 15-SP3 SUSE Linux Enterprise Realtime Extension 15-SP2 SUSE Linux Enterprise Server 15-LTSS SUSE Linux Enterprise Server 15-SP1-BCL SUSE Linux Enterprise Server 15-SP1-LTSS SUSE Linux Enterprise Server 15-SP2-BCL SUSE Linux Enterprise Server 15-SP2-LTSS SUSE Linux Enterprise Server 15-SP3 SUSE Linux Enterprise Server for SAP 15 SUSE Linux Enterprise Server for SAP 15-SP1 SUSE Linux Enterprise Server for SAP 15-SP2 SUSE Linux Enterprise Server for SAP Applications 15-SP3 SUSE Manager Proxy 4.1 SUSE Manager Proxy 4.2 SUSE Manager Retail Branch Server 4.1 SUSE Manager Server 4.1 SUSE Manager Server 4.2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for python-libxml2-python fixes the following issues: o CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc# 1196490). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Manager Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-802=1 o SUSE Manager Retail Branch Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-802=1 o SUSE Manager Proxy 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-802=1 o SUSE Linux Enterprise Server for SAP 15-SP2: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-802=1 o SUSE Linux Enterprise Server for SAP 15-SP1: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-802=1 o SUSE Linux Enterprise Server for SAP 15: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-802=1 o SUSE Linux Enterprise Server 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-802=1 o SUSE Linux Enterprise Server 15-SP2-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-802=1 o SUSE Linux Enterprise Server 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-802=1 o SUSE Linux Enterprise Server 15-SP1-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-802=1 o SUSE Linux Enterprise Server 15-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-2022-802=1 o SUSE Linux Enterprise Realtime Extension 15-SP2: zypper in -t patch SUSE-SLE-Product-RT-15-SP2-2022-802=1 o SUSE Linux Enterprise Module for Python2 15-SP3: zypper in -t patch SUSE-SLE-Module-Python2-15-SP3-2022-802=1 o SUSE Linux Enterprise Module for Basesystem 15-SP3: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-802=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-802=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-802=1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-802=1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-802=1 o SUSE Linux Enterprise High Performance Computing 15-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-2022-802=1 o SUSE Linux Enterprise High Performance Computing 15-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-2022-802=1 o SUSE Enterprise Storage 7: zypper in -t patch SUSE-Storage-7-2022-802=1 o SUSE Enterprise Storage 6: zypper in -t patch SUSE-Storage-6-2022-802=1 o SUSE CaaS Platform 4.0: To install this update, use the SUSE CaaS Platform 'skuba' tool. I will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. Package List: o SUSE Manager Server 4.1 (ppc64le s390x x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Manager Retail Branch Server 4.1 (x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Manager Proxy 4.1 (x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise Server 15-SP2-BCL (x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise Server 15-SP1-BCL (x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise Realtime Extension 15-SP2 (x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise Module for Python2 15-SP3 (aarch64 ppc64le s390x x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Enterprise Storage 7 (aarch64 x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE Enterprise Storage 6 (aarch64 x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 o SUSE CaaS Platform 4.0 (x86_64): python-libxml2-python-debugsource-2.9.7-3.40.1 python2-libxml2-python-2.9.7-3.40.1 python2-libxml2-python-debuginfo-2.9.7-3.40.1 python3-libxml2-python-2.9.7-3.40.1 python3-libxml2-python-debuginfo-2.9.7-3.40.1 References: o https://www.suse.com/security/cve/CVE-2022-23308.html o https://bugzilla.suse.com/1196490 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi56KONLKJtyKPYoAQj8uhAAjaqKoTIUpH9YSeUdRubjoykLAClLenGJ 1HhRzncdPFVQ3djKjZhOM+dchNe4mFdWhGAF7U9cxtb/kvtX9DkDV+x7vXWh5WhP 3mzuT5qdDipzHs63Ribj+f5aF63rIgeTPnww8OSdt5wLgrdSTM+DyyV3iMiZEXaz TPfBsRRN7eDc0iLZaWy/86v3qLPq1a9wGwoa1hUPpa/FKcBDospVA4IdX2rJeUW8 ayNYSk3jquzOpMie5YjBZ+Lr5sl8V1LOCEKUqMTkW7kUvtB6GFnxhD6Z4Ew0Hpur xUGfrddO1Tl9UC/my5zLUSC8hzIdjV/ym4LNCRkSa/SxNzlAi4cmprzwB3WVjD6O SKj3Zpuqq+HTicNJ/uLf+Pb8ZlbNmI5DrBpC2GKZZK0z3OgrS6DbFCS00XqCpx6/ mc5Uoik/mNvH6Lj5RX2eOEwpd2v/QcG7FrM7ZHa5+NfKj+Kz2EcgtFYC1Pf8IkkB Z3v7ZQ13CVGfg7LZbKPCxea+5nrjqIkeIzf3ytUrto85rSFwhVTQvlVM103W9VBJ 2YtuP0JZm9UZfP1YroE+oU7i+rrD7KAg8tevTM9uA8Nv3uqrgFHfSbQAm0PadHL4 sdFbVePSXIKCZyfwmoXgEyU+MQohosKF+RXpFlzwTt6YpnDgCcBwXzqjFquai9KU UheqhlluQpY= =MZX2 -----END PGP SIGNATURE-----
2022. március 14.

ESB-2022.1050 - [SUSE] openssh: CVSS (Max): 7.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1050 Security update for openssh 14 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: openssh Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2021-41617 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20220805-1 Comment: CVSS (Max): 7.0 CVE-2021-41617 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for openssh ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:0805-1 Rating: important References: #1190975 Cross-References: CVE-2021-41617 Affected Products: SUSE Enterprise Storage 7 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS SUSE Linux Enterprise Micro 5.0 SUSE Linux Enterprise Realtime Extension 15-SP2 SUSE Linux Enterprise Server 15-SP2-BCL SUSE Linux Enterprise Server 15-SP2-LTSS SUSE Linux Enterprise Server for SAP 15-SP2 SUSE Manager Proxy 4.1 SUSE Manager Retail Branch Server 4.1 SUSE Manager Server 4.1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for openssh fixes the following issues: o CVE-2021-41617: Fixed a potential privilege escalation for non-default configuration settings (bsc#1190975). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Manager Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-805=1 o SUSE Manager Retail Branch Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-805=1 o SUSE Manager Proxy 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-805=1 o SUSE Linux Enterprise Server for SAP 15-SP2: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-805=1 o SUSE Linux Enterprise Server 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-805=1 o SUSE Linux Enterprise Server 15-SP2-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-805=1 o SUSE Linux Enterprise Realtime Extension 15-SP2: zypper in -t patch SUSE-SLE-Product-RT-15-SP2-2022-805=1 o SUSE Linux Enterprise Micro 5.0: zypper in -t patch SUSE-SUSE-MicroOS-5.0-2022-805=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-805=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-805=1 o SUSE Enterprise Storage 7: zypper in -t patch SUSE-Storage-7-2022-805=1 Package List: o SUSE Manager Server 4.1 (ppc64le s390x x86_64): openssh-8.1p1-5.21.1 openssh-askpass-gnome-8.1p1-5.21.1 openssh-askpass-gnome-debuginfo-8.1p1-5.21.1 openssh-askpass-gnome-debugsource-8.1p1-5.21.1 openssh-debuginfo-8.1p1-5.21.1 openssh-debugsource-8.1p1-5.21.1 openssh-fips-8.1p1-5.21.1 openssh-helpers-8.1p1-5.21.1 openssh-helpers-debuginfo-8.1p1-5.21.1 o SUSE Manager Retail Branch Server 4.1 (x86_64): openssh-8.1p1-5.21.1 openssh-askpass-gnome-8.1p1-5.21.1 openssh-askpass-gnome-debuginfo-8.1p1-5.21.1 openssh-askpass-gnome-debugsource-8.1p1-5.21.1 openssh-debuginfo-8.1p1-5.21.1 openssh-debugsource-8.1p1-5.21.1 openssh-fips-8.1p1-5.21.1 openssh-helpers-8.1p1-5.21.1 openssh-helpers-debuginfo-8.1p1-5.21.1 o SUSE Manager Proxy 4.1 (x86_64): openssh-8.1p1-5.21.1 openssh-askpass-gnome-8.1p1-5.21.1 openssh-askpass-gnome-debuginfo-8.1p1-5.21.1 openssh-askpass-gnome-debugsource-8.1p1-5.21.1 openssh-debuginfo-8.1p1-5.21.1 openssh-debugsource-8.1p1-5.21.1 openssh-fips-8.1p1-5.21.1 openssh-helpers-8.1p1-5.21.1 openssh-helpers-debuginfo-8.1p1-5.21.1 o SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64): openssh-8.1p1-5.21.1 openssh-askpass-gnome-8.1p1-5.21.1 openssh-askpass-gnome-debuginfo-8.1p1-5.21.1 openssh-askpass-gnome-debugsource-8.1p1-5.21.1 openssh-debuginfo-8.1p1-5.21.1 openssh-debugsource-8.1p1-5.21.1 openssh-fips-8.1p1-5.21.1 openssh-helpers-8.1p1-5.21.1 openssh-helpers-debuginfo-8.1p1-5.21.1 o SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64): openssh-8.1p1-5.21.1 openssh-askpass-gnome-8.1p1-5.21.1 openssh-askpass-gnome-debuginfo-8.1p1-5.21.1 openssh-askpass-gnome-debugsource-8.1p1-5.21.1 openssh-debuginfo-8.1p1-5.21.1 openssh-debugsource-8.1p1-5.21.1 openssh-fips-8.1p1-5.21.1 openssh-helpers-8.1p1-5.21.1 openssh-helpers-debuginfo-8.1p1-5.21.1 o SUSE Linux Enterprise Server 15-SP2-BCL (x86_64): openssh-8.1p1-5.21.1 openssh-askpass-gnome-8.1p1-5.21.1 openssh-askpass-gnome-debuginfo-8.1p1-5.21.1 openssh-askpass-gnome-debugsource-8.1p1-5.21.1 openssh-debuginfo-8.1p1-5.21.1 openssh-debugsource-8.1p1-5.21.1 openssh-fips-8.1p1-5.21.1 openssh-helpers-8.1p1-5.21.1 openssh-helpers-debuginfo-8.1p1-5.21.1 o SUSE Linux Enterprise Realtime Extension 15-SP2 (x86_64): openssh-8.1p1-5.21.1 openssh-askpass-gnome-8.1p1-5.21.1 openssh-askpass-gnome-debuginfo-8.1p1-5.21.1 openssh-askpass-gnome-debugsource-8.1p1-5.21.1 openssh-debuginfo-8.1p1-5.21.1 openssh-debugsource-8.1p1-5.21.1 openssh-fips-8.1p1-5.21.1 openssh-helpers-8.1p1-5.21.1 openssh-helpers-debuginfo-8.1p1-5.21.1 o SUSE Linux Enterprise Micro 5.0 (aarch64 x86_64): openssh-8.1p1-5.21.1 openssh-debuginfo-8.1p1-5.21.1 openssh-debugsource-8.1p1-5.21.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64): openssh-8.1p1-5.21.1 openssh-askpass-gnome-8.1p1-5.21.1 openssh-askpass-gnome-debuginfo-8.1p1-5.21.1 openssh-askpass-gnome-debugsource-8.1p1-5.21.1 openssh-debuginfo-8.1p1-5.21.1 openssh-debugsource-8.1p1-5.21.1 openssh-fips-8.1p1-5.21.1 openssh-helpers-8.1p1-5.21.1 openssh-helpers-debuginfo-8.1p1-5.21.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64): openssh-8.1p1-5.21.1 openssh-askpass-gnome-8.1p1-5.21.1 openssh-askpass-gnome-debuginfo-8.1p1-5.21.1 openssh-askpass-gnome-debugsource-8.1p1-5.21.1 openssh-debuginfo-8.1p1-5.21.1 openssh-debugsource-8.1p1-5.21.1 openssh-fips-8.1p1-5.21.1 openssh-helpers-8.1p1-5.21.1 openssh-helpers-debuginfo-8.1p1-5.21.1 o SUSE Enterprise Storage 7 (aarch64 x86_64): openssh-8.1p1-5.21.1 openssh-askpass-gnome-8.1p1-5.21.1 openssh-askpass-gnome-debuginfo-8.1p1-5.21.1 openssh-askpass-gnome-debugsource-8.1p1-5.21.1 openssh-debuginfo-8.1p1-5.21.1 openssh-debugsource-8.1p1-5.21.1 openssh-fips-8.1p1-5.21.1 openssh-helpers-8.1p1-5.21.1 openssh-helpers-debuginfo-8.1p1-5.21.1 References: o https://www.suse.com/security/cve/CVE-2021-41617.html o https://bugzilla.suse.com/1190975 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi56GuNLKJtyKPYoAQgVRA//XvedcZXqZj4Gb04zJWqzEX3QDRCOWaVp XHSiA03TWHgdpvMmWgX9VAxc9Vc42bKtiS5sn60EE4MO1+fB3Z39eiK/KQxZ+hin QfcLkinegJLviX/YtzKIUz14XMNwFQASK0pexIZCq4giL6+fjhZ+CBpCygBuAwXp sIpeUB+xB8zlE1k203zeZF88cqinAqxibiFyjIENHeEBOoVof/q/9bMg2toXdEB/ kZqpU7oGCgzNJ6ur1JiDt+18CAMAbX93oNbNoC2Zi9XIdD2lMacdg/VEak9RI6Dt bP2fo2n/86rg+w9dEpWCYMo0aTrsQADIeJcUuV/Is7fBsWqA5nINZ14tTIE7+2XQ YogMMsgIFKHIBP2WecJ0VwsuaiH3fJSTfD0mRiu6Rt8sAKDn+3JnA5JQWtvWqaq0 uoIpHP+Zyv9x9cIua3DcAheoYiqS2lnKnNJzFkZUMQBJ/3wwLOlUnYOiiCHE7TXD GGkLxtVTfx1PM2Pmt61rIZkTy7FjXKUR0P2SnQ00NiGxnE4IU7QtyZgDQ2z0b66n h1vtuelUCmDLo4v1qjZh40gcUZ+xolstA6Icpl37jHWdOGI/lzG1DR4SvCVZwjD3 /ec0+UnTGm1oO0Gfghk0dANXqExfnB3EzAJ2cRMYudkxQWEFU/nxeFvEi9T5nhmW eO599eTcBd8= =l160 -----END PGP SIGNATURE-----
2022. március 14.

ESB-2022.1049 - [SUSE] MozillaThunderbird: CVSS (Max): 8.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1049 Security update for MozillaThunderbird 14 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: MozillaThunderbird Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-26486 CVE-2022-26485 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20220804-1 Comment: CVSS (Max): 8.8 CVE-2022-26486 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for MozillaThunderbird ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:0804-1 Rating: important References: #1196809 Cross-References: CVE-2022-26485 CVE-2022-26486 Affected Products: SUSE Linux Enterprise Desktop 15-SP3 SUSE Linux Enterprise High Performance Computing 15-SP3 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 SUSE Linux Enterprise Server 15-SP3 SUSE Linux Enterprise Server for SAP Applications 15-SP3 SUSE Linux Enterprise Workstation Extension 15-SP3 SUSE Manager Proxy 4.2 SUSE Manager Server 4.2 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for MozillaThunderbird fixes the following issues: Mozilla Thunderbird 91.6.2 (bsc#1196809): o CVE-2022-26485: Use-after-free in XSLT parameter processing o CVE-2022-26486: Use-after-free in WebGPU IPC Framework Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Workstation Extension 15-SP3: zypper in -t patch SUSE-SLE-Product-WE-15-SP3-2022-804=1 o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3: zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-804=1 Package List: o SUSE Linux Enterprise Workstation Extension 15-SP3 (x86_64): MozillaThunderbird-91.6.2-8.59.1 MozillaThunderbird-debuginfo-91.6.2-8.59.1 MozillaThunderbird-debugsource-91.6.2-8.59.1 MozillaThunderbird-translations-common-91.6.2-8.59.1 MozillaThunderbird-translations-other-91.6.2-8.59.1 o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (aarch64 ppc64le s390x): MozillaThunderbird-91.6.2-8.59.1 MozillaThunderbird-debuginfo-91.6.2-8.59.1 MozillaThunderbird-debugsource-91.6.2-8.59.1 MozillaThunderbird-translations-common-91.6.2-8.59.1 MozillaThunderbird-translations-other-91.6.2-8.59.1 References: o https://www.suse.com/security/cve/CVE-2022-26485.html o https://www.suse.com/security/cve/CVE-2022-26486.html o https://bugzilla.suse.com/1196809 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYi56B+NLKJtyKPYoAQgU4Q/+P3zc31uEW0epgA2hcK6PjLEGq1oMreYK jxnENqPNehleP/gEVRmKMwLqMXQHHfbJevZGkEEpiLPsctBrrP2Q/mVxoYh10QWK tvbarAu8l2+pgpqy9bEZTfc9J33wKQmlPpCqCdMf9R9n3kmyXBJHbxL2FdCOJYjq NR0ED65oKXqUy6Vz05F3FoM2+8HRmcelfWIGeWFzazy7oVqMWbvBC3a0czWLqgnj 2E5OHB6qBoIH6LPrCJWQqZyPUD0X00RiibHVK0rYJvhvxkJ0n6Vk9+YgsU21TxW1 MjE6HLjackzFCTr4PAdw1s9z4kEWfbIk5PnpvOE13CoG3zjP0TrWO5ptElADFahb 4ikb4/VG6ADCeygkSabm4mR1/HAT3s2iBPA3ih9il9+KxwblhscDbCiG9lSL07X9 LEO8hgKMxuJhujLWP7Mo+IJ14nWpZOvo1y/oItsp/wY+4jtt0xvZhThV9/Pg2l7d mXGar95bXKzEtH8CGF8clBj3PHTWlcu8ybCgVRUdx6YvbMsxuQRirz+uwy9MFL2H 2ZPCSLoln67Rl09c94YbsNRduREtk+iYnpK2/HfN6m0ULGRRrbCnzSz3N5IDp2JW qy/oPi6NY0CSKHqj5UJKKM9Glfg8KyGspEdAld+4vp+2mgAA6PwrJuF2p5dgsEt2 JwcDB8hV3P0= =qjTI -----END PGP SIGNATURE-----
2022. március 11.

ESB-2022.1048 - [Appliance] Siemens Simcenter STAR-CCM+ Viewer: CVSS (Max): 7.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1048 Advisory (icsa-22-069-05) Siemens Simcenter STAR-CCM+ Viewer 11 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Siemens Simcenter STAR-CCM+ Viewer Publisher: ICS-CERT Operating System: Network Appliance Resolution: Patch/Upgrade CVE Names: CVE-2022-24661 Original Bulletin: https://us-cert.cisa.gov/ics/advisories/icsa-22-069-05 Comment: CVSS (Max): 7.8 CVE-2022-24661 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: ICS-CERT Calculator: https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- ICS Advisory (ICSA-22-069-05) Siemens Simcenter STAR-CCM+ Viewer Original release date: March 10, 2022 Legal Notice All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/ . 1. EXECUTIVE SUMMARY o CVSS v3 7.8 o ATTENTION: Low attack complexity o Vendor: Siemens o Equipment: Simcenter STAR-CCM+ Viewer o Vulnerability: Improper Restriction of Operations within the Bounds of a Memory Buffer 2. RISK EVALUATION Successful exploitation of this vulnerability could cause a crash, arbitrary code execution, or data exfiltration. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Simcenter STAR-CCM+ Viewer, a computational fluid dynamics software, are affected: o Simcenter STAR-CCM+ Viewer: All versions prior to 2022.1 3.2 VULNERABILITY OVERVIEW 3.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 The starview+.exe allows a corruption vulnerability while parsing specially crafted .SCE files. This could allow an attacker to execute code in the context of the current process. CVE-2022-24661 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/C:H/ I:H/A:H ). 3.3 BACKGROUND o CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing o COUNTRIES/AREAS DEPLOYED: Worldwide o COMPANY HEADQUARTERS LOCATION: Germany 3.4 RESEARCHER Jin Huang from ADLab of Venustech reported this vulnerability to Siemens. 4. MITIGATIONS Siemens has identified the following mitigations and workarounds users can apply to reduce the risk: o Update to 2022.1 or later version o Do not open untrusted scene files from unknown sources As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens' operational guidelines for Industrial Security , and following the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/ industrialsecurity For more information see Siemens Security Advisory SSA-166747 CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should: o Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet . o Locate control system networks and remote devices behind firewalls and isolate them from the business network. o When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov . Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies . Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies . Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents. No known public exploits specifically target this vulnerability. This vulnerability is not exploitable remotely. For any questions related to this report, please contact the CISA at: Email: CISAservicedesk@cisa.dhs.gov Toll Free: 1-888-282-0870 CISA continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYirXieNLKJtyKPYoAQgPgA/+PI5Fh3IMHLewyklzwVAwekKTBAV0Vbmy PHgKbpfjSdAnNtVbRj2nsNEtwnCERAqsKsyfyvOXW3VQNQvljm/2Pz5p9xFd/FV+ DW/YIDqs52MIhp+LsVQOz4ZbrQ0c1YcT3Jh/UedrcIq6bNdy98taIg/Q+ZyHTdub g0u0KhJX9Sd9V6JficindBsL72cTsahasoDvSYYsUL/e9Z0+5/qcruRiYGrVyEYS asuRKiCxmgMBaW4ngfGZNeWOEoG1qZaGSJma6puZPsFdtsDNFGsq51Bl0aujIuFv iNC4+APFdwzF+JkmgJ7ytzlcjoApLQmNamvgMY9mmt1XdWNUMsX/mUifXxPqBOyD aeC0O2Vizzw97N2qHQq1PoboRqyRCRqCJzu5P8S4VXH9uU2f9IKm+9bclAFOyKi1 91TNGXQZoYekcHFLNE8NgcW8WWyWn59J2/36139aI30B6Mjfkx6MlaXfFhMtaVWp T7S3PCB4iy/xPCDbDrNzgI0vM5GQKKlty0e7Kr3bHUj68cR0/wZwvc40xfkR4wQU c8MO472MiWhJZUv5OBnfSndHRSzkORYQnUH5ysArNkwOP48ZLkyYlteDzGs/jIDv uIRM3YWEdBydweSf+YIcITokNZDTJ0AsmL9qljVng3RbL55WQ32xfIXukq5cZaGv CVDdC7nf6QI= =RBwf -----END PGP SIGNATURE-----
2022. március 11.

ESB-2022.1047 - [Appliance] Siemens COMOS: CVSS (Max): 7.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.1047 Advisory (icsa-22-069-06) Siemens COMOS 11 March 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Siemens COMOS Publisher: ICS-CERT Operating System: Network Appliance Resolution: Patch/Upgrade CVE Names: CVE-2021-32952 CVE-2021-32950 CVE-2021-32948 CVE-2021-32946 CVE-2021-32944 CVE-2021-32940 CVE-2021-32938 CVE-2021-32936 CVE-2021-31784 CVE-2021-25178 CVE-2021-25177 CVE-2021-25176 CVE-2021-25175 CVE-2021-25174 CVE-2021-25173 Original Bulletin: https://us-cert.cisa.gov/ics/advisories/icsa-22-069-06 Comment: CVSS (Max): 7.8 CVE-2021-25173 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: ICS-CERT Calculator: https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- ICS Advisory (ICSA-22-069-06) Siemens COMOS Original release date: March 10, 2022 Legal Notice All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/ . 1. EXECUTIVE SUMMARY o CVSS v3 7.8 o ATTENTION: Low attack complexity o Vendor: Siemens o Equipment: COMOS o Vulnerabilities: Memory Allocation with Excessive Size Value, Untrusted Pointer Dereference, Type Confusion, Stack-based Buffer Overflow, Out-of-bounds Write, Out-of-bounds Read, Use After Free, Improper Check for Unusual or Exceptional Conditions 2. RISK EVALUATION Successful exploitation of these vulnerabilities may result in leaked information or remote code execution in the context of the current process. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Siemens COMOS, a unified platform for collaborative plan design, are affected: o Siemens COMOS: All versions prior to v10.4.1 3.2 VULNERABILITY OVERVIEW 3.2.1 MEMORY ALLOCATION WITH EXCESSIVE SIZE VALUE CWE-789 Open Design Alliance Drawings SDK before 2021.12 contains a memory allocation with excessive size vulnerability when parsing specially crafted DGN files. This could allow an attacker to execute code in the context of the current process. CVE-2021-25173 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/ C:H/I:H/A:H ). 3.2.2 MEMORY ALLOCATION WITH EXCESSIVE SIZE VALUE CWE-789 Open Design Alliance Drawings SDK before 2021.12 contains a memory allocation with excessive size vulnerability when parsing specially crafted DGN files. This could allow an attacker to execute code in the context of the current process. CVE-2021-25174 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/ C:H/I:H/A:H ). 3.2.3 UNTRUSTED POINTER DEREFERENCE CWE-822 Open Design Alliance Drawings SDK before 2021.11 contains a type conversion vulnerability when parsing specially crafted DXF and DWG files. This could allow an attacker to execute code in the context of the current process. CVE-2021-25175 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/ C:H/I:H/A:H ). 3.2.4 UNTRUSTED POINTER DEREFERENCE CWE-822 Open Design Alliance Drawings SDK before 2021.11 contains a NULL pointer dereference vulnerability when parsing DXF and DWG files. This could allow an attacker to execute code in the context of the current process. CVE-2021-25176 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/ C:H/I:H/A:H ). 3.2.5 ACCESS OF RESOURCE USING INCOMPATIBLE TYPE ('TYPE CONFUSION') CWE-843 Open Design Alliance Drawings SDK before 2021.11 contains a type confusion issue when parsing specially crafted DXF and DWG files. This could allow an attacker to execute code in the context of the current process. CVE-2021-25177 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/ C:H/I:H/A:H ). 3.2.6 STACK-BASED BUFFER OVERFLOW CWE-121 Open Design Alliance Drawings SDK before 2021.11 contains a stack-based buffer overflow vulnerability when parsing specially crafted DXF or DWG files. This could allow an attacker to execute code in the context of the current process. CVE-2021-25178 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/ C:H/I:H/A:H ). 3.2.7 OUT-OF-BOUNDS WRITE CWE-787 Open Design Alliance Drawings SDK before 2021.6 contains an out-of-bounds write issue when parsing specially crafted DXF files. This could result in a write past the end of an allocated buffer and allow an attacker to execute code in the context of the current process. CVE-2021-31784 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/ C:H/I:H/A:H ). 3.2.8 OUT-OF-BOUNDS WRITE CWE-787 Open Design Alliance Drawings SDK before 2022.4 contains an out-of-bounds write issue when parsing specially crafted DXF files. This could result in a write past the end of an allocated buffer and allow an attacker to execute code in the context of the current process. CVE-2021-32936 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/ C:H/I:H/A:H ). 3.2.9 OUT-OF-BOUNDS READ CWE-125 Open Design Alliance Drawings SDK before 2022.4 are vulnerable to an out-of-bounds read when parsing specially crafted DWG files. This could allow an attacker to read sensitive information from memory locations and to cause a denial-of-service condition. CVE-2021-32938 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/ C:H/I:H/A:H ). 3.2.10 OUT-OF-BOUNDS READ CWE-125 Open Design Alliance Drawings SDK before 2022.4 are vulnerable to an out-of-bounds read when parsing specially crafted DWG files. This could allow an attacker to read sensitive information from memory locations and to cause a denial-of-service condition. CVE-2021-32940 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/ C:H/I:H/A:H ). 3.2.11 USE AFTER FREE CWE-416 Open Design Alliance Drawings SDK before 2021.11 contains a use-after-free vulnerability when parsing specially crafted DGN files. This could allow an attacker to execute code in the context of the current process. CVE-2021-32944 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/ C:H/I:H/A:H ). 3.2.12 IMPROPER CHECK FOR UNUSUAL OR EXCEPTIONAL CONDITIONS CWE-754 Open Design Alliance Drawings SDK before 2022.4 are vulnerable to improper check for unusual or exceptional conditions when parsing specially crafted DGN files. This could allow an attacker to cause a denial-of-service condition or execute code in the context of the current process. CVE-2021-32946 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/ C:H/I:H/A:H ). 3.2.13 OUT-OF-BOUNDS WRITE CWE-787 Open Design Alliance Drawings SDK before 2022.4 contains an out-of-bounds write issue when parsing specially crafted DWG files. This could result in a write past the end of an allocated buffer and allow an attacker to execute code in the context of the current process. CVE-2021-32948 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/ C:H/I:H/A:H ). 3.2.14 OUT-OF-BOUNDS READ CWE-125 Open Design Alliance Drawings SDK before 2022.4 are vulnerable to an out-of-bounds read when parsing specially crafted DXF files. This could allow an attacker to read sensitive information from memory locations and to cause a denial-of-service condition. CVE-2021-32950 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/ C:H/I:H/A:H ). 3.2.15 OUT-OF-BOUNDS WRITE CWE-787 Open Design Alliance Drawings SDK before 2022.4 contains an out-of-bounds write issue when parsing specially crafted DGN files. This could result in a write past the end of an allocated buffer and allow an attacker to execute code in the context of the current process. CVE-2021-32952 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/ C:H/I:H/A:H ). 3.3 BACKGROUND o CRITICAL INFRASTRUCTURE SECTORS: Multiple Sectors o COUNTRIES/AREAS DEPLOYED: Worldwide o COMPANY HEADQUARTERS LOCATION: Germany 3.4 RESEARCHER Siemens reported these vulnerabilities to CISA. 4. MITIGATIONS Siemens recommends upgrading the following software to the most current version: o COMOS: Update to v10.4.1 or later Siemens has identified the following specific workarounds and mitigations users can apply to reduce the risk: o Avoid to open untrusted files from unknown sources in COMOS o As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends users configure the environment according to the Siemens operational guidelines for industrial security and follow the recommendations in the product manuals For additional information, please refer to Siemens Security Advisory SSA-155599 CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should: o Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet . o Locate control system networks and remote devices behind firewalls and isolate them from the business network. o When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov . Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies . Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies . Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents. No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely. For any questions related to this report, please contact the CISA at: Email: CISAservicedesk@cisa.dhs.gov Toll Free: 1-888-282-0870 CISA continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYirXg+NLKJtyKPYoAQhyBw/+NqLnjlbKGMEI8L4f9xHIvvedkOiwXgLj 5tGPFkd4PUbYBurG66kSAM0C1+9O7/MN7phaCx1DA6Ppsnzk7ZeD1A+BgMWiboLt pBmMNN93xut9McXQiIh7qNzLx08WLeByCzytJ7KaY7+nm5nnLc6VEq8n7yEvjpZn wGBuqO8vJMxs4WX3I7m64LerVt2Obl1NE5rnN4p98ShbMtqt0CjSQhDCbxobxdK8 l7DnnIuQgKKE6RZuw1uk5PJJjcJxHTM4AbgW93lppQv1NsfIQKhvP/0EFgIqENiS LTiBB6Q+ObYRSDT1oirMvcTJ0CZ3HAO2Yysb0Id4PR/vZzUKVLN1P4HqRZcSkkXY KdzlgpDePzy1LqvDKm6JCO+vR374oZZpesWPR+qj6ggs//uVxbM5zkA5iHD4Q3tm xylBOVRWqFvrBuYqqiYqLLSPaaXX3FlgTr89uawR8k+uz9HvhJVJWIiYXoyD4+8q yl3sbWjpE4OUZ1pTG/r57954jrp2OWWvN4XN1hjSTthYCvGIrIFY8W2EaKsigcxr lsMYApkGsCF0zTK1y8z9ukZBr3/AzxuECI1pnbBIQYIbUYcjuJMHS53NDbSRTd32 nCrNdbKC+7ivU6CRFXgu2On0/VLrcW60jjm+at7WkNOS0064WUV+H50cvGI4InwZ XAlQjIde/PQ= =E927 -----END PGP SIGNATURE-----