AusCERT - Security Bulletins

Latest published security bulletins. See https://www.auscert.org.au/rss/ for feed information.
Frissítve: 2 óra 41 perc
ESB-2022.5822 - [Debian] libjettison-java: CVSS (Max): 7.5
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5822
libjettison-java security update
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: libjettison-java
Publisher: Debian
Operating System: Debian GNU/Linux
Resolution: Patch/Upgrade
CVE Names: CVE-2022-40149
Original Bulletin:
https://lists.debian.org/debian-lts-announce/2022/11/msg00011.html
Comment: CVSS (Max): 7.5 CVE-2022-40149 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVSS Source: NVD
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3184-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Markus Koschany
November 10, 2022 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : libjettison-java
Version : 1.4.0-1+deb10u1
CVE ID : CVE-2022-40149
Debian Bug : 1022554
It was discovered that libjettison-java, a collection of StAX parsers and
writers for JSON, was vulnerable to a denial-of-service attack, if the
attacker provided untrusted XML or JSON data.
For Debian 10 buster, this problem has been fixed in version
1.4.0-1+deb10u1.
We recommend that you upgrade your libjettison-java packages.
For the detailed security status of libjettison-java please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libjettison-java
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
iQKTBAABCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmNs2qNfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD
RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7
UeQEgRAAsKFwngLcYpKhR4c+D2wMaHNNMxObtP3NAR0jetfRzxRtsIGDULjjB+Yn
uHZfg8RrtcO1M8HNo0N1k77CWPUbS4vzBCk6+Q8na9GslG3mi3Z452BvaEzONrb5
wXHKCDj/yx/jHtqw1QyiLQTvcUQywrjooaFkAupBkVcPm4Yqi/C2YuFjCMJkL3Kp
yYoEX1IfzU3pvYhJ/T3JQcet9Pcxtv62RcBoCQGKvW6aIbSVljCtrLGQ6LsHERNQ
01Lr9u8agVpi3p6hKtetz+bS/gFZI3hjUMilAUR30uiA2hOGwn09ZuP6+VPftBSn
MFqoAWQ3ErSbeg3FAmgADvGz+phaolo0wchGh8ijywn82j5ZEfgosveB65tP2yAE
q0IWaLHbB4WsTzZdloA54WjwkMvIt+Gwuq33TiYC3J5paUuAu9IBV2BNT3znq7Yh
CeSuh/kEoeHenhFzPG14xsL6Z40rM7EcSGqU/AXsECCn8ZZfpueqVHLwiUlfezTq
4jM9d52QBvOKIEjeD+iPKw+Uy3TEW6l+4Uju+/FJpijIOgyM3iE7wz9b0CRAk133
YvIMtttp2pQeaDGONn1q2/wK03HxQdRxG4/U2RWHztUE6RhZWKkkcOA1Ia9EuFzX
GhOhOg4FN9pfkAevCmhRfm1GV05TFqUlC7smOMDTluGX5o5mRQs=
=mkws
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=CADq
-----END PGP SIGNATURE-----
ESB-2022.5821 - [Ubuntu] Firefox: CVSS (Max): None
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5821
USN-5709-2: Firefox vulnerabilities
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Firefox
Publisher: Ubuntu
Operating System: Ubuntu
Resolution: Patch/Upgrade
CVE Names: CVE-2022-42932 CVE-2022-42931 CVE-2022-42930
CVE-2022-42929 CVE-2022-42928 CVE-2022-42927
Original Bulletin:
https://ubuntu.com/security/notices/USN-5709-2
Comment: CVSS (Max): None available when published
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-5709-2: Firefox vulnerabilities
10 November 2022
USN-5709-1 introduced minor regressions in Firefox
Releases
o Ubuntu 20.04 LTS
o Ubuntu 18.04 LTS
Packages
o firefox - Mozilla Open Source web browser
Details
USN-5709-1 fixed vulnerabilities in Firefox. The update introduced
several minor regressions. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information across domains, or execute arbitrary code. ( CVE-2022-42927 ,
CVE-2022-42928 , CVE-2022-42929 , CVE-2022-42930 , CVE-2022-42932 )
It was discovered that Firefox saved usernames to a plaintext file. A
local user could potentially exploit this to obtain sensitive information.
( CVE-2022-42931 )
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 20.04
o firefox - 106.0.5+build1-0ubuntu0.20.04.1
Ubuntu 18.04
o firefox - 106.0.5+build1-0ubuntu0.18.04.1
After a standard system update you need to restart Firefox to make
all the necessary changes.
References
o https://launchpad.net/bugs/1996178
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=4QKJ
-----END PGP SIGNATURE-----
ESB-2022.5820 - [Ubuntu] wavpack: CVSS (Max): 5.5
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5820
USN-5721-1: WavPack vulnerability
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: wavpack
Publisher: Ubuntu
Operating System: Ubuntu
Resolution: Patch/Upgrade
CVE Names: CVE-2022-2476
Original Bulletin:
https://ubuntu.com/security/notices/USN-5721-1
Comment: CVSS (Max): 5.5 CVE-2022-2476 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)
CVSS Source: NVD
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-5721-1: WavPack vulnerability
10 November 2022
WavPack could be made to crash if it opened a specially crafted
file.
Releases
o Ubuntu 16.04 ESM
Packages
o wavpack - audio codec (lossy and lossless) - encoder and decoder
Details
It was discovered that WavPack was not properly performing checks
when dealing with memory. If a user were tricked into decompressing a
specially crafted WavPack Audio File, an attacker could possibly use
this issue to cause the WavPack decompressor to crash, resulting in a
denial of service.
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 16.04
o libwavpack1 - 4.75.2-2ubuntu0.2+esm1
Available with Ubuntu Pro (Infra-only)
o wavpack - 4.75.2-2ubuntu0.2+esm1
Available with Ubuntu Pro (Infra-only)
In general, a standard system update will make all the necessary changes.
References
o CVE-2022-2476
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=eI4v
-----END PGP SIGNATURE-----
ESB-2022.5819 - [SUSE] sudo: CVSS (Max): 7.1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5819
Security update for sudo
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: sudo
Publisher: SUSE
Operating System: SUSE
Resolution: Patch/Upgrade
CVE Names: CVE-2022-43995
Original Bulletin:
https://www.suse.com/support/update/announcement/2022/suse-su-20223938-1
Comment: CVSS (Max): 7.1 CVE-2022-43995 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H)
CVSS Source: SUSE
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for sudo
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3938-1
Rating: important
References: #1204986
Cross-References: CVE-2022-43995
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Enterprise Storage 7
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Manager Proxy 4.1
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for sudo fixes the following issues:
o CVE-2022-43995: Fixed a potential heap-based buffer over-read when entering
a password of seven characters or fewer and using the crypt() password
backend (bsc#1204986).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3938=1
o SUSE Manager Retail Branch Server 4.1:
zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3938=1
o SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3938=1
o SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3938=1
o SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3938=1
o SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-3938=1
o SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3938=1
o SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3938=1
o SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3938=1
o SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3938=1
o SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2022-3938=1
o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3938=1
o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3938=1
o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3938=1
o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3938=1
o SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-3938=1
o SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-3938=1
o SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-3938=1
o SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-3938=1
o SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. I will
inform you if it detects new updates and let you then trigger updating of
the complete cluster in a controlled way.
Package List:
o SUSE Manager Server 4.1 (ppc64le s390x x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Manager Retail Branch Server 4.1 (x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Manager Proxy 4.1 (x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64
x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64
x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64
x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64
x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Enterprise Storage 7 (aarch64 x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE Enterprise Storage 6 (aarch64 x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
o SUSE CaaS Platform 4.0 (x86_64):
sudo-1.8.27-150000.4.30.1
sudo-debuginfo-1.8.27-150000.4.30.1
sudo-debugsource-1.8.27-150000.4.30.1
sudo-devel-1.8.27-150000.4.30.1
References:
o https://www.suse.com/security/cve/CVE-2022-43995.html
o https://bugzilla.suse.com/1204986
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=gIsk
-----END PGP SIGNATURE-----
ESB-2022.5818 - [SUSE] rpm: CVSS (Max): 5.3
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5818
Security update for rpm
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: rpm
Publisher: SUSE
Operating System: SUSE
Resolution: Patch/Upgrade
CVE Names: CVE-2021-20271 CVE-2021-20266 CVE-2021-3421
Original Bulletin:
https://www.suse.com/support/update/announcement/2022/suse-su-20223939-1
Comment: CVSS (Max): 5.3 CVE-2021-3421 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N)
CVSS Source: SUSE
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for rpm
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3939-1
Rating: moderate
References: #1183543 #1183545 #1183632 #1183659 #1185299 #996280
Cross-References: CVE-2021-20266 CVE-2021-20271 CVE-2021-3421
Affected Products:
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server for SAP Applications 12-SP5
SUSE Linux Enterprise Software Development Kit 12-SP5
______________________________________________________________________________
An update that solves three vulnerabilities and has three fixes is now
available.
Description:
This update for rpm fixes the following issues:
o Fixed PGP parsing bugs (bsc#1185299).
o Fixed various format handling bugs (bsc#996280).
o CVE-2021-3421: Fixed vulnerability where unsigned headers could be injected
into the rpm database (bsc#1183543).
o CVE-2021-20271: Fixed vulnerability where a corrupted rpm could corrupt the
rpm database (bsc#1183545).
o CVE-2021-20266: Fixed missing bounds check in hdrblobInit (bsc#1183632).
Bugfixes:
o Fixed deadlock when multiple rpm processes tried to acquire the database
lock (bsc#1183659).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Software Development Kit 12-SP5:
zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-3939=1
o SUSE Linux Enterprise Server 12-SP5:
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-3939=1
Package List:
o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le
s390x x86_64):
rpm-debuginfo-4.11.2-16.26.1
rpm-debugsource-4.11.2-16.26.1
rpm-devel-4.11.2-16.26.1
o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
python3-rpm-4.11.2-16.26.1
python3-rpm-debuginfo-4.11.2-16.26.1
python3-rpm-debugsource-4.11.2-16.26.1
rpm-4.11.2-16.26.1
rpm-build-4.11.2-16.26.1
rpm-build-debuginfo-4.11.2-16.26.1
rpm-debuginfo-4.11.2-16.26.1
rpm-debugsource-4.11.2-16.26.1
rpm-python-4.11.2-16.26.1
rpm-python-debuginfo-4.11.2-16.26.1
rpm-python-debugsource-4.11.2-16.26.1
o SUSE Linux Enterprise Server 12-SP5 (s390x x86_64):
rpm-32bit-4.11.2-16.26.1
rpm-debuginfo-32bit-4.11.2-16.26.1
References:
o https://www.suse.com/security/cve/CVE-2021-20266.html
o https://www.suse.com/security/cve/CVE-2021-20271.html
o https://www.suse.com/security/cve/CVE-2021-3421.html
o https://bugzilla.suse.com/1183543
o https://bugzilla.suse.com/1183545
o https://bugzilla.suse.com/1183632
o https://bugzilla.suse.com/1183659
o https://bugzilla.suse.com/1185299
o https://bugzilla.suse.com/996280
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=7FqO
-----END PGP SIGNATURE-----
ESB-2022.5817 - [SUSE] libarchive: CVSS (Max): 4.4
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5817
Security update for libarchive
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: libarchive
Publisher: SUSE
Operating System: SUSE
Resolution: Patch/Upgrade
CVE Names: CVE-2021-31566
Original Bulletin:
https://www.suse.com/support/update/announcement/2022/suse-su-20223936-1
Comment: CVSS (Max): 4.4 CVE-2021-31566 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)
CVSS Source: SUSE
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for libarchive
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3936-1
Rating: moderate
References: #1192426 #1192427
Cross-References: CVE-2021-31566
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Micro 5.3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Module for Development Tools 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves one vulnerability and has one errata is now available.
Description:
This update for libarchive fixes the following issues:
- - CVE-2021-31566: Fixed vulnerability where libarchive modifies file flags of
symlink target (bsc#1192426) - Fixed issue where processing fixup entries may
follow symbolic links (bsc#1192427).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-3936=1
o SUSE Linux Enterprise Module for Development Tools 15-SP4:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2022-3936=1
o SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3936=1
o SUSE Linux Enterprise Micro 5.3:
zypper in -t patch SUSE-SLE-Micro-5.3-2022-3936=1
Package List:
o openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
bsdtar-3.5.1-150400.3.9.1
bsdtar-debuginfo-3.5.1-150400.3.9.1
libarchive-debugsource-3.5.1-150400.3.9.1
libarchive-devel-3.5.1-150400.3.9.1
libarchive13-3.5.1-150400.3.9.1
libarchive13-debuginfo-3.5.1-150400.3.9.1
o openSUSE Leap 15.4 (x86_64):
libarchive13-32bit-3.5.1-150400.3.9.1
libarchive13-32bit-debuginfo-3.5.1-150400.3.9.1
o SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le
s390x x86_64):
bsdtar-3.5.1-150400.3.9.1
bsdtar-debuginfo-3.5.1-150400.3.9.1
libarchive-debugsource-3.5.1-150400.3.9.1
o SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x
x86_64):
libarchive-debugsource-3.5.1-150400.3.9.1
libarchive-devel-3.5.1-150400.3.9.1
libarchive13-3.5.1-150400.3.9.1
libarchive13-debuginfo-3.5.1-150400.3.9.1
o SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64):
libarchive-debugsource-3.5.1-150400.3.9.1
libarchive13-3.5.1-150400.3.9.1
libarchive13-debuginfo-3.5.1-150400.3.9.1
References:
o https://www.suse.com/security/cve/CVE-2021-31566.html
o https://bugzilla.suse.com/1192426
o https://bugzilla.suse.com/1192427
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=6m1R
-----END PGP SIGNATURE-----
ESB-2022.5816 - [SUSE] xwayland: CVSS (Max): 7.8
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5816
Security update for xwayland
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: xwayland
Publisher: SUSE
Operating System: SUSE
Resolution: Patch/Upgrade
CVE Names: CVE-2022-3551 CVE-2022-3550
Original Bulletin:
https://www.suse.com/support/update/announcement/2022/suse-su-20223941-1
Comment: CVSS (Max): 7.8 CVE-2022-3550 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVSS Source: SUSE
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for xwayland
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3941-1
Rating: important
References: #1204412 #1204416
Cross-References: CVE-2022-3550 CVE-2022-3551
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Linux Enterprise Workstation Extension 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for xwayland fixes the following issues:
- - CVE-2022-3550: Fixed out of bounds read/write in _GetCountedString() (bsc#
1204412). - CVE-2022-3551: Fixed various leaks of the return value of
GetComponentSpec() (bsc#1204416).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-3941=1
o SUSE Linux Enterprise Workstation Extension 15-SP4:
zypper in -t patch SUSE-SLE-Product-WE-15-SP4-2022-3941=1
Package List:
o openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
xwayland-21.1.4-150400.3.3.1
xwayland-debuginfo-21.1.4-150400.3.3.1
xwayland-debugsource-21.1.4-150400.3.3.1
xwayland-devel-21.1.4-150400.3.3.1
o SUSE Linux Enterprise Workstation Extension 15-SP4 (x86_64):
xwayland-21.1.4-150400.3.3.1
xwayland-debuginfo-21.1.4-150400.3.3.1
xwayland-debugsource-21.1.4-150400.3.3.1
References:
o https://www.suse.com/security/cve/CVE-2022-3550.html
o https://www.suse.com/security/cve/CVE-2022-3551.html
o https://bugzilla.suse.com/1204412
o https://bugzilla.suse.com/1204416
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=eksZ
-----END PGP SIGNATURE-----
ESB-2022.5815 - [SUSE] python3-lxml: CVSS (Max): 6.1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5815
Security update for python3-lxml
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: python3-lxml
Publisher: SUSE
Operating System: SUSE
Resolution: Patch/Upgrade
CVE Names: CVE-2021-28957
Original Bulletin:
https://www.suse.com/support/update/announcement/2022/suse-su-20223937-1
Comment: CVSS (Max): 6.1 CVE-2021-28957 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
CVSS Source: SUSE
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for python3-lxml
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3937-1
Rating: moderate
References: #1184177
Cross-References: CVE-2021-28957
Affected Products:
SUSE Linux Enterprise Server 12-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for python3-lxml fixes the following issues:
- - CVE-2021-28957: Fixed XSS due to missing input sanitization for HTML5
attributes (bsc#1184177).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Server 12-SP5:
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-3937=1
Package List:
o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
python3-lxml-3.6.1-3.6.1
python3-lxml-debuginfo-3.6.1-3.6.1
python3-lxml-debugsource-3.6.1-3.6.1
References:
o https://www.suse.com/security/cve/CVE-2021-28957.html
o https://bugzilla.suse.com/1184177
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=ubZS
-----END PGP SIGNATURE-----
ESB-2022.5814 - [SUSE] python-rsa: CVSS (Max): 5.9
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5814
Security update for python-rsa
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: python-rsa
Publisher: SUSE
Operating System: SUSE
Resolution: Patch/Upgrade
CVE Names: CVE-2020-25658
Original Bulletin:
https://www.suse.com/support/update/announcement/2022/suse-su-20223932-1
Comment: CVSS (Max): 5.9 CVE-2020-25658 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVSS Source: SUSE
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for python-rsa
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3932-1
Rating: moderate
References: #1178676
Cross-References: CVE-2020-25658
Affected Products:
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Micro 5.3
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.2
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.2
SUSE Manager Server 4.3
openSUSE Leap 15.3
openSUSE Leap 15.4
openSUSE Leap Micro 5.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for python-rsa fixes the following issues:
- - CVE-2020-25658: Fixed bleichenbacher timing oracle attack against RSA
decryption (bsc#1178676).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o openSUSE Leap Micro 5.2:
zypper in -t patch openSUSE-Leap-Micro-5.2-2022-3932=1
o openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-3932=1
o openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-3932=1
o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-3932=
1
o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-3932=
1
o SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3932=1
o SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-3932=1
o SUSE Linux Enterprise Micro 5.3:
zypper in -t patch SUSE-SLE-Micro-5.3-2022-3932=1
o SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-3932=1
Package List:
o openSUSE Leap Micro 5.2 (noarch):
python3-rsa-3.4.2-150000.3.7.1
o openSUSE Leap 15.4 (noarch):
python3-rsa-3.4.2-150000.3.7.1
o openSUSE Leap 15.3 (noarch):
python2-rsa-3.4.2-150000.3.7.1
python3-rsa-3.4.2-150000.3.7.1
o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (noarch):
python2-rsa-3.4.2-150000.3.7.1
o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (noarch):
python2-rsa-3.4.2-150000.3.7.1
o SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch):
python3-rsa-3.4.2-150000.3.7.1
o SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch):
python3-rsa-3.4.2-150000.3.7.1
o SUSE Linux Enterprise Micro 5.3 (noarch):
python3-rsa-3.4.2-150000.3.7.1
o SUSE Linux Enterprise Micro 5.2 (noarch):
python3-rsa-3.4.2-150000.3.7.1
References:
o https://www.suse.com/security/cve/CVE-2020-25658.html
o https://bugzilla.suse.com/1178676
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=tQuL
-----END PGP SIGNATURE-----
ESB-2022.5813 - [SUSE] kernel: CVSS (Max): 7.8
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5813
Security update for the Linux Kernel
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: kernel
Publisher: SUSE
Operating System: SUSE
Resolution: Patch/Upgrade
CVE Names: CVE-2022-43750 CVE-2022-28748 CVE-2022-3649
CVE-2022-3646 CVE-2022-3629 CVE-2022-3628
CVE-2022-3621 CVE-2022-3594 CVE-2022-3586
CVE-2022-3565 CVE-2022-3545 CVE-2022-3542
CVE-2022-3524 CVE-2022-3521 CVE-2022-2964
CVE-2022-2153 CVE-2021-4037
Original Bulletin:
https://www.suse.com/support/update/announcement/2022/suse-su-20223930-1
Comment: CVSS (Max): 7.8 CVE-2022-2964 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVSS Source: SUSE
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3930-1
Rating: important
References: #1065729 #1198702 #1200788 #1202686 #1202972 #1203387
#1204241 #1204354 #1204355 #1204402 #1204415 #1204431
#1204439 #1204479 #1204574 #1204635 #1204646 #1204647
#1204653 #1204755 #1204868
Cross-References: CVE-2021-4037 CVE-2022-2153 CVE-2022-2964 CVE-2022-3521
CVE-2022-3524 CVE-2022-3542 CVE-2022-3545 CVE-2022-3565
CVE-2022-3586 CVE-2022-3594 CVE-2022-3621 CVE-2022-3628
CVE-2022-3629 CVE-2022-3646 CVE-2022-3649 CVE-2022-43750
Affected Products:
SUSE Linux Enterprise Real Time Extension 12-SP5
______________________________________________________________________________
An update that solves 16 vulnerabilities and has 5 fixes is now available.
Description:
The SUSE Linux Enterprise 12 SP5 kernel RT was updated.
The following security bugs were fixed:
o CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker()
in wifi/brcmfmac (bsc#1204868).
o CVE-2021-4037: Fixed function logic vulnerability that allowed local users
to create files for the XFS file-system with an unintended group ownership
and with group execution and SGID permission bits set (bnc#1198702).
o CVE-2022-2153: Fixed vulnerability in KVM that could allow an unprivileged
local attacker on the host to cause DoS (bnc#1200788).
o CVE-2022-2964, CVE-2022-28748: Fixed memory corruption issues in
ax88179_178a devices (bnc#1202686 bsc#1196018).
o CVE-2022-3521: Fixed race condition in kcm_tx_work() in net/kcm/kcmsock.c
(bnc#1204355).
o CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6
handler (bnc#1204354).
o CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/
ethernet/broadcom/bnx2x/bnx2x_cmn.c (bnc#1204402).
o CVE-2022-3545: Fixed use-after-free in area_cache_get() in drivers/net/
ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bnc#1204415).
o CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/
l1oip_core.c (bnc#1204431).
o CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow
a local unprivileged user to cause a denial of service (bnc#1204439).
o CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/
net/usb/r8152.c (bnc#1204479).
o CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level
() in fs/nilfs2/inode.c (bnc#1204574).
o CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/
af_vsock.c (bnc#1204635).
o CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/
segment.c (bnc#1204646).
o CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/
inode.c (bnc#1204647).
o CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space
client to corrupt the monitor's internal memory (bnc#1204653).
The following non-security bugs were fixed:
o amd-xgbe: Update DMA coherency values (git-fixes).
o bnxt: do not lock the tx queue from napi poll (git-fixes).
o bnxt_en: Fix RX consumer index logic in the error path (git-fixes).
o bnxt_en: reverse order of TX disable and carrier off (git-fixes).
o ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read()
(git-fixes).
o ftrace: Fix char print issue in print_ip_ins() (git-fixes).
o i40e: Fix flow for IPv6 next header (extension header) (git-fixes).
o i40e: Fix overwriting flow control settings during driver loading
(git-fixes).
o i40e: improve locking of mac_filter_hash (git-fixes).
o input: gscps2 - check return value of ioremap() in gscps2_probe()
(git-fixes).
o input: xpad - add supported devices as contributed on github (git-fixes).
o ip6: fix skb leak in ip6frag_expire_frag_queue (bsc#1202972)
o kABI: Fix after adding trace_iterator.wait_index (git-fixes).
o memcg, kmem: do not fail __GFP_NOFAIL charges (bsc#1204755).
o net/mlx4: Fix EEPROM dump support (git-fixes).
o net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).
o net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes).
o net: amd-xgbe: Fix NETDEV WATCHDOG transmit queue timeout warning
(git-fixes).
o net: amd-xgbe: Fix network fluctuations when using 1G BELFUSE SFP
(git-fixes).
o net: amd-xgbe: Reset link when the link never comes back (git-fixes).
o net: dsa: mt7530: add the missing RxUnicast MIB counter (git-fixes).
o net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes).
o net: lapbether: Prevent racing when checking whether the netif is running
(git-fixes).
o net: marvell: fix MVNETA_TX_IN_PRGRS bit number (git-fixes).
o net: mvpp2: Put fwnode in error case during ->probe() (git-fixes).
o net: stmmac: fix watchdog timeout during suspend/resume stress test
(git-fixes).
o net: stmmac: stop each tx channel independently (git-fixes).
o net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes).
o net: vxge: fix use-after-free in vxge_device_unregister (git-fixes).
o nvmem: core: Check input parameter for NULL in nvmem_unregister() (bsc#
1204241).
o powerpc/mm/64s: Drop pgd_huge() (bsc#1065729).
o powerpc/mm: remove pmd_huge/pud_huge stubs and include hugetlb.h (bsc#
1065729).
o powerpc/pci_dn: Add missing of_node_put() (bsc#1065729).
o powerpc/powernv: add missing of_node_put() in opal_export_attrs() (bsc#
1065729).
o ppp: Fix generating ifname when empty IFLA_IFNAME is specified (git-fixes).
o ppp: Fix generating ppp unit id when ifname is not specified (git-fixes).
o quota: widen timestamps for the fs_disk_quota structure (bsc#1203387).
o r8169: fix jumbo packet handling on RTL8168e (git-fixes).
o revert "niu: fix missing checks of niu_pci_eeprom_read" (git-fixes).
o ring-buffer: Add ring_buffer_wake_waiters() (git-fixes).
o ring-buffer: Check pending waiters when doing wake ups as well (git-fixes).
o ring-buffer: Fix race between reset page and reading page (git-fixes).
o tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes).
o tracing: Disable interrupt or preemption before acquiring arch_spinlock_t
(git-fixes).
o tracing: Do not free snapshot if tracer is on cmdline (git-fixes).
o tracing: Simplify conditional compilation code in tracing_set_tracer()
(git-fixes).
o tracing: Wake up ring buffer waiters on closing of the file (git-fixes).
o tracing: Wake up waiters when tracing is disabled (git-fixes).
o usb: core: Fix RST error in hub.c (git-fixes).
o usb: serial: ch341: add basis for quirk detection (git-fixes).
o usb: serial: ch341: fix lockup of devices with limited prescaler
(git-fixes).
o usb: serial: ch341: fix lost character on LCR updates (git-fixes).
o usb: serial: ch341: fix receiver regression (git-fixes).
o usb: serial: ch341: reimplement line-speed handling (git-fixes).
o usb: serial: cp210x: add Decagon UCA device id (git-fixes).
o usb: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).
o usb: serial: option: add Quectel EM060K modem (git-fixes).
o usb: serial: option: add support for OPPO R11 diag port (git-fixes).
o xfs: account finobt blocks properly in perag reservation (bsc#1203387).
o xfs: enable big timestamps (bsc#1203387).
o xfs: enable new inode btree counters feature (bsc#1203387).
o xfs: explicitly define inode timestamp range (bsc#1203387).
o xfs: preserve default grace interval during quotacheck (bsc#1203387).
o xfs: quota: move to time64_t interfaces (bsc#1203387).
o xfs: redefine xfs_ictimestamp_t (bsc#1203387).
o xfs: redefine xfs_timestamp_t (bsc#1203387).
o xfs: store inode btree block counts in AGI header (bsc#1203387).
o xfs: use a struct timespec64 for the in-core crtime (bsc#1203387).
o xfs: use the finobt block counts to speed up mount times (bsc#1203387).
o xfs: widen ondisk inode timestamps to deal with y2038+ (bsc#1203387).
o xfs: widen ondisk quota expiration timestamps to handle y2038+ (bsc#
1203387).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Real Time Extension 12-SP5:
zypper in -t patch SUSE-SLE-RT-12-SP5-2022-3930=1
Package List:
o SUSE Linux Enterprise Real Time Extension 12-SP5 (noarch):
kernel-devel-rt-4.12.14-10.106.1
kernel-source-rt-4.12.14-10.106.1
o SUSE Linux Enterprise Real Time Extension 12-SP5 (x86_64):
cluster-md-kmp-rt-4.12.14-10.106.1
cluster-md-kmp-rt-debuginfo-4.12.14-10.106.1
dlm-kmp-rt-4.12.14-10.106.1
dlm-kmp-rt-debuginfo-4.12.14-10.106.1
gfs2-kmp-rt-4.12.14-10.106.1
gfs2-kmp-rt-debuginfo-4.12.14-10.106.1
kernel-rt-4.12.14-10.106.1
kernel-rt-base-4.12.14-10.106.1
kernel-rt-base-debuginfo-4.12.14-10.106.1
kernel-rt-debuginfo-4.12.14-10.106.1
kernel-rt-debugsource-4.12.14-10.106.1
kernel-rt-devel-4.12.14-10.106.1
kernel-rt-devel-debuginfo-4.12.14-10.106.1
kernel-rt_debug-4.12.14-10.106.1
kernel-rt_debug-debuginfo-4.12.14-10.106.1
kernel-rt_debug-debugsource-4.12.14-10.106.1
kernel-rt_debug-devel-4.12.14-10.106.1
kernel-rt_debug-devel-debuginfo-4.12.14-10.106.1
kernel-syms-rt-4.12.14-10.106.1
ocfs2-kmp-rt-4.12.14-10.106.1
ocfs2-kmp-rt-debuginfo-4.12.14-10.106.1
References:
o https://www.suse.com/security/cve/CVE-2021-4037.html
o https://www.suse.com/security/cve/CVE-2022-2153.html
o https://www.suse.com/security/cve/CVE-2022-2964.html
o https://www.suse.com/security/cve/CVE-2022-3521.html
o https://www.suse.com/security/cve/CVE-2022-3524.html
o https://www.suse.com/security/cve/CVE-2022-3542.html
o https://www.suse.com/security/cve/CVE-2022-3545.html
o https://www.suse.com/security/cve/CVE-2022-3565.html
o https://www.suse.com/security/cve/CVE-2022-3586.html
o https://www.suse.com/security/cve/CVE-2022-3594.html
o https://www.suse.com/security/cve/CVE-2022-3621.html
o https://www.suse.com/security/cve/CVE-2022-3628.html
o https://www.suse.com/security/cve/CVE-2022-3629.html
o https://www.suse.com/security/cve/CVE-2022-3646.html
o https://www.suse.com/security/cve/CVE-2022-3649.html
o https://www.suse.com/security/cve/CVE-2022-43750.html
o https://bugzilla.suse.com/1065729
o https://bugzilla.suse.com/1198702
o https://bugzilla.suse.com/1200788
o https://bugzilla.suse.com/1202686
o https://bugzilla.suse.com/1202972
o https://bugzilla.suse.com/1203387
o https://bugzilla.suse.com/1204241
o https://bugzilla.suse.com/1204354
o https://bugzilla.suse.com/1204355
o https://bugzilla.suse.com/1204402
o https://bugzilla.suse.com/1204415
o https://bugzilla.suse.com/1204431
o https://bugzilla.suse.com/1204439
o https://bugzilla.suse.com/1204479
o https://bugzilla.suse.com/1204574
o https://bugzilla.suse.com/1204635
o https://bugzilla.suse.com/1204646
o https://bugzilla.suse.com/1204647
o https://bugzilla.suse.com/1204653
o https://bugzilla.suse.com/1204755
o https://bugzilla.suse.com/1204868
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=9afY
-----END PGP SIGNATURE-----
ESB-2022.5812 - [SUSE] libarchive: CVSS (Max): 4.4
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5812
Security update for libarchive
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: libarchive
Publisher: SUSE
Operating System: SUSE
Resolution: Patch/Upgrade
CVE Names: CVE-2021-31566
Original Bulletin:
https://www.suse.com/support/update/announcement/2022/suse-su-20223935-1
Comment: CVSS (Max): 4.4 CVE-2021-31566 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)
CVSS Source: SUSE
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/I:R/S:U/C:N/I:L/A:L
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for libarchive
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3935-1
Rating: moderate
References: #1192426 #1192427
Cross-References: CVE-2021-31566
Affected Products:
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that solves one vulnerability and has one errata is now available.
Description:
This update for libarchive fixes the following issues:
- - CVE-2021-31566: Fixed incorrect usage of file flags (bsc#1192426). - Fixed
issues where postprocessing alters symlink targets instead of actual file (bsc#
1192427).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-3935=1
o SUSE Linux Enterprise Module for Development Tools 15-SP3:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-3935=1
o SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-3935=1
Package List:
o openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
bsdtar-3.4.2-150200.4.12.1
bsdtar-debuginfo-3.4.2-150200.4.12.1
libarchive-debugsource-3.4.2-150200.4.12.1
libarchive-devel-3.4.2-150200.4.12.1
libarchive13-3.4.2-150200.4.12.1
libarchive13-debuginfo-3.4.2-150200.4.12.1
o openSUSE Leap 15.3 (x86_64):
libarchive13-32bit-3.4.2-150200.4.12.1
libarchive13-32bit-debuginfo-3.4.2-150200.4.12.1
o SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le
s390x x86_64):
bsdtar-3.4.2-150200.4.12.1
bsdtar-debuginfo-3.4.2-150200.4.12.1
libarchive-debugsource-3.4.2-150200.4.12.1
o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x
x86_64):
libarchive-debugsource-3.4.2-150200.4.12.1
libarchive-devel-3.4.2-150200.4.12.1
libarchive13-3.4.2-150200.4.12.1
libarchive13-debuginfo-3.4.2-150200.4.12.1
References:
o https://www.suse.com/security/cve/CVE-2021-31566.html
o https://bugzilla.suse.com/1192426
o https://bugzilla.suse.com/1192427
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=v7aM
-----END PGP SIGNATURE-----
ESB-2022.5811 - [SUSE] kernel: CVSS (Max): 7.8
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5811
Security update for the Linux Kernel
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: kernel
Publisher: SUSE
Operating System: SUSE
Resolution: Patch/Upgrade
CVE Names: CVE-2022-43750 CVE-2022-42703 CVE-2022-39189
CVE-2022-28748 CVE-2022-3649 CVE-2022-3646
CVE-2022-3640 CVE-2022-3629 CVE-2022-3625
CVE-2022-3621 CVE-2022-3594 CVE-2022-3586
CVE-2022-3577 CVE-2022-3565 CVE-2022-3545
CVE-2022-3542 CVE-2022-3535 CVE-2022-3524
CVE-2022-3521 CVE-2022-3424 CVE-2022-3176
CVE-2022-2978 CVE-2022-2964 CVE-2022-2153
CVE-2021-4037
Original Bulletin:
https://www.suse.com/support/update/announcement/2022/suse-su-20223929-1
Comment: CVSS (Max): 7.8 CVE-2022-3176 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVSS Source: SUSE
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3929-1
Rating: important
References: #1032323 #1065729 #1196018 #1198702 #1200465 #1200788
#1201725 #1202686 #1202700 #1203066 #1203098 #1203387
#1203391 #1203496 #1204053 #1204166 #1204168 #1204354
#1204355 #1204382 #1204402 #1204415 #1204417 #1204431
#1204439 #1204470 #1204479 #1204574 #1204575 #1204619
#1204635 #1204637 #1204646 #1204647 #1204653 #1204728
#1204753 #1204754
Cross-References: CVE-2021-4037 CVE-2022-2153 CVE-2022-28748 CVE-2022-2964
CVE-2022-2978 CVE-2022-3176 CVE-2022-3424 CVE-2022-3521
CVE-2022-3524 CVE-2022-3535 CVE-2022-3542 CVE-2022-3545
CVE-2022-3565 CVE-2022-3577 CVE-2022-3586 CVE-2022-3594
CVE-2022-3621 CVE-2022-3625 CVE-2022-3629 CVE-2022-3640
CVE-2022-3646 CVE-2022-3649 CVE-2022-39189 CVE-2022-42703
CVE-2022-43750
Affected Products:
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Realtime 15-SP3
SUSE Linux Enterprise Real Time 15-SP3
openSUSE Leap Micro 5.2
______________________________________________________________________________
An update that solves 25 vulnerabilities, contains four features and has 13
fixes is now available.
Description:
The SUSE Linux Enterprise 15-SP3 RT kernel was updated to receive various
security and bugfixes.
The following security bugs were fixed:
o CVE-2022-2964, CVE-2022-28748: Fixed memory corruption issues in
ax88179_178a devices (bnc#1202686 bsc#1196018).
o CVE-2021-4037: Fixed function logic vulnerability that allowed local users
to create files for the XFS file-system with an unintended group ownership
and with group execution and SGID permission bits set (bnc#1198702).
o CVE-2022-2153: Fixed vulnerability in KVM that could allow an unprivileged
local attacker on the host to cause DoS (bnc#1200788).
o CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6
handler (bnc#1204354).
o CVE-2022-2978: Fixed use-after-free in the NILFS file system that could
lead to local privilege escalation or DoS (bnc#1202700).
o CVE-2022-3176: Fixed use-after-free in io_uring when using POLLFREE (bnc#
1203391).
o CVE-2022-3521: Fixed race condition in kcm_tx_work() in net/kcm/kcmsock.c
(bnc#1204355).
o CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault
() and gru_handle_user_call_os() that could lead to kernel panic (bsc#
1204166).
o CVE-2022-3535: Fixed memory leak in mvpp2_dbgfs_port_init() in drivers/net/
ethernet/marvell/mvpp2/mvpp2_debugfs.c (bnc#1204417).
o CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/
ethernet/broadcom/bnx2x/bnx2x_cmn.c (bnc#1204402).
o CVE-2022-3545: Fixed use-after-free in area_cache_get() in drivers/net/
ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bnc#1204415).
o CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/
l1oip_core.c (bnc#1204431).
o CVE-2022-3577: Fixed out-of-bounds memory write flaw in bigben device
driver that could lead to local privilege escalation or DoS (bnc#1204470).
o CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow
a local unprivileged user to cause a denial of service (bnc#1204439).
o CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/
net/usb/r8152.c (bnc#1204479).
o CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level
() in fs/nilfs2/inode.c (bnc#1204574).
o CVE-2022-3625: Fixed use-after-free in devlink_param_set()/
devlink_param_get() in net/core/devlink.c (bnc#1204637).
o CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/
af_vsock.c (bnc#1204635).
o CVE-2022-3640: Fixed use-after-free in l2cap_conn_del() in net/bluetooth/
l2cap_core.c (bnc#1204619).
o CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/
segment.c (bnc#1204646).
o CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/
inode.c (bnc#1204647).
o CVE-2022-39189: Fixed a flaw in the x86 KVM subsystem that could allow
unprivileged guest users to compromise the guest kernel via TLB flush
operations on preempted vCPU (bnc#1203066).
o CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma
double reuse (bnc#1204168).
o CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space
client to corrupt the monitor's internal memory (bnc#1204653).
The following non-security bugs were fixed:
o ACPI: APEI: do not add task_work to kernel thread to avoid memory leak
(git-fixes).
o ACPI: HMAT: Release platform device in case of platform_device_add_data()
fails (git-fixes).
o ACPI: extlog: Handle multiple records (git-fixes).
o ACPI: video: Add Toshiba Satellite/Portege Z830 quirk (git-fixes).
o ALSA: Use del_timer_sync() before freeing timer (git-fixes).
o ALSA: ac97: fix possible memory leak in snd_ac97_dev_register()
(git-fixes).
o ALSA: aoa: Fix I2S device accounting (git-fixes).
o ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev()
(git-fixes).
o ALSA: asihpi - Remove useless code in hpi_meter_get_peak() (git-fixes).
o ALSA: au88x0: use explicitly signed char (git-fixes).
o ALSA: dmaengine: increment buffer pointer atomically (git-fixes).
o ALSA: hda/hdmi: Do not skip notification handling during PM operation
(git-fixes).
o ALSA: hda/realtek: Add Intel Reference SSID to support headset keys
(git-fixes).
o ALSA: hda/realtek: Add quirk for ASUS GV601R laptop (git-fixes).
o ALSA: hda/realtek: Correct pin configs for ASUS G533Z (git-fixes).
o ALSA: hda/realtek: remove ALC289_FIXUP_DUAL_SPK for Dell 5530 (git-fixes).
o ALSA: hda: Fix position reporting on Poulsbo (git-fixes).
o ALSA: oss: Fix potential deadlock at unregistration (git-fixes).
o ALSA: rawmidi: Drop register_mutex in snd_rawmidi_free() (git-fixes).
o ALSA: rme9652: use explicitly signed char (git-fixes).
o ALSA: usb-audio: Fix NULL dererence at error path (git-fixes).
o ALSA: usb-audio: Fix potential memory leaks (git-fixes).
o ASoC: eureka-tlv320: Hold reference returned from of_find_xxx API
(git-fixes).
o ASoC: fsl_sai: Remove unnecessary FIFO reset in ISR (git-fixes).
o ASoC: mt6660: Fix PM disable depth imbalance in mt6660_i2c_probe
(git-fixes).
o ASoC: rsnd: Add check for rsnd_mod_power_on (git-fixes).
o ASoC: wcd9335: fix order of Slimbus unprepare/disable (git-fixes).
o ASoC: wcd934x: fix order of Slimbus unprepare/disable (git-fixes).
o ASoC: wm5102: Fix PM disable depth imbalance in wm5102_probe (git-fixes).
o ASoC: wm5110: Fix PM disable depth imbalance in wm5110_probe (git-fixes).
o ASoC: wm8997: Fix PM disable depth imbalance in wm8997_probe (git-fixes).
o Bluetooth: L2CAP: Fix user-after-free (git-fixes).
o Bluetooth: L2CAP: initialize delayed works at l2cap_chan_create()
(git-fixes).
o Bluetooth: hci_core: Fix not handling link timeouts propertly (git-fixes).
o Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times
(git-fixes).
o HID: hidraw: fix memory leak in hidraw_release() (git-fixes).
o HID: magicmouse: Do not set BTN_MOUSE on double report (git-fixes).
o HID: multitouch: Add memory barriers (git-fixes).
o HID: roccat: Fix use-after-free in roccat_read() (git-fixes).
o HSI: omap_ssi: Fix refcount leak in ssi_probe (git-fixes).
o HSI: omap_ssi_port: Fix dma_map_sg error check (git-fixes).
o IB/cm: Cancel mad on the DREQ event when the state is MRA_REP_RCVD
(git-fixes)
o IB/cma: Allow XRC INI QPs to set their local ACK timeout (git-fixes)
o IB/core: Only update PKEY and GID caches on respective events (git-fixes)
o IB/hfi1: Adjust pkey entry in index 0 (git-fixes)
o IB/hfi1: Fix abba locking issue with sc_disable() (git-fixes)
o IB/hfi1: Fix possible null-pointer dereference in _extend_sdma_tx_descs()
(git-fixes)
o IB/mlx4: Add support for REJ due to timeout (git-fixes)
o IB/mlx4: Use port iterator and validation APIs (git-fixes)
o IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
(git-fixes)
o IB/rdmavt: Add __init/__exit annotations to module init/exit funcs
(git-fixes)
o IB/srpt: Remove redundant assignment to ret (git-fixes)
o Input: i8042 - fix refount leak on sparc (git-fixes).
o Input: xpad - add supported devices as contributed on github (git-fixes).
o Input: xpad - fix wireless 360 controller breaking after suspend
(git-fixes).
o KVM: nVMX: Unconditionally purge queued/injected events on nested "exit"
(git-fixes).
o KVM: s390: Clarify SIGP orders versus STOP/RESTART (git-fixes).
o KVM: s390: VSIE: fix MVPG handling for prefixing and MSO (git-fixes).
o KVM: s390: clear kicked_mask before sleeping again (git-fixes).
o KVM: s390: preserve deliverable_mask in __airqs_kick_single_vcpu
(git-fixes).
o KVM: s390: pv: do not present the ecall interrupt twice (git-fixes).
o KVM: s390: split kvm_s390_real_to_abs (git-fixes).
o KVM: s390x: fix SCK locking (git-fixes).
o KVM: x86/emulator: Fix handing of POP SS to correctly set interruptibility
(git-fixes).
o PCI: Dynamically map ECAM regions (bsc#1204382).
o PCI: Fix used_buses calculation in pci_scan_child_bus_extend() (git-fixes).
o PCI: Sanitise firmware BAR assignments behind a PCI-PCI bridge (git-fixes).
o PM: domains: Fix handling of unavailable/disabled idle states (git-fixes).
o PM: hibernate: Allow hybrid sleep to work with s2idle (git-fixes).
o RDMA/bnxt_re: Add missing spin lock initialization (git-fixes)
o RDMA/bnxt_re: Fix query SRQ failure (git-fixes)
o RDMA/cm: Fix memory leak in ib_cm_insert_listen (git-fixes)
o RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests
(git-fixes)
o RDMA/cma: Fix arguments order in net device validation (git-fixes)
o RDMA/core: Sanitize WQ state received from the userspace (git-fixes)
o RDMA/cxgb4: Remove MW support (git-fixes)
o RDMA/efa: Free IRQ vectors on error flow (git-fixes)
o RDMA/efa: Remove double QP type assignment (git-fixes)
o RDMA/efa: Use ib_umem_num_dma_pages() (git-fixes)
o RDMA/hfi1: Fix potential integer multiplication overflow errors (git-fixes)
o RDMA/hns: Remove unnecessary check for the sgid_attr when modifying QP
(git-fixes)
o RDMA/i40iw: Use ib_umem_num_dma_pages() (git-fixes)
o RDMA/iwcm: Release resources if iw_cm module initialization fails
(git-fixes)
o RDMA/mlx4: Return missed an error if device does not support steering
(git-fixes)
o RDMA/mlx5: Add missing check for return value in get namespace flow
(git-fixes)
o RDMA/mlx5: Block FDB rules when not in switchdev mode (git-fixes)
o RDMA/mlx5: Fix memory leak in error flow for subscribe event routine
(git-fixes)
o RDMA/mlx5: Make mkeys always owned by the kernel's PD when not enabled
(git-fixes)
o RDMA/mlx5: Set user priority for DCT (git-fixes)
o RDMA/mlx5: Use set_mkc_access_pd_addr_fields() in reg_create() (git-fixes)
o RDMA/qedr: Fix NULL deref for query_qp on the GSI QP (git-fixes)
o RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr() (git-fixes)
o RDMA/qedr: Fix reporting QP timeout attribute (git-fixes)
o RDMA/qib: Remove superfluous fallthrough statements (git-fixes)
o RDMA/rtrs-srv: Pass the correct number of entries for dma mapped SGL
(git-fixes)
o RDMA/rxe: Do not overwrite errno from ib_umem_get() (git-fixes)
o RDMA/rxe: Fix "kernel NULL pointer dereference" error (git-fixes)
o RDMA/rxe: Fix error unwind in rxe_create_qp() (git-fixes)
o RDMA/rxe: Fix extra copies in build_rdma_network_hdr (git-fixes)
o RDMA/rxe: Fix extra copy in prepare_ack_packet (git-fixes)
o RDMA/rxe: Fix failure during driver load (git-fixes)
o RDMA/rxe: Fix over copying in get_srq_wqe (git-fixes)
o RDMA/rxe: Fix redundant call to ip_send_check (git-fixes)
o RDMA/rxe: Fix redundant skb_put_zero (git-fixes)
o RDMA/rxe: Fix rnr retry behavior (git-fixes)
o RDMA/rxe: Fix the error caused by qp->sk (git-fixes)
o RDMA/rxe: Fix wrong port_cap_flags (git-fixes)
o RDMA/rxe: Generate a completion for unsupported/invalid opcode (git-fixes)
o RDMA/rxe: Remove unused pkt->offset (git-fixes)
o RDMA/rxe: Return CQE error if invalid lkey was supplied (git-fixes)
o RDMA/sa_query: Use strscpy_pad instead of memcpy to copy a string
(git-fixes)
o RDMA/siw: Always consume all skbuf data in sk_data_ready() upcall.
(git-fixes)
o RDMA/siw: Fix a condition race issue in MPA request processing (git-fixes)
o RDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event
(git-fixes)
o RDMA/siw: Pass a pointer to virt_to_page() (git-fixes)
o RDMA/usnic: fix set-but-not-unused variable 'flags' warning (git-fixes)
o RDMA: Verify port when creating flow rule (git-fixes)
o RDMA: remove useless condition in siw_create_cq() (git-fixes)
o RDMa/mthca: Work around -Wenum-conversion warning (git-fixes)
o Revert "usb: storage: Add quirk for Samsung Fit flash" (git-fixes).
o Revert "usb: storage: Add quirk for Samsung Fit flash" (git-fixes).
o USB: serial: console: move mutex_unlock() before usb_serial_put()
(git-fixes).
o USB: serial: ftdi_sio: fix 300 bps rate for SIO (git-fixes).
o USB: serial: qcserial: add new usb-id for Dell branded EM7455 (git-fixes).
o USB: serial: qcserial: add new usb-id for Dell branded EM7455 (git-fixes).
o arm64: assembler: add cond_yield macro (git-fixes)
o ata: fix ata_id_has_devslp() (git-fixes).
o ata: fix ata_id_has_dipm() (git-fixes).
o ata: fix ata_id_has_ncq_autosense() (git-fixes).
o ata: fix ata_id_sense_reporting_enabled() and ata_id_has_sense_reporting()
(git-fixes).
o ata: libahci_platform: Sanity check the DT child nodes number (git-fixes).
o can: bcm: check the result of can_send() in bcm_can_tx() (git-fixes).
o can: kvaser_usb: Fix possible completions during init_completion
(git-fixes).
o can: kvaser_usb: Fix use of uninitialized completion (git-fixes).
o can: kvaser_usb_leaf: Fix CAN state after restart (git-fixes).
o can: kvaser_usb_leaf: Fix TX queue out of sync after restart (git-fixes).
o can: mscan: mpc5xxx: mpc5xxx_can_probe(): add missing put_clock() in error
path (git-fixes).
o cgroup/cpuset: Enable update_tasks_cpumask() on top_cpuset (bsc#1204753).
o clk: bcm2835: Make peripheral PLLC critical (git-fixes).
o clk: bcm2835: fix bcm2835_clock_rate_from_divisor declaration (git-fixes).
o clk: berlin: Add of_node_put() for of_get_parent() (git-fixes).
o clk: mediatek: mt8183: mfgcfg: Propagate rate changes to parent
(git-fixes).
o clk: oxnas: Hold reference returned by of_get_parent() (git-fixes).
o clk: qcom: gcc-msm8916: use ARRAY_SIZE instead of specifying num_parents
(git-fixes).
o clk: qoriq: Hold reference returned by of_get_parent() (git-fixes).
o clk: tegra20: Fix refcount leak in tegra20_clock_init (git-fixes).
o clk: tegra: Fix refcount leak in tegra114_clock_init (git-fixes).
o clk: tegra: Fix refcount leak in tegra210_clock_init (git-fixes).
o clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe (git-fixes).
o clk: zynqmp: Fix stack-out-of-bounds in strncpy` (git-fixes).
o clk: zynqmp: pll: rectify rate rounding in zynqmp_pll_round_rate
(git-fixes).
o crypto: akcipher - default implementation for setting a private key
(git-fixes).
o crypto: arm64/sha - fix function types (git-fixes)
o crypto: arm64/sha1-ce - simplify NEON yield (git-fixes)
o crypto: arm64/sha2-ce - simplify NEON yield (git-fixes)
o crypto: arm64/sha3-ce - simplify NEON yield (git-fixes)
o crypto: arm64/sha512-ce - simplify NEON yield (git-fixes)
o crypto: cavium - prevent integer overflow loading firmware (git-fixes).
o crypto: ccp - Release dma channels before dmaengine unrgister (git-fixes).
o crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr (git-fixes).
o device property: Fix documentation for *_match_string() APIs (git-fixes).
o dmaengine: ioat: stop mod_timer from resurrecting deleted timer in
__cleanup() (git-fixes).
o dmaengine: xilinx_dma: Report error in case of dma_set_mask_and_coherent
API failure (git-fixes).
o dmaengine: xilinx_dma: cleanup for fetching xlnx,num-fstores property
(git-fixes).
o docs: update mediator information in CoC docs (git-fixes).
o drivers: serial: jsm: fix some leaks in probe (git-fixes).
o drm/amdgpu: fix initial connector audio value (git-fixes).
o drm/bridge: Avoid uninitialized variable warning (git-fixes).
o drm/bridge: megachips: Fix a null pointer dereference bug (git-fixes).
o drm/bridge: parade-ps8640: Fix regulator supply order (git-fixes).
o drm/i915/gvt: fix a memory leak in intel_gvt_init_vgpu_types (git-fixes).
o drm/mipi-dsi: Detach devices when removing the host (git-fixes).
o drm/msm/dpu: Fix comment typo (git-fixes).
o drm/msm/dpu: index dpu_kms->hw_vbif using vbif_idx (git-fixes).
o drm/msm/dsi: fix memory corruption with too many bridges (git-fixes).
o drm/msm/hdmi: fix memory corruption with too many bridges (git-fixes).
o drm/msm: Fix return type of mdp4_lvds_connector_mode_valid (git-fixes).
o drm/msm: Make .remove and .shutdown HW shutdown consistent (git-fixes).
o drm/nouveau/nouveau_bo: fix potential memory leak in nouveau_bo_alloc()
(git-fixes).
o drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table()
(git-fixes).
o drm/omap: dss: Fix refcount leak bugs (git-fixes).
o drm/scheduler: quieten kernel-doc warnings (git-fixes).
o drm/udl: Restore display mode on resume (git-fixes).
o drm: Prevent drm_copy_field() to attempt copying a NULL pointer
(git-fixes).
o drm: Use size_t type for len variable in drm_copy_field() (git-fixes).
o drm: bridge: adv7511: fix CEC power down control register offset
(git-fixes).
o drm: fix drm_mipi_dbi build errors (git-fixes).
o drm: panel-orientation-quirks: Add quirk for Anbernic Win600 (git-fixes).
o drm:pl111: Add of_node_put() when breaking out of
for_each_available_child_of_node() (git-fixes).
o dyndbg: fix module.dyndbg handling (git-fixes).
o dyndbg: let query-modname override actual module name (git-fixes).
o efi: Correct Macmini DMI match in uefi cert quirk (git-fixes).
o efi: libstub: drop pointless get_memory_map() call (git-fixes).
o exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1204053
bsc#1201725).
o fbdev: cyber2000fb: fix missing pci_disable_device() (git-fixes).
o fbdev: da8xx-fb: Fix error handling in .remove() (git-fixes).
o firmware: arm_scmi: Add SCMI PM driver remove routine (git-fixes).
o firmware: google: Test spinlock on panic path to avoid lockups (git-fixes).
o fpga: prevent integer overflow in dfl_feature_ioctl_set_irq() (git-fixes).
o gpio: rockchip: request GPIO mux to pinctrl when setting direction
(git-fixes).
o hid: hid-logitech-hidpp: avoid unnecessary assignments in
hidpp_connect_event (git-fixes).
o hwmon/coretemp: Handle large core ID value (git-fixes).
o iio: ABI: Fix wrong format of differential capacitance channel ABI
(git-fixes).
o iio: adc: ad7923: fix channel readings for some variants (git-fixes).
o iio: adc: at91-sama5d2_adc: check return status for pressure and touch
(git-fixes).
o iio: adc: at91-sama5d2_adc: fix AT91_SAMA5D2_MR_TRACKTIM_MAX (git-fixes).
o iio: adc: at91-sama5d2_adc: lock around oversampling and sample freq
(git-fixes).
o iio: adc: mcp3911: use correct id bits (git-fixes).
o iio: dac: ad5593r: Fix i2c read protocol requirements (git-fixes).
o iio: inkern: only release the device node when done with it (git-fixes).
o iio: light: tsl2583: Fix module unloading (git-fixes).
o iio: pressure: dps310: Refactor startup procedure (git-fixes).
o iio: pressure: dps310: Reset chip after timeout (git-fixes).
o irqchip/ls-extirq: Fix invalid wait context by avoiding to use regmap
(git-fixes).
o kABI: arm64/crypto/sha512 Preserve function signature (git-fixes).
o kbuild: Add skip_encoding_btf_enum64 option to pahole (git-fixes).
o kbuild: remove the target in signal traps when interrupted (git-fixes).
o kbuild: sink stdout from cmd for silent build (git-fixes).
o kbuild: skip per-CPU BTF generation for pahole v1.18-v1.21 (jsc#SLE-24559).
o kthread: Extract KTHREAD_IS_PER_CPU (bsc#1204753).
o lib/sg_pool: change module_init(sg_pool_init) to subsys_initcall
(git-fixes).
o locking/csd_lock: Change csdlock_debug from early_param to __setup
(git-fixes).
o mISDN: fix use-after-free bugs in l1oip timer handlers (git-fixes).
o mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq (git-fixes).
o mac802154: Fix LQI recording (git-fixes).
o mailbox: bcm-ferxrm-mailbox: Fix error check for dma_map_sg (git-fixes).
o media: cedrus: Set the platform driver data earlier (git-fixes).
o media: cx88: Fix a null-ptr-deref bug in buffer_prepare() (git-fixes).
o media: v4l2-dv-timings: add sanity checks for blanking values (git-fixes).
o media: videodev2.h: V4L2_DV_BT_BLANKING_HEIGHT should check 'interlaced'
(git-fixes).
o media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init (git-fixes).
o memory: of: Fix refcount leak bug in of_get_ddr_timings() (git-fixes).
o memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() (git-fixes).
o mfd: fsl-imx25: Fix an error handling path in mx25_tsadc_setup_irq()
(git-fixes).
o mfd: intel_soc_pmic: Fix an error handling path in intel_soc_pmic_i2c_probe
() (git-fixes).
o mfd: lp8788: Fix an error handling path in lp8788_irq_init() and
lp8788_irq_init() (git-fixes).
o mfd: lp8788: Fix an error handling path in lp8788_probe() (git-fixes).
o mfd: sm501: Add check for platform_driver_register() (git-fixes).
o misc: ocxl: fix possible refcount leak in afu_ioctl() (git-fixes).
o mm, memcg: avoid stale protection values when cgroup is above protection
(bsc#1204754).
o mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page (bsc
#1204575).
o mm: memcontrol: fix occasional OOMs due to proportional memory.low reclaim
(bsc#1204754).
o mmc: au1xmmc: Fix an error handling path in au1xmmc_probe() (git-fixes).
o mmc: core: Fix kernel panic when remove non-standard SDIO card (git-fixes).
o mmc: core: Replace with already defined values for readability (git-fixes).
o mmc: core: Terminate infinite loop in SD-UHS voltage switch (git-fixes).
o mmc: sdhci-msm: add compatible string check for sdm670 (git-fixes).
o mmc: sdhci-sprd: Fix minimum clock limit (git-fixes).
o mmc: wmt-sdmmc: Fix an error handling path in wmt_mci_probe() (git-fixes).
o mtd: devices: docg3: check the return value of devm_ioremap() in the probe
(git-fixes).
o mtd: rawnand: atmel: Unmap streaming DMA mappings (git-fixes).
o mtd: rawnand: marvell: Use correct logic for nand-keep-config (git-fixes).
o mtd: rawnand: meson: fix bit map use in meson_nfc_ecc_correct()
(git-fixes).
o net/ieee802154: fix uninit value bug in dgram_sendmsg (git-fixes).
o net: ieee802154: return -EINVAL for unknown addr type (git-fixes).
o net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes).
o net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes).
o openvswitch: Fix double reporting of drops in dropwatch (git-fixes).
o openvswitch: Fix overreporting of drops in dropwatch (git-fixes).
o openvswitch: switch from WARN to pr_warn (git-fixes).
o phy: qualcomm: call clk_disable_unprepare in the error handling
(git-fixes).
o pinctrl: armada-37xx: Add missing GPIO-only pins (git-fixes).
o pinctrl: armada-37xx: Checks for errors in gpio_request_enable callback
(git-fixes).
o pinctrl: armada-37xx: Fix definitions for MPP pins 20-22 (git-fixes).
o pinctrl: rockchip: add pinmux_ops.gpio_set_direction callback (git-fixes).
o platform/x86: msi-laptop: Change DMI match / alias strings to fix module
autoloading (git-fixes).
o platform/x86: msi-laptop: Fix old-ec check for backlight registering
(git-fixes).
o platform/x86: msi-laptop: Fix resource cleanup (git-fixes).
o power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type()
(git-fixes).
o powerpc/64: Remove unused SYS_CALL_TABLE symbol (jsc#SLE-9246 git-fixes).
o powerpc/fadump: align destination address to pagesize (bsc#1204728 ltc#
200074).
o powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe() (jsc#
SLE-13847 git-fixes).
o powerpc/mm/64s: Drop pgd_huge() (bsc#1065729).
o powerpc/mm: remove pmd_huge/pud_huge stubs and include hugetlb.h (bsc#
1065729).
o powerpc/pci_dn: Add missing of_node_put() (bsc#1065729).
o powerpc/powernv: add missing of_node_put() in opal_export_attrs() (bsc#
1065729).
o powerpc/pseries: Interface to represent PAPR firmware attributes (bsc#
1200465 ltc#197256 jsc#PED-1931).
o quota: widen timestamps for the fs_disk_quota structure (bsc#1203387).
o regulator: qcom_rpm: Fix circular deferral regression (git-fixes).
o rpmsg: qcom: glink: replace strncpy() with strscpy_pad() (git-fixes).
o rtc: stmp3xxx: Add failure handling for stmp3xxx_wdt_register()
(git-fixes).
o s390/hypfs: avoid error message under KVM (bsc#1032323).
o sbitmap: Avoid leaving waitqueue in invalid state in __sbq_wake_up()
(git-fixes).
o sbitmap: fix possible io hung due to lost wakeup (git-fixes).
o scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() (git-fixes).
o scsi: mpt3sas: Fix return value check of dma_get_required_mask()
(git-fixes).
o scsi: qla2xxx: Fix disk failure to rediscover (git-fixes).
o selftest/powerpc: Add PAPR sysfs attributes sniff test (bsc#1200465 ltc#
197256 jsc#PED-1931).
o selftests/powerpc: Skip energy_scale_info test on older firmware
(git-fixes).
o soc: qcom: smem_state: Add refcounting for the 'state->of_node'
(git-fixes).
o soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() (git-fixes).
o soc: sunxi_sram: Make use of the helper function
devm_platform_ioremap_resource() (git-fixes).
o spi/omap100k:Fix PM disable depth imbalance in omap1_spi100k_probe
(git-fixes).
o spi: mt7621: Fix an error message in mt7621_spi_probe() (git-fixes).
o spi: qup: add missing clk_disable_unprepare on error in
spi_qup_pm_resume_runtime() (git-fixes).
o spi: qup: add missing clk_disable_unprepare on error in spi_qup_resume()
(git-fixes).
o spi: s3c64xx: Fix large transfers with DMA (git-fixes).
o staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv()
(git-fixes).
o staging: vt6655: fix potential memory leak (git-fixes).
o staging: vt6655: fix some erroneous memory clean-up loops (git-fixes).
o struct pci_config_window kABI workaround (bsc#1204382).
o thermal: intel_powerclamp: Use first online CPU as control_cpu (git-fixes).
o thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to
avoid crash (git-fixes).
o tty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown
(git-fixes).
o tty: xilinx_uartps: Fix the ignore_status (git-fixes).
o uas: add no-uas quirk for Hiksemi usb_disk (git-fixes).
o uas: ignore UAS for Thinkplus chips (git-fixes).
o usb-storage: Add Hiksemi USB3-FW to IGNORE_UAS (git-fixes).
o usb: add quirks for Lenovo OneLink+ Dock (git-fixes).
o usb: bdc: change state when port disconnected (git-fixes).
o usb: dwc3: gadget: Do not set IMI for no_interrupt (git-fixes).
o usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes).
o usb: gadget: function: fix dangling pnp_string in f_printer.c (git-fixes).
o usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info()
(git-fixes).
o usb: idmouse: fix an uninit-value in idmouse_open (git-fixes).
o usb: mon: make mmapped memory read only (git-fixes).
o usb: musb: Fix musb_gadget.c rxstate overflow bug (git-fixes).
o vhost/vsock: Use kvmalloc/kvfree for larger packets (git-fixes).
o watchdog: armada_37xx_wdt: Fix .set_timeout callback (git-fixes).
o watchdog: ftwdt010_wdt: fix test for platform_get_irq() failure
(git-fixes).
o wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state()
(git-fixes).
o wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg() (git-fixes).
o wifi: brcmfmac: fix invalid address access when enabling SCAN log level
(git-fixes).
o wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()
(git-fixes).
o wifi: cfg80211: update hidden BSSes to avoid WARN_ON (git-fixes).
o wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (other
cases) (git-fixes).
o wifi: mac80211: allow bw change during channel switch in mesh (git-fixes).
o wifi: mac80211: do not drop packets smaller than the LLC-SNAP header on
fast-rx (git-fixes).
o wifi: mac80211_hwsim: avoid mac80211 warning on bad rate (git-fixes).
o wifi: rt2x00: correctly set BBP register 86 for MT7620 (git-fixes).
o wifi: rt2x00: do not run Rt5592 IQ calibration on MT7620 (git-fixes).
o wifi: rt2x00: set SoC wmac clock register (git-fixes).
o wifi: rt2x00: set VGC gain for both chains of MT7620 (git-fixes).
o wifi: rt2x00: set correct TX_SW_CFG1 MAC register for MT7620 (git-fixes).
o wifi: rtl8xxxu: Fix AIFS written to REG_EDCA_*_PARAM (git-fixes).
o wifi: rtl8xxxu: Fix skb misuse in TX queue selection (git-fixes).
o wifi: rtl8xxxu: Improve rtl8xxxu_queue_select (git-fixes).
o wifi: rtl8xxxu: Remove copy-paste leftover in gen2_update_rate_mask
(git-fixes).
o wifi: rtl8xxxu: gen2: Fix mistake in path B IQ calibration (git-fixes).
o wifi: rtl8xxxu: tighten bounds checking in rtl8xxxu_read_efuse()
(git-fixes).
o xfs: add missing assert in xfs_fsmap_owner_from_rmap (git-fixes).
o xfs: enable big timestamps (bsc#1203387).
o xfs: enable new inode btree counters feature (bsc#1203387).
o xfs: explicitly define inode timestamp range (bsc#1203387).
o xfs: fix memory corruption during remote attr value buffer invalidation
(git-fixes).
o xfs: fix s_maxbytes computation on 32-bit kernels (git-fixes).
o xfs: hoist out xfs_resizefs_init_new_ags() (git-fixes).
o xfs: move incore structures out of xfs_da_format.h (git-fixes).
o xfs: quota: move to time64_t interfaces (bsc#1203387).
o xfs: redefine xfs_ictimestamp_t (bsc#1203387).
o xfs: redefine xfs_timestamp_t (bsc#1203387).
o xfs: refactor remote attr value buffer invalidation (git-fixes).
o xfs: remove obsolete AGF counter debugging (git-fixes).
o xfs: rename `new' to `delta' in xfs_growfs_data_private() (git-fixes).
o xfs: reserve data and rt quota at the same time (bsc#1203496).
o xfs: slightly tweak an assert in xfs_fs_map_blocks (git-fixes).
o xfs: store inode btree block counts in AGI header (bsc#1203387).
o xfs: streamline xfs_attr3_leaf_inactive (git-fixes).
o xfs: use a struct timespec64 for the in-core crtime (bsc#1203387).
o xfs: use the finobt block counts to speed up mount times (bsc#1203387).
o xfs: widen ondisk inode timestamps to deal with y2038+ (bsc#1203387).
o xfs: widen ondisk quota expiration timestamps to handle y2038+ (bsc#
1203387).
o xhci: Do not show warning for reinit on known broken suspend (git-fixes).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o openSUSE Leap Micro 5.2:
zypper in -t patch openSUSE-Leap-Micro-5.2-2022-3929=1
o SUSE Linux Enterprise Module for Realtime 15-SP3:
zypper in -t patch SUSE-SLE-Module-RT-15-SP3-2022-3929=1
o SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-3929=1
o SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-3929=1
Package List:
o openSUSE Leap Micro 5.2 (x86_64):
kernel-rt-5.3.18-150300.109.1
kernel-rt-debuginfo-5.3.18-150300.109.1
kernel-rt-debugsource-5.3.18-150300.109.1
o SUSE Linux Enterprise Module for Realtime 15-SP3 (x86_64):
cluster-md-kmp-rt-5.3.18-150300.109.1
cluster-md-kmp-rt-debuginfo-5.3.18-150300.109.1
dlm-kmp-rt-5.3.18-150300.109.1
dlm-kmp-rt-debuginfo-5.3.18-150300.109.1
gfs2-kmp-rt-5.3.18-150300.109.1
gfs2-kmp-rt-debuginfo-5.3.18-150300.109.1
kernel-rt-5.3.18-150300.109.1
kernel-rt-debuginfo-5.3.18-150300.109.1
kernel-rt-debugsource-5.3.18-150300.109.1
kernel-rt-devel-5.3.18-150300.109.1
kernel-rt-devel-debuginfo-5.3.18-150300.109.1
kernel-rt_debug-debuginfo-5.3.18-150300.109.1
kernel-rt_debug-debugsource-5.3.18-150300.109.1
kernel-rt_debug-devel-5.3.18-150300.109.1
kernel-rt_debug-devel-debuginfo-5.3.18-150300.109.1
kernel-syms-rt-5.3.18-150300.109.1
ocfs2-kmp-rt-5.3.18-150300.109.1
ocfs2-kmp-rt-debuginfo-5.3.18-150300.109.1
o SUSE Linux Enterprise Module for Realtime 15-SP3 (noarch):
kernel-devel-rt-5.3.18-150300.109.1
kernel-source-rt-5.3.18-150300.109.1
o SUSE Linux Enterprise Micro 5.2 (x86_64):
kernel-rt-5.3.18-150300.109.1
kernel-rt-debuginfo-5.3.18-150300.109.1
kernel-rt-debugsource-5.3.18-150300.109.1
o SUSE Linux Enterprise Micro 5.1 (x86_64):
kernel-rt-5.3.18-150300.109.1
kernel-rt-debuginfo-5.3.18-150300.109.1
kernel-rt-debugsource-5.3.18-150300.109.1
References:
o https://www.suse.com/security/cve/CVE-2021-4037.html
o https://www.suse.com/security/cve/CVE-2022-2153.html
o https://www.suse.com/security/cve/CVE-2022-28748.html
o https://www.suse.com/security/cve/CVE-2022-2964.html
o https://www.suse.com/security/cve/CVE-2022-2978.html
o https://www.suse.com/security/cve/CVE-2022-3176.html
o https://www.suse.com/security/cve/CVE-2022-3424.html
o https://www.suse.com/security/cve/CVE-2022-3521.html
o https://www.suse.com/security/cve/CVE-2022-3524.html
o https://www.suse.com/security/cve/CVE-2022-3535.html
o https://www.suse.com/security/cve/CVE-2022-3542.html
o https://www.suse.com/security/cve/CVE-2022-3545.html
o https://www.suse.com/security/cve/CVE-2022-3565.html
o https://www.suse.com/security/cve/CVE-2022-3577.html
o https://www.suse.com/security/cve/CVE-2022-3586.html
o https://www.suse.com/security/cve/CVE-2022-3594.html
o https://www.suse.com/security/cve/CVE-2022-3621.html
o https://www.suse.com/security/cve/CVE-2022-3625.html
o https://www.suse.com/security/cve/CVE-2022-3629.html
o https://www.suse.com/security/cve/CVE-2022-3640.html
o https://www.suse.com/security/cve/CVE-2022-3646.html
o https://www.suse.com/security/cve/CVE-2022-3649.html
o https://www.suse.com/security/cve/CVE-2022-39189.html
o https://www.suse.com/security/cve/CVE-2022-42703.html
o https://www.suse.com/security/cve/CVE-2022-43750.html
o https://bugzilla.suse.com/1032323
o https://bugzilla.suse.com/1065729
o https://bugzilla.suse.com/1196018
o https://bugzilla.suse.com/1198702
o https://bugzilla.suse.com/1200465
o https://bugzilla.suse.com/1200788
o https://bugzilla.suse.com/1201725
o https://bugzilla.suse.com/1202686
o https://bugzilla.suse.com/1202700
o https://bugzilla.suse.com/1203066
o https://bugzilla.suse.com/1203098
o https://bugzilla.suse.com/1203387
o https://bugzilla.suse.com/1203391
o https://bugzilla.suse.com/1203496
o https://bugzilla.suse.com/1204053
o https://bugzilla.suse.com/1204166
o https://bugzilla.suse.com/1204168
o https://bugzilla.suse.com/1204354
o https://bugzilla.suse.com/1204355
o https://bugzilla.suse.com/1204382
o https://bugzilla.suse.com/1204402
o https://bugzilla.suse.com/1204415
o https://bugzilla.suse.com/1204417
o https://bugzilla.suse.com/1204431
o https://bugzilla.suse.com/1204439
o https://bugzilla.suse.com/1204470
o https://bugzilla.suse.com/1204479
o https://bugzilla.suse.com/1204574
o https://bugzilla.suse.com/1204575
o https://bugzilla.suse.com/1204619
o https://bugzilla.suse.com/1204635
o https://bugzilla.suse.com/1204637
o https://bugzilla.suse.com/1204646
o https://bugzilla.suse.com/1204647
o https://bugzilla.suse.com/1204653
o https://bugzilla.suse.com/1204728
o https://bugzilla.suse.com/1204753
o https://bugzilla.suse.com/1204754
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=j/NF
-----END PGP SIGNATURE-----
ESB-2022.5810 - [SUSE] xen: CVSS (Max): 8.1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5810
Security update for xen
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: xen
Publisher: SUSE
Operating System: SUSE
Resolution: Patch/Upgrade
CVE Names: CVE-2022-42326 CVE-2022-42325 CVE-2022-42323
CVE-2022-42322 CVE-2022-42321 CVE-2022-42320
CVE-2022-42319 CVE-2022-42318 CVE-2022-42317
CVE-2022-42316 CVE-2022-42315 CVE-2022-42314
CVE-2022-42313 CVE-2022-42312 CVE-2022-42311
CVE-2022-42310 CVE-2022-42309 CVE-2022-33748
CVE-2022-33746 CVE-2022-33742 CVE-2022-33741
CVE-2022-33740 CVE-2022-26365 CVE-2022-26364
CVE-2022-26363 CVE-2021-28689
Original Bulletin:
https://www.suse.com/support/update/announcement/2022/suse-su-20223928-1
Comment: CVSS (Max): 8.1 CVE-2022-26364 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS Source: SUSE
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3928-1
Rating: important
References: #1185104 #1193923 #1199966 #1200762 #1203806 #1203807
#1204482 #1204485 #1204487 #1204488 #1204489 #1204490
#1204494 #1204496
Cross-References: CVE-2021-28689 CVE-2022-26365 CVE-2022-33740 CVE-2022-33741
CVE-2022-33742 CVE-2022-33746 CVE-2022-33748 CVE-2022-42309
CVE-2022-42310 CVE-2022-42311 CVE-2022-42312 CVE-2022-42313
CVE-2022-42314 CVE-2022-42315 CVE-2022-42316 CVE-2022-42317
CVE-2022-42318 CVE-2022-42319 CVE-2022-42320 CVE-2022-42321
CVE-2022-42322 CVE-2022-42323 CVE-2022-42325 CVE-2022-42326
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server for SAP 15-SP1
______________________________________________________________________________
An update that fixes 24 vulnerabilities is now available.
Description:
This update for xen fixes the following issues:
o CVE-2022-33746: Fixed DoS due to excessively long P2M pool freeing (bsc#
1203806).
o CVE-2022-33748: Fixed DoS due to race in locking (bsc#1203807).
o CVE-2021-28689: Fixed speculative vulnerabilities with bare (non-shim)
32-bit PV guests (bsc#1185104).
o CVE-2022-42311, CVE-2022-42312, CVE-2022-42313, CVE-2022-42314,
CVE-2022-42315, CVE-2022-42316, CVE-2022-42317, CVE-2022-42318: xen:
Xenstore: Guests can let xenstored run out of memory (bsc#1204482)
o CVE-2022-42309: xen: Xenstore: Guests can crash xenstored (bsc#1204485)
o CVE-2022-42310: xen: Xenstore: Guests can create orphaned Xenstore nodes
(bsc#1204487)
o CVE-2022-42319: xen: Xenstore: Guests can cause Xenstore to not free
temporary memory (bsc#1204488)
o CVE-2022-42320: xen: Xenstore: Guests can get access to Xenstore nodes of
deleted domains (bsc#1204489)
o CVE-2022-42321: xen: Xenstore: Guests can crash xenstored via exhausting
the stack (bsc#1204490)
o CVE-2022-42322,CVE-2022-42323: xen: Xenstore: cooperating guests can create
arbitrary numbers of nodes (bsc#1204494)
o CVE-2022-42325,CVE-2022-42326: xen: Xenstore: Guests can create arbitray
number of nodes via transactions (bsc#1204496)
o CVE-2022-26363,CVE-2022-26364: xen: Insufficient care with non-coherent
mappings (bsc#1199966).
o CVE-2022-26365,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742: xen: Linux
disk/nic frontends data leaks (bsc#1200762).
o xen: Frontends vulnerable to backends (bsc#1193923).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3928=1
o SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3928=1
o SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3928=1
o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3928=1
o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3928=1
o SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-3928=1
o SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. I will
inform you if it detects new updates and let you then trigger updating of
the complete cluster in a controlled way.
Package List:
o SUSE Linux Enterprise Server for SAP 15-SP1 (x86_64):
xen-4.12.4_30-150100.3.80.1
xen-debugsource-4.12.4_30-150100.3.80.1
xen-devel-4.12.4_30-150100.3.80.1
xen-libs-4.12.4_30-150100.3.80.1
xen-libs-debuginfo-4.12.4_30-150100.3.80.1
xen-tools-4.12.4_30-150100.3.80.1
xen-tools-debuginfo-4.12.4_30-150100.3.80.1
xen-tools-domU-4.12.4_30-150100.3.80.1
xen-tools-domU-debuginfo-4.12.4_30-150100.3.80.1
o SUSE Linux Enterprise Server 15-SP1-LTSS (x86_64):
xen-4.12.4_30-150100.3.80.1
xen-debugsource-4.12.4_30-150100.3.80.1
xen-devel-4.12.4_30-150100.3.80.1
xen-libs-4.12.4_30-150100.3.80.1
xen-libs-debuginfo-4.12.4_30-150100.3.80.1
xen-tools-4.12.4_30-150100.3.80.1
xen-tools-debuginfo-4.12.4_30-150100.3.80.1
xen-tools-domU-4.12.4_30-150100.3.80.1
xen-tools-domU-debuginfo-4.12.4_30-150100.3.80.1
o SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
xen-4.12.4_30-150100.3.80.1
xen-debugsource-4.12.4_30-150100.3.80.1
xen-devel-4.12.4_30-150100.3.80.1
xen-libs-4.12.4_30-150100.3.80.1
xen-libs-debuginfo-4.12.4_30-150100.3.80.1
xen-tools-4.12.4_30-150100.3.80.1
xen-tools-debuginfo-4.12.4_30-150100.3.80.1
xen-tools-domU-4.12.4_30-150100.3.80.1
xen-tools-domU-debuginfo-4.12.4_30-150100.3.80.1
o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (x86_64):
xen-4.12.4_30-150100.3.80.1
xen-debugsource-4.12.4_30-150100.3.80.1
xen-devel-4.12.4_30-150100.3.80.1
xen-libs-4.12.4_30-150100.3.80.1
xen-libs-debuginfo-4.12.4_30-150100.3.80.1
xen-tools-4.12.4_30-150100.3.80.1
xen-tools-debuginfo-4.12.4_30-150100.3.80.1
xen-tools-domU-4.12.4_30-150100.3.80.1
xen-tools-domU-debuginfo-4.12.4_30-150100.3.80.1
o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (x86_64):
xen-4.12.4_30-150100.3.80.1
xen-debugsource-4.12.4_30-150100.3.80.1
xen-devel-4.12.4_30-150100.3.80.1
xen-libs-4.12.4_30-150100.3.80.1
xen-libs-debuginfo-4.12.4_30-150100.3.80.1
xen-tools-4.12.4_30-150100.3.80.1
xen-tools-debuginfo-4.12.4_30-150100.3.80.1
xen-tools-domU-4.12.4_30-150100.3.80.1
xen-tools-domU-debuginfo-4.12.4_30-150100.3.80.1
o SUSE Enterprise Storage 6 (x86_64):
xen-4.12.4_30-150100.3.80.1
xen-debugsource-4.12.4_30-150100.3.80.1
xen-devel-4.12.4_30-150100.3.80.1
xen-libs-4.12.4_30-150100.3.80.1
xen-libs-debuginfo-4.12.4_30-150100.3.80.1
xen-tools-4.12.4_30-150100.3.80.1
xen-tools-debuginfo-4.12.4_30-150100.3.80.1
xen-tools-domU-4.12.4_30-150100.3.80.1
xen-tools-domU-debuginfo-4.12.4_30-150100.3.80.1
o SUSE CaaS Platform 4.0 (x86_64):
xen-4.12.4_30-150100.3.80.1
xen-debugsource-4.12.4_30-150100.3.80.1
xen-devel-4.12.4_30-150100.3.80.1
xen-libs-4.12.4_30-150100.3.80.1
xen-libs-debuginfo-4.12.4_30-150100.3.80.1
xen-tools-4.12.4_30-150100.3.80.1
xen-tools-debuginfo-4.12.4_30-150100.3.80.1
xen-tools-domU-4.12.4_30-150100.3.80.1
xen-tools-domU-debuginfo-4.12.4_30-150100.3.80.1
References:
o https://www.suse.com/security/cve/CVE-2021-28689.html
o https://www.suse.com/security/cve/CVE-2022-26365.html
o https://www.suse.com/security/cve/CVE-2022-33740.html
o https://www.suse.com/security/cve/CVE-2022-33741.html
o https://www.suse.com/security/cve/CVE-2022-33742.html
o https://www.suse.com/security/cve/CVE-2022-33746.html
o https://www.suse.com/security/cve/CVE-2022-33748.html
o https://www.suse.com/security/cve/CVE-2022-42309.html
o https://www.suse.com/security/cve/CVE-2022-42310.html
o https://www.suse.com/security/cve/CVE-2022-42311.html
o https://www.suse.com/security/cve/CVE-2022-42312.html
o https://www.suse.com/security/cve/CVE-2022-42313.html
o https://www.suse.com/security/cve/CVE-2022-42314.html
o https://www.suse.com/security/cve/CVE-2022-42315.html
o https://www.suse.com/security/cve/CVE-2022-42316.html
o https://www.suse.com/security/cve/CVE-2022-42317.html
o https://www.suse.com/security/cve/CVE-2022-42318.html
o https://www.suse.com/security/cve/CVE-2022-42319.html
o https://www.suse.com/security/cve/CVE-2022-42320.html
o https://www.suse.com/security/cve/CVE-2022-42321.html
o https://www.suse.com/security/cve/CVE-2022-42322.html
o https://www.suse.com/security/cve/CVE-2022-42323.html
o https://www.suse.com/security/cve/CVE-2022-42325.html
o https://www.suse.com/security/cve/CVE-2022-42326.html
o https://bugzilla.suse.com/1185104
o https://bugzilla.suse.com/1193923
o https://bugzilla.suse.com/1199966
o https://bugzilla.suse.com/1200762
o https://bugzilla.suse.com/1203806
o https://bugzilla.suse.com/1203807
o https://bugzilla.suse.com/1204482
o https://bugzilla.suse.com/1204485
o https://bugzilla.suse.com/1204487
o https://bugzilla.suse.com/1204488
o https://bugzilla.suse.com/1204489
o https://bugzilla.suse.com/1204490
o https://bugzilla.suse.com/1204494
o https://bugzilla.suse.com/1204496
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=nylf
-----END PGP SIGNATURE-----
ESB-2022.5809 - [SUSE] python3-lxml: CVSS (Max): 6.1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5809
Security update for python3-lxml
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: python3-lxml
Publisher: SUSE
Operating System: SUSE
Resolution: Patch/Upgrade
CVE Names: CVE-2021-28957
Original Bulletin:
https://www.suse.com/support/update/announcement/2022/suse-su-20223934-1
Comment: CVSS (Max): 6.1 CVE-2021-28957 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
CVSS Source: SUSE
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for python3-lxml
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3934-1
Rating: moderate
References: #1184177
Cross-References: CVE-2021-28957
Affected Products:
SUSE Linux Enterprise High Performance Computing 12
SUSE Linux Enterprise Module for Public Cloud 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP4
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server for SAP Applications 12
SUSE Linux Enterprise Server for SAP Applications 12-SP3
SUSE Linux Enterprise Server for SAP Applications 12-SP4
SUSE Linux Enterprise Server for SAP Applications 12-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for python3-lxml fixes the following issues:
- - CVE-2021-28957: Fixed XSS due to missing input sanitization for HTML5
attributes (bsc#1184177).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Module for Public Cloud 12:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-3934=1
Package List:
o SUSE Linux Enterprise Module for Public Cloud 12 (aarch64 ppc64le s390x
x86_64):
python3-lxml-3.3.5-3.15.1
o SUSE Linux Enterprise Module for Public Cloud 12 (noarch):
python3-lxml-doc-3.3.5-3.15.1
References:
o https://www.suse.com/security/cve/CVE-2021-28957.html
o https://bugzilla.suse.com/1184177
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
iQIVAwUBY23PG8kNZI30y1K9AQjXlQ/+JHImz47fnNoYSIEZ+N4lsjcnBb4dy6py
XUWjyue3BrU6gM0MMmk/zJ+lAQ7DJZdZA8aAI7e9G8wPKOFHAR/T+Fd4MdbS28iI
lAzwgVzeoRwbaRRhGNd1isMd7cs4z3JfGt0rlXNs+yJB4xmSVFQ8vN+G1GVy2Bbh
MbEcx5AjNT8x5A//3ZPzgRpRk6DT+fI6PPcJNXp3V7TG+tuidGA0Q7yvrU9AA8du
WGFtrXEln9oOuq9KgMT0YEf7zn/IRI00/FK1TmkG+poBRPTg870kpR28dvW9e+7v
W0GaEdU7glvj9wJj1ocf3d9ysB8ij6Q7p46j05ZiVH5sfEAY4dH12YShNGS6eh+g
BjdO/MV4FzO63MNamtGURNp7N7pbI5jH7iWuzUkR6TyjQWdhO4rOS/9I5L7XZa26
QyuZXsCzEqG4jt99IziRWB5z7Br4QaRcGl+wgxPo8HuXkq8NjEri8JREyTAmFoqS
04vAQDws5kjgIT3OmDu1dXr7j3gBEne56qXqoaC26ZfbD1kvwSRqj5aQBwcn0nUx
23/YkAyC9r0qxhbpErAWoS6ZNaTs14Aau+qH/dp0p6WkNw7tAoISktk+Eg2L2Zvn
F86Zm9LNtyocx/V0phbRZQ6Qrk82cFwW0chEc7k09AWxj4X49g8LKocMr2q37IJl
AuTJpVj/XoE=
=7W7p
-----END PGP SIGNATURE-----
ESB-2022.5808 - [SUSE] git: CVSS (Max): 6.3
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5808
Security update for git
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: git
Publisher: SUSE
Operating System: SUSE
Resolution: Patch/Upgrade
CVE Names: CVE-2022-39260 CVE-2022-39253
Original Bulletin:
https://www.suse.com/support/update/announcement/2022/suse-su-20223931-1
Comment: CVSS (Max): 6.3 CVE-2022-39260 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)
CVSS Source: SUSE
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for git
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3931-1
Rating: moderate
References: #1204455 #1204456
Cross-References: CVE-2022-39253 CVE-2022-39260
Affected Products:
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP4
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.2
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.2
SUSE Manager Server 4.3
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for git fixes the following issues:
- - CVE-2022-39260: Fixed overflow in split_cmdline() (bsc#1204456). -
CVE-2022-39253: Fixed dereference issue with symbolic links via the `--local`
clone mechanism (bsc#1204455).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-3931=1
o openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-3931=1
o SUSE Linux Enterprise Module for Development Tools 15-SP4:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2022-3931=1
o SUSE Linux Enterprise Module for Development Tools 15-SP3:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-3931=1
o SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3931=1
o SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-3931=1
Package List:
o openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
git-2.35.3-150300.10.18.1
git-arch-2.35.3-150300.10.18.1
git-core-2.35.3-150300.10.18.1
git-core-debuginfo-2.35.3-150300.10.18.1
git-credential-gnome-keyring-2.35.3-150300.10.18.1
git-credential-gnome-keyring-debuginfo-2.35.3-150300.10.18.1
git-credential-libsecret-2.35.3-150300.10.18.1
git-credential-libsecret-debuginfo-2.35.3-150300.10.18.1
git-cvs-2.35.3-150300.10.18.1
git-daemon-2.35.3-150300.10.18.1
git-daemon-debuginfo-2.35.3-150300.10.18.1
git-debuginfo-2.35.3-150300.10.18.1
git-debugsource-2.35.3-150300.10.18.1
git-email-2.35.3-150300.10.18.1
git-gui-2.35.3-150300.10.18.1
git-p4-2.35.3-150300.10.18.1
git-svn-2.35.3-150300.10.18.1
git-web-2.35.3-150300.10.18.1
gitk-2.35.3-150300.10.18.1
perl-Git-2.35.3-150300.10.18.1
o openSUSE Leap 15.4 (noarch):
git-doc-2.35.3-150300.10.18.1
o openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
git-2.35.3-150300.10.18.1
git-arch-2.35.3-150300.10.18.1
git-core-2.35.3-150300.10.18.1
git-core-debuginfo-2.35.3-150300.10.18.1
git-credential-gnome-keyring-2.35.3-150300.10.18.1
git-credential-gnome-keyring-debuginfo-2.35.3-150300.10.18.1
git-credential-libsecret-2.35.3-150300.10.18.1
git-credential-libsecret-debuginfo-2.35.3-150300.10.18.1
git-cvs-2.35.3-150300.10.18.1
git-daemon-2.35.3-150300.10.18.1
git-daemon-debuginfo-2.35.3-150300.10.18.1
git-debuginfo-2.35.3-150300.10.18.1
git-debugsource-2.35.3-150300.10.18.1
git-email-2.35.3-150300.10.18.1
git-gui-2.35.3-150300.10.18.1
git-p4-2.35.3-150300.10.18.1
git-svn-2.35.3-150300.10.18.1
git-web-2.35.3-150300.10.18.1
gitk-2.35.3-150300.10.18.1
perl-Git-2.35.3-150300.10.18.1
o openSUSE Leap 15.3 (noarch):
git-doc-2.35.3-150300.10.18.1
o SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le
s390x x86_64):
git-2.35.3-150300.10.18.1
git-arch-2.35.3-150300.10.18.1
git-cvs-2.35.3-150300.10.18.1
git-daemon-2.35.3-150300.10.18.1
git-daemon-debuginfo-2.35.3-150300.10.18.1
git-debuginfo-2.35.3-150300.10.18.1
git-debugsource-2.35.3-150300.10.18.1
git-email-2.35.3-150300.10.18.1
git-gui-2.35.3-150300.10.18.1
git-svn-2.35.3-150300.10.18.1
git-web-2.35.3-150300.10.18.1
gitk-2.35.3-150300.10.18.1
perl-Git-2.35.3-150300.10.18.1
o SUSE Linux Enterprise Module for Development Tools 15-SP4 (noarch):
git-doc-2.35.3-150300.10.18.1
o SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le
s390x x86_64):
git-2.35.3-150300.10.18.1
git-arch-2.35.3-150300.10.18.1
git-cvs-2.35.3-150300.10.18.1
git-daemon-2.35.3-150300.10.18.1
git-daemon-debuginfo-2.35.3-150300.10.18.1
git-debuginfo-2.35.3-150300.10.18.1
git-debugsource-2.35.3-150300.10.18.1
git-email-2.35.3-150300.10.18.1
git-gui-2.35.3-150300.10.18.1
git-svn-2.35.3-150300.10.18.1
git-web-2.35.3-150300.10.18.1
gitk-2.35.3-150300.10.18.1
o SUSE Linux Enterprise Module for Development Tools 15-SP3 (noarch):
git-doc-2.35.3-150300.10.18.1
o SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x
x86_64):
git-core-2.35.3-150300.10.18.1
git-core-debuginfo-2.35.3-150300.10.18.1
git-debuginfo-2.35.3-150300.10.18.1
git-debugsource-2.35.3-150300.10.18.1
o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x
x86_64):
git-core-2.35.3-150300.10.18.1
git-core-debuginfo-2.35.3-150300.10.18.1
git-debuginfo-2.35.3-150300.10.18.1
git-debugsource-2.35.3-150300.10.18.1
perl-Git-2.35.3-150300.10.18.1
References:
o https://www.suse.com/security/cve/CVE-2022-39253.html
o https://www.suse.com/security/cve/CVE-2022-39260.html
o https://bugzilla.suse.com/1204455
o https://bugzilla.suse.com/1204456
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
iQIVAwUBY23PE8kNZI30y1K9AQhmxxAAt1rwTJoHfOhWzIUH8cfH4Jv2TPviLz91
vD9ffF13TIu3onkjsKamSVAOTTOvUZo1PK2HaI88tvjn4RMmfbRq1Yzd4XYx9tpo
fGyVAxHSfmZj2MCn3nEZNy2ateZkFRsr0Y2YMWr0+6TmA2ZeDpInFkziw47Y+qg2
gvmI7d330Fj0EaFQ9BKLeriQPYm0Qf+nuJuw4QuNvu0druse/I1flqGsXci/dVfZ
fCt1Fffq52Q3zQambBkc3vg8YslgJJxc6IEYpNoFCkSwq3x7UcgKGqEcfyT8JC1R
6vMBICpnMgX4AixIyw72tqX/kCBYB4OHkH21RRQO4Hm1TcCXp2iNegB/P5MpJWzS
cXan53klHh8C/ygGmDIle34siqzqlxmNS+Yd8PfEJd41wsex5uXyaYoOGq1bxCIZ
zGSDuq6oKF4ao0bSJaI1J1ehCVrlP2PXP6THZolvkKoIoA14bmkJ7wxQXHp8kpou
OfCOr4BFH34QG4HY7SkQkOJi1VmXkBJvlkc/N8+tPcvKSjeEOUddBxM3HQW4sy6K
X+xY8GUYgjZ0OwFdNVRVBleFf/bjmCP+2I7kWrWLw2yo+L4ByiKUjSk61Aoyudn6
Qp023qUl5YVuWgclpf8BMb97Juys/aEkQX6HCt5wzPkiyeJaOD+LUiwsDqijsSU1
qLeQiQ3dGwk=
=v28v
-----END PGP SIGNATURE-----
ESB-2022.5807 - [SUSE] python: CVSS (Max): 7.4
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5807
Security update for python
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: python
Publisher: SUSE
Operating System: SUSE
Resolution: Patch/Upgrade
CVE Names: CVE-2021-28861
Original Bulletin:
https://www.suse.com/support/update/announcement/2022/suse-su-20223940-1
Comment: CVSS (Max): 7.4 CVE-2021-28861 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N)
CVSS Source: SUSE
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for python
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3940-1
Rating: important
References: #1202624
Cross-References: CVE-2021-28861
Affected Products:
SUSE Linux Enterprise Server 12-SP2-BCL
SUSE Linux Enterprise Server 12-SP3-BCL
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for python fixes the following issues:
o CVE-2021-28861: Fixed an open redirection vulnerability in the HTTP server
when an URI path starts with // BaseHTTPServer (bsc#1202624).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Server 12-SP3-BCL:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2022-3940=1
o SUSE Linux Enterprise Server 12-SP2-BCL:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-3940=1
Package List:
o SUSE Linux Enterprise Server 12-SP3-BCL (noarch):
python-doc-2.7.18-28.90.1
python-doc-pdf-2.7.18-28.90.1
o SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):
libpython2_7-1_0-2.7.18-28.90.1
libpython2_7-1_0-32bit-2.7.18-28.90.1
libpython2_7-1_0-debuginfo-2.7.18-28.90.1
libpython2_7-1_0-debuginfo-32bit-2.7.18-28.90.1
python-2.7.18-28.90.1
python-32bit-2.7.18-28.90.1
python-base-2.7.18-28.90.1
python-base-32bit-2.7.18-28.90.1
python-base-debuginfo-2.7.18-28.90.1
python-base-debuginfo-32bit-2.7.18-28.90.1
python-base-debugsource-2.7.18-28.90.1
python-curses-2.7.18-28.90.1
python-curses-debuginfo-2.7.18-28.90.1
python-debuginfo-2.7.18-28.90.1
python-debuginfo-32bit-2.7.18-28.90.1
python-debugsource-2.7.18-28.90.1
python-demo-2.7.18-28.90.1
python-devel-2.7.18-28.90.1
python-gdbm-2.7.18-28.90.1
python-gdbm-debuginfo-2.7.18-28.90.1
python-idle-2.7.18-28.90.1
python-tk-2.7.18-28.90.1
python-tk-debuginfo-2.7.18-28.90.1
python-xml-2.7.18-28.90.1
python-xml-debuginfo-2.7.18-28.90.1
o SUSE Linux Enterprise Server 12-SP2-BCL (noarch):
python-doc-2.7.18-28.90.1
python-doc-pdf-2.7.18-28.90.1
o SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
libpython2_7-1_0-2.7.18-28.90.1
libpython2_7-1_0-32bit-2.7.18-28.90.1
libpython2_7-1_0-debuginfo-2.7.18-28.90.1
libpython2_7-1_0-debuginfo-32bit-2.7.18-28.90.1
python-2.7.18-28.90.1
python-32bit-2.7.18-28.90.1
python-base-2.7.18-28.90.1
python-base-32bit-2.7.18-28.90.1
python-base-debuginfo-2.7.18-28.90.1
python-base-debuginfo-32bit-2.7.18-28.90.1
python-base-debugsource-2.7.18-28.90.1
python-curses-2.7.18-28.90.1
python-curses-debuginfo-2.7.18-28.90.1
python-debuginfo-2.7.18-28.90.1
python-debuginfo-32bit-2.7.18-28.90.1
python-debugsource-2.7.18-28.90.1
python-demo-2.7.18-28.90.1
python-gdbm-2.7.18-28.90.1
python-gdbm-debuginfo-2.7.18-28.90.1
python-idle-2.7.18-28.90.1
python-tk-2.7.18-28.90.1
python-tk-debuginfo-2.7.18-28.90.1
python-xml-2.7.18-28.90.1
python-xml-debuginfo-2.7.18-28.90.1
References:
o https://www.suse.com/security/cve/CVE-2021-28861.html
o https://bugzilla.suse.com/1202624
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=ZhR0
-----END PGP SIGNATURE-----
ESB-2022.5806 - [Android] Intel Support Android App: CVSS (Max): 5.9
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5806
Intel Support Android App Advisory
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Intel Support Android App
Publisher: Intel
Operating System: Android
Resolution: Patch/Upgrade
CVE Names: CVE-2022-36367 CVE-2022-30691
Original Bulletin:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00740.html
Comment: CVSS (Max): 5.9 CVE-2022-30691 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H)
CVSS Source: Intel
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
Intel ID: INTEL-SA-00740
Advisory Category: Software
Impact of vulnerability : Escalation of Privilege, Information Disclosure
Severity rating : MEDIUM
Original release: 11/08/2022
Last revised: 11/08/2022
Summary:
Potential security vulnerabilities in the Intel Support Android application may
allow escalation of privilege or information disclosure. Intel is releasing
software updates to mitigate these potential vulnerabilities.
Vulnerability Details:
CVEID: CVE-2022-30691
Description: Uncontrolled resource consumption in the Intel(R) Support Android
application before version 22.02.28 may allow an authenticated user to
potentially enable denial of service via local access.
CVSS Base Score: 5.9 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H
CVEID: CVE-2022-36367
Description: Incorrect default permissions in the Intel(R) Support Android
application before version v22.02.28 may allow a privileged user to potentially
enable information disclosure via local access.
CVSS Base Score: 4.4 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Affected Products:
Intel Support Android application before version v22.02.28.
Recommendations:
Intel recommends updating the Intel Support Android application to version
v22.02.28 or later.
Updates are available for download at this location:
https://play.google.com/store/apps/details?id=com.intel.ark
Acknowledgements:
Intel would like to thank Sheikh Rishad for reporting these issues.
Intel, and nearly the entire technology industry, follows a disclosure practice
called Coordinated Disclosure, under which a cybersecurity vulnerability is
generally publicly disclosed only after mitigations are available.
Revision History
Revision Date Description
1.0 11/08/2022 Initial Release
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=W+C2
-----END PGP SIGNATURE-----
ESB-2022.5805 - [Win] Intel NUC Kit Wireless Adapter: CVSS (Max): 6.7
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5805
Intel NUC Kit Wireless Adapter Advisory
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Intel NUC Kit Wireless Adapter
Publisher: Intel
Operating System: Windows
Resolution: Patch/Upgrade
CVE Names: CVE-2022-36400 CVE-2022-36384 CVE-2022-36380
CVE-2022-36377
Original Bulletin:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html
Comment: CVSS (Max): 6.7 CVE-2022-36400 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)
CVSS Source: Intel
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
Intel ID: INTEL-SA-00747
Advisory Category: Software
Impact of vulnerability : Escalation of Privilege
Severity rating : MEDIUM
Original release: 11/08/2022
Last revised: 11/08/2022
Summary:
Potential security vulnerabilities in some Intel NUC Kit Wireless Adapter
driver installer software may allow escalation of privilege. Intel is releasing
software updates to mitigate these potential vulnerabilities.
Vulnerability Details:
CVEID: CVE-2022-36400
Description: Path traversal in the installer software for some Intel(r) NUC Kit
Wireless Adapter drivers for Windows 10 before version 22.40 may allow an
authenticated user to potentially enable escalation of privilege via local
access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CVEID: CVE-2022-36384
Description: Unquoted search path in the installer software for some Intel(r)
NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow
an authenticated user to potentially enable escalation of privilege via local
access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CVEID: CVE-2022-36380
Description: Uncontrolled search path in the installer software for some Intel
(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may
allow an authenticated user to potentially enable escalation of privilege via
local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CVEID: CVE-2022-36377
Description: Incorrect default permissions in the installer software for some
Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40
may allow an authenticated user to potentially enable escalation of privilege
via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Affected Products:
Intel NUC 8 Rugged Kit - NUC8CCHKR.
Intel NUC Kits - NUC5PPYH, NUC5PGYH, NUC6CAYH, NUC6CAYS.
Intel NUC Board - NUC8CCHB.
Recommendations:
Intel recommends updating Intel NUC Kit Wireless Adapter driver installer
software to version 22.40.0 or later.
Updates are available for download at this location:
https://www.intel.com/content/www/us/en/download/716640/
intel-wireless-technology-based-driver-for-windows-10-windows-11-for-intel-nuc-products.html
Acknowledgements:
Intel would like to thank Sahnoun (CVE-2022-36380 & CVE-2022-36400), Mazoz
Ocher (CVE-2022-36377 & CVE-2022-36380) for reporting these issues.
Intel, and nearly the entire technology industry, follows a disclosure practice
called Coordinated Disclosure, under which a cybersecurity vulnerability is
generally publicly disclosed only after mitigations are available.
Revision History
Revision Date Description
1.0 11/08/2022 Initial Release
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=B50A
-----END PGP SIGNATURE-----
ESB-2022.5804 - [Win][UNIX/Linux] Intel NUC BIOS firmware: CVSS (Max):7.8
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5804
Intel NUC Firmware Advisory
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Intel NUC BIOS firmware
Publisher: Intel
Operating System: Windows
UNIX variants (UNIX, Linux, OSX)
Resolution: Patch/Upgrade
CVE Names: CVE-2022-38099 CVE-2022-37345 CVE-2022-37334
CVE-2022-36789 CVE-2022-36370 CVE-2022-36349
CVE-2022-35276 CVE-2022-34152 CVE-2022-33176
CVE-2022-32569 CVE-2022-26124 CVE-2022-21794
CVE-2021-33164
Original Bulletin:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html
Comment: CVSS (Max): 8.2 CVE-2022-33164 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)
CVSS Source: Intel
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
Intel ID: INTEL-SA-00752
Advisory Category: Firmware
Impact of vulnerability : Escalation of Privilege, Denial of Service
Severity rating : HIGH
Original release: 11/08/2022
Last revised: 11/08/2022
Summary:
Potential security vulnerabilities in some Intel NUC BIOS firmware may allow
escalation of privilege or denial of service. Intel is releasing firmware
updates to mitigate these potential vulnerabilities.
Vulnerability Details:
CVEID: CVE-2021-33164
Description: Improper access control in BIOS firmware for some Intel(R) NUCs
before version INWHL357.0046 may allow a privileged user to potentially enable
escalation of privilege via local access.
CVSS Base Score: 8.2 High
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVEID: CVE-2022-33176
Description: Improper input validation in BIOS firmware for some Intel(R) NUC
11 Performance kits and Intel(R) NUC 11 Performance Mini PCs before version
PATGL357.0042 may allow a privileged user to potentially enable escalation of
privilege via local access.
CVSS Base Score: 8.2 High
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVEID: CVE-2022-37345
Description: Improper authentication in BIOS firmware for some Intel(R) NUC
Kits before version RY0386 may allow an authenticated user to potentially
enable escalation of privilege via local access.
CVSS Base Score: 7.8 High
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
CVEID: CVE-2022-21794
Description: Improper authentication in BIOS firmware for some Intel(R) NUC
Boards, Intel(R) NUC Business, Intel(R) NUC Enthusiast, Intel(R) NUC Kits
before version HN0067 may allow a privileged user to potentially enable
escalation of privilege via local access.
CVSS Base Score: 7.7 High
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
CVEID: CVE-2022-34152
Description: Improper input validation in BIOS firmware for some Intel(R) NUC
Boards, Intel(R) NUC Kits before version TY0070 may allow a privileged user to
potentially enable escalation of privilege via local access.
CVSS Base Score: 7.7 High
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
CVEID: CVE-2022-32569
Description: Improper buffer restrictions in BIOS firmware for some Intel(R)
NUC M15 Laptop Kits before version BCTGL357.0074 may allow a privileged user to
potentially enable escalation of privilege via local access.
CVSS Base Score: 7.5 High
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVEID: CVE-2022-36789
Description: Improper access control in BIOS firmware for some Intel(R) NUC 10
Performance Kits and Intel(R) NUC 10 Performance Mini PCs before version
FNCML357.0053 may allow a privileged user to potentially enable escalation of
privilege via local access.
CVSS Base Score: 7.5 High
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVEID: CVE-2022-35276
Description: Improper access control in BIOS firmware for some Intel(R) NUC 8
Compute Elements before version CBWHL357.0096 may allow a privileged user to
potentially enable escalation of privilege via local access.
CVSS Base Score: 7.5 High
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVEID: CVE-2022-38099
Description: Improper input validation in BIOS firmware for some Intel(R) NUC
11 Compute Elements before version EBTGL357.0065 may allow a privileged user to
potentially enable escalation of privilege via local access.
CVSS Base Score: 7.5 High
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVEID: CVE-2022-26124
Description: Improper buffer restrictions in BIOS firmware for some Intel(R)
NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R)
NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to
potentially enable escalation of privilege via local access.
CVSS Base Score: 7.5 High
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVEID: CVE-2022-36370
Description: Improper authentication in BIOS firmware for some Intel(R) NUC
Boards and Intel(R) NUC Kits before version MYi30060 may allow a privileged
user to potentially enable escalation of privilege via local access.
CVSS Base Score: 7.5 High
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVEID: CVE-2022-37334
Description: Improper initialization in BIOS firmware for some Intel(R) NUC 11
Pro Kits and Intel(R) NUC 11 Pro Boards before version TNTGL357.0064 may allow
an authenticated user to potentially enable escalation of privilege via local
access.
CVSS Base Score: 7.0 High
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
CVEID: CVE-2022-36349
Description: Insecure default variable initialization in BIOS firmware for some
Intel(R) NUC Boards and Intel(R) NUC Kits before version MYi30060 may allow an
authenticated user to potentially enable denial of service via local access.
CVSS Base Score: 5.2 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L
Affected Products:
+------------------------------------+-----------------------------+------------------------------+
|Product |Download Link |CVE ID |
+------------------------------------+-----------------------------+------------------------------+
|Intel NUC Mini PC NUC8i7INH and |INWHL357.0046 |CVE-2021-33164 |
|NUC8i5INH. | | |
+------------------------------------+-----------------------------+------------------------------+
|Intel NUC 11 Performance kit - |BIOS Update [PATGL357] |CVE-2022-33176 |
|NUC11PAHi70Z, NUC11PAHi50Z, | | |
|NUC11PAHi30Z, NUC11PAHi3, | | |
|NUC11PAHi5, NUC11PAHi7, NUC11PAKi3, | | |
|NUC11PAKi5, NUC11PAKi7. | | |
| | | |
|Intel NUC 11 Performance Mini PC - | | |
|NUC11PAQi50WA, NUC11PAQi70QA. | | |
+------------------------------------+-----------------------------+------------------------------+
|Intel NUC Kit - NUC5i3RYH, |BIOS Update [RYBDWi35] |CVE-2022-37345 |
|NUC5i7RYH, NUC5i5RYK, NUC5i5RYH, | | |
|NUC5i3RYK, NUC5i5RYHS, NUC5i3RYHS, | | |
|NUC5i3RYHSN. | | |
+------------------------------------+-----------------------------+------------------------------+
|Intel NUC Kit - NUC8i7HNK, |BIOS Update [HNKBLi70] |CVE-2022-21794 |
|NUC8i7HVK. | | |
| | | |
|Intel NUC 8 Enthusiast - | | |
|NUC8i7HVKVA, NUC8i7HVKVAW. | | |
| | | |
|Intel NUC 8 Business - NUC8i7HNKQC. | | |
+------------------------------------+-----------------------------+------------------------------+
|Intel NUC Kit - DE3815TYKHE. |BIOS Update [TYBYT10H] |CVE-2022-34152 |
| | | |
|Intel NUC Board - DE3815TYBE. | | |
+------------------------------------+-----------------------------+------------------------------+
|Intel NUC M15 Laptop Kit |BIOS Update for the Intel NUC|CVE-2022-32569 |
| |M15 Laptop Kit | |
+------------------------------------+-----------------------------+------------------------------+
|Intel NUC 10 Performance kit - |BIOS Update [FNCML357] |CVE-2022-36789 |
|NUC10i7FNHN, NUC10i5FNKN, | | |
|NUC10i5FNHN, NUC10i7FNKN, | | |
|NUC10i3FNHN, NUC10i3FNKN. | | |
| | | |
|Intel NUC 10 Performance Mini PC - | | |
|NUC10i5FNHJA, NUC10i3FNHF, | | |
|NUC10i7FNKPA, NUC10i5FNHCA, | | |
|NUC10i3FNHFA, NUC10i5FNHJ, | | |
|NUC10i7FNHC, NUC10i7FNHJA, | | |
|NUC10i3FNHJA, NUC10i3FNK, | | |
|NUC10i7FNHAA, NUC10i5FNH, | | |
|NUC10i5FNK, NUC10i7FNH, NUC10i5FNHF,| | |
|NUC10i5FNKPA, NUC10i3FNH, | | |
|NUC10i7FNK, NUC10i7FNKP, | | |
|NUC10i5FNKP. | | |
+------------------------------------+-----------------------------+------------------------------+
|Intel NUC 8 Compute Element - |BIOS Update [CBWHL357] |CVE-2022-35276 |
|CM8i7CB, CM8i3CB, CM8CCB, CM8i5CB, | | |
|CM8PCB. | | |
+------------------------------------+-----------------------------+------------------------------+
|Intel NUC 8 Rugged Kit NUC8CCHKRN, |BIOS Update [CHAPLCEL] |CVE-2022-26124 |
|NUC8CCHKR. | | |
| | | |
|Intel NUC 8 Rugged Board - | | |
|NUC8CCHBN. | | |
| | | |
|Intel NUC Board - NUC8CCHB. | | |
+------------------------------------+-----------------------------+------------------------------+
|Intel NUC Board - NUC5i3MYBE. |BIOS Update [MYBDWi30] |CVE-2022-36370 |
| | | |
|Intel NUC Kit - NUC5i3MYHE. | | |
+------------------------------------+-----------------------------+------------------------------+
|Intel NUC 11 Pro Kit - NUC11TNHi70Z,|BIOS Update [TNTGL357] |CVE-2022-37334 |
|NUC11TNKi70Z, NUC11TNKi30Z, | | |
|NUC11TNHi30Z, NUC11TNKi50Z, | | |
|NUC11TNHi50Z, NUC11TNBi30Z, | | |
|NUC11TNBi50Z, NUC11TNBi70Z, | | |
|NUC11TNHi3, NUC11TNHi5. | | |
+------------------------------------+-----------------------------+------------------------------+
|Intel NUC Board - NUC5i3MYBE. |BIOS Update [MYBDWi30] |CVE-2022-36349 |
| | | |
|Intel NUC Kit - NUC5i3MYHE. | | |
+------------------------------------+-----------------------------+------------------------------+
Recommendations:
Intel recommends updating the affected Intel NUC BIOS firmware to the latest
version (see provided table above).
Acknowledgements:
The following issues were found internally by Intel employees; CVE-2021-33164
and CVE-2022-37334. Intel would like to thank Benny Zeltser, Yehonatan Lusky
(CVE-2021-33164) and Brent Holtsclaw (CVE-2022-37334).
Intel would like to thank Yngweijw (Jiawei Yin) (CVE-2022-33176,
CVE-2022-37345, CVE-2022-21794, CVE-2022-34152, CVE-2022-36789, CVE-2022-35276,
CVE-2022-36370), the BINARLY efiXplorer team (CVE-2022-32569), Dmitry Frolov
(CVE-2022-26124, CVE-2022-38099) and the TCG Vulnerability Response Team
(CVE-2022-36349).
Intel, and nearly the entire technology industry, follows a disclosure practice
called Coordinated Disclosure, under which a cybersecurity vulnerability is
generally publicly disclosed only after mitigations are available.
Revision History
Revision Date Description
1.0 11/08/2022 Initial Release
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=u5DQ
-----END PGP SIGNATURE-----
ESB-2022.5803 - [Appliance] Siemens Parasolid: CVSS (Max): 7.8
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2022.5803
Advisory (icsa-22-314-01) Siemens Parasolid
11 November 2022
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Siemens Parasolid
Publisher: ICS-CERT
Operating System: Network Appliance
Resolution: Patch/Upgrade
CVE Names: CVE-2022-43397 CVE-2022-39157
Original Bulletin:
https://us-cert.cisa.gov/ics/advisories/icsa-22-314-01
Comment: CVSS (Max): 7.8 CVE-2022-39157 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVSS Source: ICS-CERT
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
ICS Advisory (ICSA-22-314-01)
Siemens Parasolid
Original release date: November 10, 2022
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided
"as is" for informational purposes only. The Department of Homeland Security
(DHS) does not provide any warranties of any kind regarding any information
contained within. DHS does not endorse any commercial product or service,
referenced in this product or otherwise. Further dissemination of this product
is governed by the Traffic Light Protocol (TLP) marking in the header. For more
information about TLP, see https://us-cert.cisa.gov/tlp/ .
1. EXECUTIVE SUMMARY.
o CVSS v3 7.8
o ATTENTION: Low attack complexity
o Vendor: Siemens
o Equipment: Parasolid
o Vulnerabilities: Out-of-bounds Read, Out-of-bounds Write
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to
execute code in the context of the current process.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports these vulnerabilities affect the following Parasolid 3D
geometric modeling tools:
o Parasolid V34.0: versions prior to V34.0.252
o Parasolid V34.0: versions prior to V34.0.254
o Parasolid V34.1: versions prior to V34.1.242
o Parasolid V34.1: versions prior to V34.1.244
o Parasolid V35.0: versions prior to V35.0.184
o Parasolid V35.0: versions prior to V35.0.170
3.2 VULNERABILITY OVERVIEW
3.2.1 OUT-OF-BOUNDS READ CWE-125
Siemens Parasolid contains an out-of-bounds read past the end of an allocated
structure while parsing specially crafted X_T files. This could allow an
attacker to execute code in the context of the current process.
CVE-2022-39157 has been assigned to this vulnerability. A CVSS v3 base score of
7.8 has been calculated; the CVSS vector string is ( CVSS:3.1/AV:L/AC:L/PR:N/
UI:R/S:U/C:H/I:H/A:H ).
3.2.2 OUT-OF-BOUNDS WRITE CWE-787
Siemens Parasolid contains an out-of-bounds write past the end of an allocated
buffer while parsing specially crafted X_T files. This could allow an attacker
to execute code in the context of the current process.
CVE-2022-43397 has been assigned to this vulnerability. A CVSS v3 base score of
7.8 has been calculated; the CVSS vector string is ( CVSS:3.1/AV:L/AC:L/PR:N/
UI:R/S:U/C:H/I:H/A:H ).
3.3 BACKGROUND
o CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
o COUNTRIES/AREAS DEPLOYED: Worldwide
o COMPANY HEADQUARTERS LOCATION: Germany
3.4 RESEARCHER
An anonymous researcher working with Trend Micro Zero Day Initiative reported
these vulnerabilities to Siemens.
4. MITIGATIONS
Siemens has released updates for the affected products and recommends updating
to the latest versions:
o Parasolid V34.0: Update to V34.0.252 or later version.
o Parasolid V34.0: Update to V34.0.254 or later version.
o Parasolid V34.1: Update to V34.1.242 or later version.
o Parasolid V34.1: Update to V34.1.244 or later version.
o Parasolid V35.0: Update to V35.0.184 or later version.
o Parasolid V35.0: Update to V35.0.170 or later version.
Siemens has identified the following specific workaround and mitigation
customers can apply to reduce the risk:
o Do not open untrusted X_T files in Parasolid.
As a general security measure, Siemens recommends protecting network access to
devices with appropriate mechanisms. In order to operate the devices in a
protected IT environment, Siemens recommends configuring the environment
according to Siemens' operational guidelines for industrial security and to
follow the recommendations in the product manuals.
Siemens also provides additional information on industrial security on their
website . For more information on security vulnerabilities in Siemens'
products, users should contact Siemens .
For more information, see the associated Siemens security advisory SSA-853037
in HTML or CSAF formats.
CISA recommends users take defensive measures to minimize the risk of
exploitation of these vulnerabilities. CISA reminds organizations to perform
proper impact analysis and risk assessment prior to deploying defensive
measures.
CISA also provides a section for control systems security recommended practices
on the ICS webpage at cisa.gov/ics . Several CISA products detailing cyber
defense best practices are available for reading and download, including
Improving Industrial Control Systems Cybersecurity with Defense-in-Depth
Strategies.
Additional mitigation guidance and recommended practices are publicly available
on the ICS webpage at cisa.gov/ics in the technical information paper,
ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation
Strategies .
Organizations observing suspected malicious activity should follow established
internal procedures and report findings to CISA for tracking and correlation
against other incidents.
CISA also recommends users take the following measures to protect themselves
from social engineering attacks:
o Do not click web links or open attachments in unsolicited email messages.
o Refer to Recognizing and Avoiding Email Scams for more information on
avoiding email scams.
o Refer to Avoiding Social Engineering and Phishing Attacks for more
information on social engineering attacks.
No known public exploits specifically target these vulnerabilities. These
vulnerabilities are not exploitable remotely. These vulnerabilities have a low
attack complexity
For any questions related to this report, please contact the CISA at:
Email: CISAservicedesk@cisa.dhs.gov
Toll Free: 1-888-282-0870
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=IEHe
-----END PGP SIGNATURE-----