AusCERT - Security Bulletins

Subscribe to AusCERT - Security Bulletins hírcsatorna
Latest published security bulletins. See https://www.auscert.org.au/rss/ for feed information.
Frissítve: 2 óra 41 perc
2022. november 11.

ESB-2022.5822 - [Debian] libjettison-java: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5822 libjettison-java security update 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: libjettison-java Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2022-40149 Original Bulletin: https://lists.debian.org/debian-lts-announce/2022/11/msg00011.html Comment: CVSS (Max): 7.5 CVE-2022-40149 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3184-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Markus Koschany November 10, 2022 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : libjettison-java Version : 1.4.0-1+deb10u1 CVE ID : CVE-2022-40149 Debian Bug : 1022554 It was discovered that libjettison-java, a collection of StAX parsers and writers for JSON, was vulnerable to a denial-of-service attack, if the attacker provided untrusted XML or JSON data. For Debian 10 buster, this problem has been fixed in version 1.4.0-1+deb10u1. We recommend that you upgrade your libjettison-java packages. For the detailed security status of libjettison-java please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libjettison-java Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQKTBAABCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmNs2qNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeQEgRAAsKFwngLcYpKhR4c+D2wMaHNNMxObtP3NAR0jetfRzxRtsIGDULjjB+Yn uHZfg8RrtcO1M8HNo0N1k77CWPUbS4vzBCk6+Q8na9GslG3mi3Z452BvaEzONrb5 wXHKCDj/yx/jHtqw1QyiLQTvcUQywrjooaFkAupBkVcPm4Yqi/C2YuFjCMJkL3Kp yYoEX1IfzU3pvYhJ/T3JQcet9Pcxtv62RcBoCQGKvW6aIbSVljCtrLGQ6LsHERNQ 01Lr9u8agVpi3p6hKtetz+bS/gFZI3hjUMilAUR30uiA2hOGwn09ZuP6+VPftBSn MFqoAWQ3ErSbeg3FAmgADvGz+phaolo0wchGh8ijywn82j5ZEfgosveB65tP2yAE q0IWaLHbB4WsTzZdloA54WjwkMvIt+Gwuq33TiYC3J5paUuAu9IBV2BNT3znq7Yh CeSuh/kEoeHenhFzPG14xsL6Z40rM7EcSGqU/AXsECCn8ZZfpueqVHLwiUlfezTq 4jM9d52QBvOKIEjeD+iPKw+Uy3TEW6l+4Uju+/FJpijIOgyM3iE7wz9b0CRAk133 YvIMtttp2pQeaDGONn1q2/wK03HxQdRxG4/U2RWHztUE6RhZWKkkcOA1Ia9EuFzX GhOhOg4FN9pfkAevCmhRfm1GV05TFqUlC7smOMDTluGX5o5mRQs= =mkws - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23UWskNZI30y1K9AQgBPQ//eXdoW8VZo+Tlhg/oej/9BcOSozkdLwUX G+Qqr038D/a3BvqTcL77s2uTPziPVD2wNTv4aQtrpv8ffVuivf3h2+iCvsd89WuE fkLbcNIAYLa6VQbMVH44YwAKxu5fuKB5AStVHx+66wuJ5FMbKtjIOHZNNghslu6t kd3u1C2gzNGxQlbiJqZgAZFOT1CFGbFYZvvTpw3ysGOdx7nOkk948sfuAu055agl gDDXrz5I3i8hdJh3+3a6gCLSDUG4H9mpdT+XBUOr8NkWXTiyq6v5bhzGQvrzOOhO 827Y/N9n4pehw+VcbFg6Z+BkNpfeduJDKghrO9tFOxFWqxGjVMTVWgpRX51yx5vO 6VgGgP1cGfBXsj2MN0E23mFDJJs8La3DXYl/Rv5EYqRE9lPb7uTek/+MFXOoOV4h eAL+Myfsw4gBmxkLRExXXqIxQeM3Pmw/GgBCBl913HJxW64Y+7IrBeOTibCyJ7jx JsnbKBXoY8C+rE9Dqmens76A6GxapKrkNOJO182X72kfi4F17DZfpL3b5fmNAHho nfC2Hl2AWXcQiKcHNntey9QjAgnk+0xMS804iFPV6nMKuCgqyJ7UNMS3qBpfLA6q JevcfGWtXJJ3iEVSAK+fqPOKqTcU73tHDGqCiKCbY8rfjxuc/TRHqv+Rh6AD8ytl 1f46G0Xr0v0= =CADq -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5821 - [Ubuntu] Firefox: CVSS (Max): None

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5821 USN-5709-2: Firefox vulnerabilities 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Firefox Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2022-42932 CVE-2022-42931 CVE-2022-42930 CVE-2022-42929 CVE-2022-42928 CVE-2022-42927 Original Bulletin: https://ubuntu.com/security/notices/USN-5709-2 Comment: CVSS (Max): None available when published - --------------------------BEGIN INCLUDED TEXT-------------------- USN-5709-2: Firefox vulnerabilities 10 November 2022 USN-5709-1 introduced minor regressions in Firefox Releases o Ubuntu 20.04 LTS o Ubuntu 18.04 LTS Packages o firefox - Mozilla Open Source web browser Details USN-5709-1 fixed vulnerabilities in Firefox. The update introduced several minor regressions. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. ( CVE-2022-42927 , CVE-2022-42928 , CVE-2022-42929 , CVE-2022-42930 , CVE-2022-42932 ) It was discovered that Firefox saved usernames to a plaintext file. A local user could potentially exploit this to obtain sensitive information. ( CVE-2022-42931 ) Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 o firefox - 106.0.5+build1-0ubuntu0.20.04.1 Ubuntu 18.04 o firefox - 106.0.5+build1-0ubuntu0.18.04.1 After a standard system update you need to restart Firefox to make all the necessary changes. References o https://launchpad.net/bugs/1996178 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23UMskNZI30y1K9AQh8Jw/+L5QHOPLaZ9v7bvwZM9sq2mzgb6lWQEec l6PsmMlXN33+CAA293ZS/YWzh1qneD7imcah904Kn7i5SjDj7Sz8B86R3igc6Kju EoHgdw7JsbbWUlF6Ee2rXLCA/YEEJZkPmP4VI1863PCw4tkOnqgnLSAH+baydDYi uxh9Er3BnVuPVFwA7MVZLAeIbWVJg0IhJ/N5IENVVF3vh73ykgxYGQX0HlyMfGFy 7FmzDiwUiIwFOUrTL9PVNJiBr1noHfLMZz6e0r72OWuaCEBdtH2QDPs0DApdmkLU dR6f4fILj1sSzsux5Xm5fxtlpxf6BovrQdkGUpPE5JZV9gFsiuWDPd0QFOi8u/vc 6VKHHofmDNYENURkhx0EHRMkg+cL0Z3KtwEOK/V+uJv2zeO11sdnCle+CK1A37Sl b3UoNeKYGycqtyPZMNV2OwZOOhDEp5Pz0xGQ7KFwvoOng66EGSLsqXJgAItF6Cjx 2pImh/XSoA5q3n0RqwXWUyqJxlFk+zmAEJyrjnP5jTkdkUpmenOUqNTBnmSdfvIa YJwC6Vdgkq4TGW4orIXT1cmV+TPRC1du8OO+dZhnnNvG3m9SxUQ04xDoK9BVqWy9 XKzt08afFMDaegMCJVCaDO/yRAUBrLHVT56DDKCPNIEAOAMtrCAS0TLHFwycd3It vG64S3HL3C8= =4QKJ -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5820 - [Ubuntu] wavpack: CVSS (Max): 5.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5820 USN-5721-1: WavPack vulnerability 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: wavpack Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2022-2476 Original Bulletin: https://ubuntu.com/security/notices/USN-5721-1 Comment: CVSS (Max): 5.5 CVE-2022-2476 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- USN-5721-1: WavPack vulnerability 10 November 2022 WavPack could be made to crash if it opened a specially crafted file. Releases o Ubuntu 16.04 ESM Packages o wavpack - audio codec (lossy and lossless) - encoder and decoder Details It was discovered that WavPack was not properly performing checks when dealing with memory. If a user were tricked into decompressing a specially crafted WavPack Audio File, an attacker could possibly use this issue to cause the WavPack decompressor to crash, resulting in a denial of service. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 o libwavpack1 - 4.75.2-2ubuntu0.2+esm1 Available with Ubuntu Pro (Infra-only) o wavpack - 4.75.2-2ubuntu0.2+esm1 Available with Ubuntu Pro (Infra-only) In general, a standard system update will make all the necessary changes. References o CVE-2022-2476 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23UJskNZI30y1K9AQi+lQ/+J/YFrf+IA6vZQkayvt1iYUTb4e9bP2gv XTyCcLf1qln1sA/J4s6/i1Ang0AkO9J37umXOoxO5ZE7gpRwT/eStqyHsOU4eE49 ppyw4z6cap56SJpFcCzxg59Y5mCgfkBkFacm3ewBFY2jQRlV/KB8aEwJD8mkG4HE 2dJVUsVPr36EJeYzpx5kYU28CvYQrgcwq3gHgn9C4JbyKO7N8g4F+csawIwDwaAS dv6p2uSLoeks3/nZmg2aOiHGnp4zTSMWZuBKkWrbZNMsLJfSaWQe2hAwv48OiVFp f+0R3ZLKLN/elXac5/hoB8SDltkmwBUBY9m8OGkrB1HeCh7QyPe5oHGhjbuPkm1Q eRRSWYLeArdjUstIGfGLoECvRJNOnJ4gloETaE3PekBkJMe9a61NNhd1fFEREe0a 5ffnrvnlQfiZ/Hf8SZD/oYJtC7O50Gx8k9mO7mxAfAGDRCUS7oSc1geBGGAF1WXG oNmiONEhWLi2HvfXURFz4CoBPDVI7gtuutn3cgOfekdZ/AHQwjFdNNVR4aZLv2Zt 7k+tJgb14GK8Et9JiAnefkpIWdigx6aj/4cMo65VHLSZYSfLOdqgbxnWJELqmF8Z NjtnE7tkRUvRSj0xJeeLZlpgaDdX7qIod6fvuNb02E18ipZKLLQH1ED6MFoezeZU fZnRWwYZN9M= =eI4v -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5819 - [SUSE] sudo: CVSS (Max): 7.1

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5819 Security update for sudo 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: sudo Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-43995 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20223938-1 Comment: CVSS (Max): 7.1 CVE-2022-43995 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for sudo ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:3938-1 Rating: important References: #1204986 Cross-References: CVE-2022-43995 Affected Products: SUSE CaaS Platform 4.0 SUSE Enterprise Storage 6 SUSE Enterprise Storage 7 SUSE Linux Enterprise High Performance Computing 15-ESPOS SUSE Linux Enterprise High Performance Computing 15-LTSS SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS SUSE Linux Enterprise Server 15-LTSS SUSE Linux Enterprise Server 15-SP1-BCL SUSE Linux Enterprise Server 15-SP1-LTSS SUSE Linux Enterprise Server 15-SP2-BCL SUSE Linux Enterprise Server 15-SP2-LTSS SUSE Linux Enterprise Server for SAP 15 SUSE Linux Enterprise Server for SAP 15-SP1 SUSE Linux Enterprise Server for SAP 15-SP2 SUSE Manager Proxy 4.1 SUSE Manager Retail Branch Server 4.1 SUSE Manager Server 4.1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for sudo fixes the following issues: o CVE-2022-43995: Fixed a potential heap-based buffer over-read when entering a password of seven characters or fewer and using the crypt() password backend (bsc#1204986). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Manager Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3938=1 o SUSE Manager Retail Branch Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3938=1 o SUSE Manager Proxy 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3938=1 o SUSE Linux Enterprise Server for SAP 15-SP2: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3938=1 o SUSE Linux Enterprise Server for SAP 15-SP1: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3938=1 o SUSE Linux Enterprise Server for SAP 15: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-3938=1 o SUSE Linux Enterprise Server 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3938=1 o SUSE Linux Enterprise Server 15-SP2-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3938=1 o SUSE Linux Enterprise Server 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3938=1 o SUSE Linux Enterprise Server 15-SP1-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3938=1 o SUSE Linux Enterprise Server 15-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-2022-3938=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3938=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3938=1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3938=1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3938=1 o SUSE Linux Enterprise High Performance Computing 15-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-2022-3938=1 o SUSE Linux Enterprise High Performance Computing 15-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-2022-3938=1 o SUSE Enterprise Storage 7: zypper in -t patch SUSE-Storage-7-2022-3938=1 o SUSE Enterprise Storage 6: zypper in -t patch SUSE-Storage-6-2022-3938=1 o SUSE CaaS Platform 4.0: To install this update, use the SUSE CaaS Platform 'skuba' tool. I will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. Package List: o SUSE Manager Server 4.1 (ppc64le s390x x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Manager Retail Branch Server 4.1 (x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Manager Proxy 4.1 (x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Linux Enterprise Server 15-SP2-BCL (x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Linux Enterprise Server 15-SP1-BCL (x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Enterprise Storage 7 (aarch64 x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE Enterprise Storage 6 (aarch64 x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 o SUSE CaaS Platform 4.0 (x86_64): sudo-1.8.27-150000.4.30.1 sudo-debuginfo-1.8.27-150000.4.30.1 sudo-debugsource-1.8.27-150000.4.30.1 sudo-devel-1.8.27-150000.4.30.1 References: o https://www.suse.com/security/cve/CVE-2022-43995.html o https://bugzilla.suse.com/1204986 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23TMskNZI30y1K9AQi9ng/9GqKPN6kn6EZBd4tav4msiyLOSZ1hDd9J 2Wemzy/zpJ0sNHVEr+mnTf9g7yWKZrXGxCDdVrEu4IkoL7ulJtaJu6a4pAZgiw5V K/zWkZO/ukOj3u3Bl94fSYxLf9jqGmWo8icYWsBErEuIgsQOrJQGow4vDXl2qqbl EOvpE47MxWv/ARH0nSYZJv8imUdmTRtglpQ3Vi3r0OOsHmy+imtPuNQe8nsAZPLH OvyvyNZLAfuca84TsdA//EwK5/dW/Nf5eSHN+c5hM9ZXuS3b5ngZbfyMWVRqO9jz Jg+pdVvvC2G4tO+1ODvh9m5RF5N0BShEkWmxi5EX6pdWQWGiouwhszfb+UdNaw9m JjVpD8o76gGEWuN/2/U0veoSbJ408Mdsil7oQi1JgGCwLMWCOdHh3o183f2BZmR2 9DqhM51WI7YwOv8EBo/9M4elJh4o4u+0HnyEeBmtIf692Ub40gB1M9DfDBlFuOv5 WO4fmWZi7IGrCoEJ1v5ddwUp3BC9MTVzPZxB5STohj2yzp0VBG+gpvfVRMKhNvMe 7CJP9gaj2M6WYfKDpDJfKKugjvL/qmooEJlxNQX4ayNVI6o81nOwybQBAqHAZrBz L+TWZJ1kcesotIk4fSa619CywS8sRzGmekJiEho4VTHSN1iCYXVAB/Mgc0Bc9IFA 7M6c2jCBSok= =gIsk -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5818 - [SUSE] rpm: CVSS (Max): 5.3

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5818 Security update for rpm 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: rpm Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2021-20271 CVE-2021-20266 CVE-2021-3421 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20223939-1 Comment: CVSS (Max): 5.3 CVE-2021-3421 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for rpm ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:3939-1 Rating: moderate References: #1183543 #1183545 #1183632 #1183659 #1185299 #996280 Cross-References: CVE-2021-20266 CVE-2021-20271 CVE-2021-3421 Affected Products: SUSE Linux Enterprise Server 12-SP5 SUSE Linux Enterprise Server for SAP Applications 12-SP5 SUSE Linux Enterprise Software Development Kit 12-SP5 ______________________________________________________________________________ An update that solves three vulnerabilities and has three fixes is now available. Description: This update for rpm fixes the following issues: o Fixed PGP parsing bugs (bsc#1185299). o Fixed various format handling bugs (bsc#996280). o CVE-2021-3421: Fixed vulnerability where unsigned headers could be injected into the rpm database (bsc#1183543). o CVE-2021-20271: Fixed vulnerability where a corrupted rpm could corrupt the rpm database (bsc#1183545). o CVE-2021-20266: Fixed missing bounds check in hdrblobInit (bsc#1183632). Bugfixes: o Fixed deadlock when multiple rpm processes tried to acquire the database lock (bsc#1183659). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-3939=1 o SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-3939=1 Package List: o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64): rpm-debuginfo-4.11.2-16.26.1 rpm-debugsource-4.11.2-16.26.1 rpm-devel-4.11.2-16.26.1 o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): python3-rpm-4.11.2-16.26.1 python3-rpm-debuginfo-4.11.2-16.26.1 python3-rpm-debugsource-4.11.2-16.26.1 rpm-4.11.2-16.26.1 rpm-build-4.11.2-16.26.1 rpm-build-debuginfo-4.11.2-16.26.1 rpm-debuginfo-4.11.2-16.26.1 rpm-debugsource-4.11.2-16.26.1 rpm-python-4.11.2-16.26.1 rpm-python-debuginfo-4.11.2-16.26.1 rpm-python-debugsource-4.11.2-16.26.1 o SUSE Linux Enterprise Server 12-SP5 (s390x x86_64): rpm-32bit-4.11.2-16.26.1 rpm-debuginfo-32bit-4.11.2-16.26.1 References: o https://www.suse.com/security/cve/CVE-2021-20266.html o https://www.suse.com/security/cve/CVE-2021-20271.html o https://www.suse.com/security/cve/CVE-2021-3421.html o https://bugzilla.suse.com/1183543 o https://bugzilla.suse.com/1183545 o https://bugzilla.suse.com/1183632 o https://bugzilla.suse.com/1183659 o https://bugzilla.suse.com/1185299 o https://bugzilla.suse.com/996280 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23TKckNZI30y1K9AQgGTxAAnAHJ4uj6f5Pdq45zlaRuWMSu9IzxYg6V GkWkWuHQVUfMHjqDle+FL+4EYHH0bEFdg916ZgjYIKHEe1DV78eqRDz4hyYo2gQ7 KP9akhAVvnJKIwJLn2knQ4Dqxg9rbHAvI7cB0QmqEomRbKlWa4CLiFAwfRvXWqYw r2tHJhZWZxT+7M6S0aafAkNq/MFkcvva4qtPA+5SDjTQ07wVEDUtWN9fYd3M4HwB Lm0s/LMRyJYURHwsLlHk3A5ULseO87nZjWczo1/ueQVK7VhJQZcwDv/ZWssDgg76 lkXJAnT6fUPdpymFEcrDNXyC4DEKvqx5su7mYAZJDhOJnsk6oimr+u6IHbZtFcIw qw52ytv6D+7ospGMtRZmdc7hFW5WJZ0xUR6n2qhxGhUVwhaK0Kru3ri2R4v9V+wm owWhcCH+I9/4kVkD95M55DiNsTFRtbupYWjh5rU2eZ9okRCSORyDwHSdUIxVC2ar zs/NzaC8R/6mKxowMswCY6dZzt3+OfpY8CJADVEDMbWaU2Ag+IkkRAxs59uHn13+ yldjqaZzI40yc5BOVI7cviZXbJMrpO8HTOqya6zD9GORCrS1CRYw1gE/klG9fpgY RNtouLGR6CJUqY2ntsWbzzWGHJuy2qzevC+1qXTiv35oBKfrAyASEnPcbv2Z/ezc DCx8B5cOQmI= =7FqO -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5817 - [SUSE] libarchive: CVSS (Max): 4.4

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5817 Security update for libarchive 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: libarchive Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2021-31566 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20223936-1 Comment: CVSS (Max): 4.4 CVE-2021-31566 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for libarchive ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:3936-1 Rating: moderate References: #1192426 #1192427 Cross-References: CVE-2021-31566 Affected Products: SUSE Linux Enterprise Desktop 15-SP4 SUSE Linux Enterprise High Performance Computing 15-SP4 SUSE Linux Enterprise Micro 5.3 SUSE Linux Enterprise Module for Basesystem 15-SP4 SUSE Linux Enterprise Module for Development Tools 15-SP4 SUSE Linux Enterprise Server 15-SP4 SUSE Linux Enterprise Server for SAP Applications 15-SP4 SUSE Manager Proxy 4.3 SUSE Manager Retail Branch Server 4.3 SUSE Manager Server 4.3 openSUSE Leap 15.4 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update for libarchive fixes the following issues: - - CVE-2021-31566: Fixed vulnerability where libarchive modifies file flags of symlink target (bsc#1192426) - Fixed issue where processing fixup entries may follow symbolic links (bsc#1192427). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-3936=1 o SUSE Linux Enterprise Module for Development Tools 15-SP4: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2022-3936=1 o SUSE Linux Enterprise Module for Basesystem 15-SP4: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3936=1 o SUSE Linux Enterprise Micro 5.3: zypper in -t patch SUSE-SLE-Micro-5.3-2022-3936=1 Package List: o openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64): bsdtar-3.5.1-150400.3.9.1 bsdtar-debuginfo-3.5.1-150400.3.9.1 libarchive-debugsource-3.5.1-150400.3.9.1 libarchive-devel-3.5.1-150400.3.9.1 libarchive13-3.5.1-150400.3.9.1 libarchive13-debuginfo-3.5.1-150400.3.9.1 o openSUSE Leap 15.4 (x86_64): libarchive13-32bit-3.5.1-150400.3.9.1 libarchive13-32bit-debuginfo-3.5.1-150400.3.9.1 o SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le s390x x86_64): bsdtar-3.5.1-150400.3.9.1 bsdtar-debuginfo-3.5.1-150400.3.9.1 libarchive-debugsource-3.5.1-150400.3.9.1 o SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64): libarchive-debugsource-3.5.1-150400.3.9.1 libarchive-devel-3.5.1-150400.3.9.1 libarchive13-3.5.1-150400.3.9.1 libarchive13-debuginfo-3.5.1-150400.3.9.1 o SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64): libarchive-debugsource-3.5.1-150400.3.9.1 libarchive13-3.5.1-150400.3.9.1 libarchive13-debuginfo-3.5.1-150400.3.9.1 References: o https://www.suse.com/security/cve/CVE-2021-31566.html o https://bugzilla.suse.com/1192426 o https://bugzilla.suse.com/1192427 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23THMkNZI30y1K9AQhFdw//eM9rYhF9tlqxOFSAFTgOmG9BJ+048O4M tT9k8OwbE3CY8EAvx7wNbvR+oMoAdrl+XJRBtxHTv+YxPn8ZwQrkrLm53YatM1jI PTkfTWtlXvxDGi+svJndO5DeVYpc+aCGeCLWv0GOlcWSZKzWJL1hjq6tIE2Ahg1z VRiEabwaugiWH/Jgj9FpFBRelFY6LCQzZgyUvjI/k02ovzS3wcFmuzGe3pDH+gdV 4TgvIObTvXO1Q3xyvrnY6Z9hxq5WWTC+TT36cwySCZhR5LBKZ0yn9mYiUcKPsvWs CjkF4ZDRZQYc8KLHtps+lWZIk5fyU3j+i5eJaQkKOdvpB/QMhgkIcU29fN/uOhWz H6kzXmabTH2mBsXR0A5S71FMtQCNUIAf70ENAnnAS7ypwCIBHJX1AyaDw1TnmjfX e8KoXIXEj9hFIKUez0XSq8J6/I7ZV+3EfikP9SoUX1jFEfGJhXo/C3ZQrECNaYz4 JP/KJEicezx86jCZ73jh6Gyet/UoXh4rnY82hABCzc4FQ4U9LJAoO/Nz20jCoB2u p3OdXTDpmnNtFthT1QLeoTFbyFPiV7cys4hhPgtZrRGrE98hMUU//na0PHMoqp/H O2Lic8N4mm70u/aGmu8fcmvybS08bStu3M8kJH+f/UqPsj2n7oCPmcX5begiDnt9 Mv/8aTZ3+/E= =6m1R -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5816 - [SUSE] xwayland: CVSS (Max): 7.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5816 Security update for xwayland 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: xwayland Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-3551 CVE-2022-3550 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20223941-1 Comment: CVSS (Max): 7.8 CVE-2022-3550 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for xwayland ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:3941-1 Rating: important References: #1204412 #1204416 Cross-References: CVE-2022-3550 CVE-2022-3551 Affected Products: SUSE Linux Enterprise Desktop 15-SP4 SUSE Linux Enterprise Server 15-SP4 SUSE Linux Enterprise Server for SAP Applications 15-SP4 SUSE Linux Enterprise Workstation Extension 15-SP4 openSUSE Leap 15.4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for xwayland fixes the following issues: - - CVE-2022-3550: Fixed out of bounds read/write in _GetCountedString() (bsc# 1204412). - CVE-2022-3551: Fixed various leaks of the return value of GetComponentSpec() (bsc#1204416). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-3941=1 o SUSE Linux Enterprise Workstation Extension 15-SP4: zypper in -t patch SUSE-SLE-Product-WE-15-SP4-2022-3941=1 Package List: o openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64): xwayland-21.1.4-150400.3.3.1 xwayland-debuginfo-21.1.4-150400.3.3.1 xwayland-debugsource-21.1.4-150400.3.3.1 xwayland-devel-21.1.4-150400.3.3.1 o SUSE Linux Enterprise Workstation Extension 15-SP4 (x86_64): xwayland-21.1.4-150400.3.3.1 xwayland-debuginfo-21.1.4-150400.3.3.1 xwayland-debugsource-21.1.4-150400.3.3.1 References: o https://www.suse.com/security/cve/CVE-2022-3550.html o https://www.suse.com/security/cve/CVE-2022-3551.html o https://bugzilla.suse.com/1204412 o https://bugzilla.suse.com/1204416 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23TFckNZI30y1K9AQilpBAAnml/kRWk1gRalD/bGHG6Eg6DGoJWzd9/ ut1kYBVlk7vPw6KNG/YNGoJNyyrqXPjgEta1hMxs3mnH3vEcdFxOu6AXH/cNEDe8 P/YG6ugNJEArXoRNrP1GVSAtkkvTsfDQmiSkuKRbxiL2jHhpc+WEhvUTFivZwbYR wHHgn0LbFh5ATRmS1vLnKiucM+GoYTQBOsEFKxHMOHW7nD9QUbLEBbObGxi90Ihw DY2yc3RFmSNRlWTDBlP54PKjMHcqL5SUgufAF54Cxtz4CFxCw9EIpnf/DMvQQiVP KOKePwa7ixm0XHsfnejS+AmPKwI2FrCEZsbPcb2gUTnZmrHw9Ls6qzcCG3u12VFW 8V2ZHSYR5q04pQ9r88iaPZ/Zl3x+O6Vb9cKl6qDkOcvA4LFo/Ygii0vxl3mdCnoK YR5Katj+/UMc/bYs88rRuUcKQ6vh/pW6SX2RKVOZkT21hbnem9BUOQ3yOgUPuyd1 eCJPJTrc75RVnGwqs6thooujOh3hiHj3SbfvzitOV+0BOy62IEAruCqwX0uFH/PA thDdMK62qUojuOu/R4g0RUr/ZH4/APctr+yZcxpVxIDsgOBbsPFl2Tv87xnlOUU1 V8Pj+5JOgfRxdm8itOQrCSlimV3UgFUDlX5T9z64IOM5QpljXIEJOopBEfLVSqOZ l1hyYTUq25M= =eksZ -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5815 - [SUSE] python3-lxml: CVSS (Max): 6.1

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5815 Security update for python3-lxml 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: python3-lxml Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2021-28957 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20223937-1 Comment: CVSS (Max): 6.1 CVE-2021-28957 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for python3-lxml ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:3937-1 Rating: moderate References: #1184177 Cross-References: CVE-2021-28957 Affected Products: SUSE Linux Enterprise Server 12-SP5 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for python3-lxml fixes the following issues: - - CVE-2021-28957: Fixed XSS due to missing input sanitization for HTML5 attributes (bsc#1184177). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-3937=1 Package List: o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): python3-lxml-3.6.1-3.6.1 python3-lxml-debuginfo-3.6.1-3.6.1 python3-lxml-debugsource-3.6.1-3.6.1 References: o https://www.suse.com/security/cve/CVE-2021-28957.html o https://bugzilla.suse.com/1184177 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23TDskNZI30y1K9AQhNvQ//egQRk+MnzEjt+HnSZEUdjQSWFLg7YRY8 52b79MsHPmsqLLdTgB6FNL64Y0SOcm6iCZQAxCXS9Arq8gqqQA0QcIyZuqR5aAev a51jEWQcbiO36s27F8VW4YKz1E7v2fAw0adkhr3DDsUK7Ond9LPwIppGKGMo14MQ NgLGh5mbBH4eT733RfP7M1qfP5fD1PIznGMHtHnKC/ZoOmP5pIVZDMBYEEk2SgxR A6e8gulCiEVxL0Mz1aaYYIRMiaNu9xxhw7g5yYSzvRfx9j0ZZg+hImywZUG8ariV X9NQlq7EDhijr2xu3XdTh5ZDwlVAtLFGmnVXp/7a/rBS/9dLx1rHc3FV70cNYmAp J5uf5qB82fMgbBVsoaFf7hGW4Vc5/qYGDwljIDMIcWgQs4hgtDQ6UTkZXQw8nZHV Z1JfZUZjLTqn/4/LTJ+4NpK7116MQn11Q5vcObpdIqPzvpzxGRacdU6dx9Ri25Js zvBXzxZjZMG2pJ43FqwrrjLZFaauIvebGyT5H0v4HKhoS78o2t24CHwE6EY1bV+o o9onDMvbIIQ1jnIsf7pwc26O5+wSqL0+F4xxs64h7vwZHZBOgu49fd3zvoIF35n4 JbZvrVnSAQMnIQiA2AwOFy/s4F6x/KhNfbVIF7Zi7Xlwo2GSK+w/mOXjgEr3dJ+E CoDLJOBcXg4= =ubZS -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5814 - [SUSE] python-rsa: CVSS (Max): 5.9

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5814 Security update for python-rsa 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: python-rsa Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2020-25658 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20223932-1 Comment: CVSS (Max): 5.9 CVE-2020-25658 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for python-rsa ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:3932-1 Rating: moderate References: #1178676 Cross-References: CVE-2020-25658 Affected Products: SUSE Enterprise Storage 7.1 SUSE Linux Enterprise Desktop 15-SP3 SUSE Linux Enterprise Desktop 15-SP4 SUSE Linux Enterprise High Performance Computing 15-SP3 SUSE Linux Enterprise High Performance Computing 15-SP4 SUSE Linux Enterprise Micro 5.2 SUSE Linux Enterprise Micro 5.3 SUSE Linux Enterprise Module for Basesystem 15-SP3 SUSE Linux Enterprise Module for Basesystem 15-SP4 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 SUSE Linux Enterprise Server 15-SP3 SUSE Linux Enterprise Server 15-SP4 SUSE Linux Enterprise Server for SAP Applications 15-SP3 SUSE Linux Enterprise Server for SAP Applications 15-SP4 SUSE Manager Proxy 4.2 SUSE Manager Proxy 4.3 SUSE Manager Retail Branch Server 4.2 SUSE Manager Retail Branch Server 4.3 SUSE Manager Server 4.2 SUSE Manager Server 4.3 openSUSE Leap 15.3 openSUSE Leap 15.4 openSUSE Leap Micro 5.2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for python-rsa fixes the following issues: - - CVE-2020-25658: Fixed bleichenbacher timing oracle attack against RSA decryption (bsc#1178676). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap Micro 5.2: zypper in -t patch openSUSE-Leap-Micro-5.2-2022-3932=1 o openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-3932=1 o openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-3932=1 o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4: zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-3932= 1 o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3: zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-3932= 1 o SUSE Linux Enterprise Module for Basesystem 15-SP4: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3932=1 o SUSE Linux Enterprise Module for Basesystem 15-SP3: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-3932=1 o SUSE Linux Enterprise Micro 5.3: zypper in -t patch SUSE-SLE-Micro-5.3-2022-3932=1 o SUSE Linux Enterprise Micro 5.2: zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-3932=1 Package List: o openSUSE Leap Micro 5.2 (noarch): python3-rsa-3.4.2-150000.3.7.1 o openSUSE Leap 15.4 (noarch): python3-rsa-3.4.2-150000.3.7.1 o openSUSE Leap 15.3 (noarch): python2-rsa-3.4.2-150000.3.7.1 python3-rsa-3.4.2-150000.3.7.1 o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (noarch): python2-rsa-3.4.2-150000.3.7.1 o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (noarch): python2-rsa-3.4.2-150000.3.7.1 o SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch): python3-rsa-3.4.2-150000.3.7.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch): python3-rsa-3.4.2-150000.3.7.1 o SUSE Linux Enterprise Micro 5.3 (noarch): python3-rsa-3.4.2-150000.3.7.1 o SUSE Linux Enterprise Micro 5.2 (noarch): python3-rsa-3.4.2-150000.3.7.1 References: o https://www.suse.com/security/cve/CVE-2020-25658.html o https://bugzilla.suse.com/1178676 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23S/ckNZI30y1K9AQj7/RAAl23iG/T+cxHZU5OFjtglyuCCpnd4+5Nj lF7FVf7yVNIeEldZ1eLMDKBn37hj+/4F5/xZy91K63sS2JKQRRClpsx49n8EAW3B BzTopp16OMi8c4lEoJy7wX2AT5YltQg761f78Kt7rSjzZubXU6HiGkRS4D7x7SQD VqZe6KBF3UsMQapCw4wQ3xyKlYj19Hwh23AV0ZrNCqzMX86oyDMCCBltMaRiBCqG WSumPhkI98BnVfLesQLC6jb5pwVWIZYruBVybfq1ZXXqW7fV7+smIkp6/ZIln0ZZ zh2finWbjIxcZLugI/0LoJm1A+YpSVZBY4jDybLu+iX8NUnMdvJI+E0sN+vDFrap uLYr8r5nbuSsa9KvPprgYQVZ7y5Pm1iqhhJwFhi0ZHGkFE91f0hIsxFtMoTF8KfY Au2JRL2W2V6QptZSXGXK+HQDr0mc0bigtHUSEujABsI7jigoDle5v+RQCddMfBsW Klm7Oyp5yOwIG6LeUb36nJPkZZcN7XSzkLhL1NEHxIUEu8lZIoV0Oz5KMUNrnndb PL8V3W3DDygrBz9fXrxKpBfeJUaNW9WjvU8qZeI2VRd9bfzeHJN37nj8x2mat3ui KIhah2oM8NYMYYlVrZdAIrOyWHDgxUjnaOnjYhUIKoeT9J9e7Zw+opiEjb8xCv8v eprrvWt1UHc= =tQuL -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5813 - [SUSE] kernel: CVSS (Max): 7.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5813 Security update for the Linux Kernel 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-43750 CVE-2022-28748 CVE-2022-3649 CVE-2022-3646 CVE-2022-3629 CVE-2022-3628 CVE-2022-3621 CVE-2022-3594 CVE-2022-3586 CVE-2022-3565 CVE-2022-3545 CVE-2022-3542 CVE-2022-3524 CVE-2022-3521 CVE-2022-2964 CVE-2022-2153 CVE-2021-4037 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20223930-1 Comment: CVSS (Max): 7.8 CVE-2022-2964 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:3930-1 Rating: important References: #1065729 #1198702 #1200788 #1202686 #1202972 #1203387 #1204241 #1204354 #1204355 #1204402 #1204415 #1204431 #1204439 #1204479 #1204574 #1204635 #1204646 #1204647 #1204653 #1204755 #1204868 Cross-References: CVE-2021-4037 CVE-2022-2153 CVE-2022-2964 CVE-2022-3521 CVE-2022-3524 CVE-2022-3542 CVE-2022-3545 CVE-2022-3565 CVE-2022-3586 CVE-2022-3594 CVE-2022-3621 CVE-2022-3628 CVE-2022-3629 CVE-2022-3646 CVE-2022-3649 CVE-2022-43750 Affected Products: SUSE Linux Enterprise Real Time Extension 12-SP5 ______________________________________________________________________________ An update that solves 16 vulnerabilities and has 5 fixes is now available. Description: The SUSE Linux Enterprise 12 SP5 kernel RT was updated. The following security bugs were fixed: o CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868). o CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bnc#1198702). o CVE-2022-2153: Fixed vulnerability in KVM that could allow an unprivileged local attacker on the host to cause DoS (bnc#1200788). o CVE-2022-2964, CVE-2022-28748: Fixed memory corruption issues in ax88179_178a devices (bnc#1202686 bsc#1196018). o CVE-2022-3521: Fixed race condition in kcm_tx_work() in net/kcm/kcmsock.c (bnc#1204355). o CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bnc#1204354). o CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ ethernet/broadcom/bnx2x/bnx2x_cmn.c (bnc#1204402). o CVE-2022-3545: Fixed use-after-free in area_cache_get() in drivers/net/ ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bnc#1204415). o CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/ l1oip_core.c (bnc#1204431). o CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bnc#1204439). o CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/ net/usb/r8152.c (bnc#1204479). o CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level () in fs/nilfs2/inode.c (bnc#1204574). o CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/ af_vsock.c (bnc#1204635). o CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/ segment.c (bnc#1204646). o CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/ inode.c (bnc#1204647). o CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor's internal memory (bnc#1204653). The following non-security bugs were fixed: o amd-xgbe: Update DMA coherency values (git-fixes). o bnxt: do not lock the tx queue from napi poll (git-fixes). o bnxt_en: Fix RX consumer index logic in the error path (git-fixes). o bnxt_en: reverse order of TX disable and carrier off (git-fixes). o ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() (git-fixes). o ftrace: Fix char print issue in print_ip_ins() (git-fixes). o i40e: Fix flow for IPv6 next header (extension header) (git-fixes). o i40e: Fix overwriting flow control settings during driver loading (git-fixes). o i40e: improve locking of mac_filter_hash (git-fixes). o input: gscps2 - check return value of ioremap() in gscps2_probe() (git-fixes). o input: xpad - add supported devices as contributed on github (git-fixes). o ip6: fix skb leak in ip6frag_expire_frag_queue (bsc#1202972) o kABI: Fix after adding trace_iterator.wait_index (git-fixes). o memcg, kmem: do not fail __GFP_NOFAIL charges (bsc#1204755). o net/mlx4: Fix EEPROM dump support (git-fixes). o net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes). o net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes). o net: amd-xgbe: Fix NETDEV WATCHDOG transmit queue timeout warning (git-fixes). o net: amd-xgbe: Fix network fluctuations when using 1G BELFUSE SFP (git-fixes). o net: amd-xgbe: Reset link when the link never comes back (git-fixes). o net: dsa: mt7530: add the missing RxUnicast MIB counter (git-fixes). o net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes). o net: lapbether: Prevent racing when checking whether the netif is running (git-fixes). o net: marvell: fix MVNETA_TX_IN_PRGRS bit number (git-fixes). o net: mvpp2: Put fwnode in error case during ->probe() (git-fixes). o net: stmmac: fix watchdog timeout during suspend/resume stress test (git-fixes). o net: stmmac: stop each tx channel independently (git-fixes). o net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes). o net: vxge: fix use-after-free in vxge_device_unregister (git-fixes). o nvmem: core: Check input parameter for NULL in nvmem_unregister() (bsc# 1204241). o powerpc/mm/64s: Drop pgd_huge() (bsc#1065729). o powerpc/mm: remove pmd_huge/pud_huge stubs and include hugetlb.h (bsc# 1065729). o powerpc/pci_dn: Add missing of_node_put() (bsc#1065729). o powerpc/powernv: add missing of_node_put() in opal_export_attrs() (bsc# 1065729). o ppp: Fix generating ifname when empty IFLA_IFNAME is specified (git-fixes). o ppp: Fix generating ppp unit id when ifname is not specified (git-fixes). o quota: widen timestamps for the fs_disk_quota structure (bsc#1203387). o r8169: fix jumbo packet handling on RTL8168e (git-fixes). o revert "niu: fix missing checks of niu_pci_eeprom_read" (git-fixes). o ring-buffer: Add ring_buffer_wake_waiters() (git-fixes). o ring-buffer: Check pending waiters when doing wake ups as well (git-fixes). o ring-buffer: Fix race between reset page and reading page (git-fixes). o tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes). o tracing: Disable interrupt or preemption before acquiring arch_spinlock_t (git-fixes). o tracing: Do not free snapshot if tracer is on cmdline (git-fixes). o tracing: Simplify conditional compilation code in tracing_set_tracer() (git-fixes). o tracing: Wake up ring buffer waiters on closing of the file (git-fixes). o tracing: Wake up waiters when tracing is disabled (git-fixes). o usb: core: Fix RST error in hub.c (git-fixes). o usb: serial: ch341: add basis for quirk detection (git-fixes). o usb: serial: ch341: fix lockup of devices with limited prescaler (git-fixes). o usb: serial: ch341: fix lost character on LCR updates (git-fixes). o usb: serial: ch341: fix receiver regression (git-fixes). o usb: serial: ch341: reimplement line-speed handling (git-fixes). o usb: serial: cp210x: add Decagon UCA device id (git-fixes). o usb: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes). o usb: serial: option: add Quectel EM060K modem (git-fixes). o usb: serial: option: add support for OPPO R11 diag port (git-fixes). o xfs: account finobt blocks properly in perag reservation (bsc#1203387). o xfs: enable big timestamps (bsc#1203387). o xfs: enable new inode btree counters feature (bsc#1203387). o xfs: explicitly define inode timestamp range (bsc#1203387). o xfs: preserve default grace interval during quotacheck (bsc#1203387). o xfs: quota: move to time64_t interfaces (bsc#1203387). o xfs: redefine xfs_ictimestamp_t (bsc#1203387). o xfs: redefine xfs_timestamp_t (bsc#1203387). o xfs: store inode btree block counts in AGI header (bsc#1203387). o xfs: use a struct timespec64 for the in-core crtime (bsc#1203387). o xfs: use the finobt block counts to speed up mount times (bsc#1203387). o xfs: widen ondisk inode timestamps to deal with y2038+ (bsc#1203387). o xfs: widen ondisk quota expiration timestamps to handle y2038+ (bsc# 1203387). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Real Time Extension 12-SP5: zypper in -t patch SUSE-SLE-RT-12-SP5-2022-3930=1 Package List: o SUSE Linux Enterprise Real Time Extension 12-SP5 (noarch): kernel-devel-rt-4.12.14-10.106.1 kernel-source-rt-4.12.14-10.106.1 o SUSE Linux Enterprise Real Time Extension 12-SP5 (x86_64): cluster-md-kmp-rt-4.12.14-10.106.1 cluster-md-kmp-rt-debuginfo-4.12.14-10.106.1 dlm-kmp-rt-4.12.14-10.106.1 dlm-kmp-rt-debuginfo-4.12.14-10.106.1 gfs2-kmp-rt-4.12.14-10.106.1 gfs2-kmp-rt-debuginfo-4.12.14-10.106.1 kernel-rt-4.12.14-10.106.1 kernel-rt-base-4.12.14-10.106.1 kernel-rt-base-debuginfo-4.12.14-10.106.1 kernel-rt-debuginfo-4.12.14-10.106.1 kernel-rt-debugsource-4.12.14-10.106.1 kernel-rt-devel-4.12.14-10.106.1 kernel-rt-devel-debuginfo-4.12.14-10.106.1 kernel-rt_debug-4.12.14-10.106.1 kernel-rt_debug-debuginfo-4.12.14-10.106.1 kernel-rt_debug-debugsource-4.12.14-10.106.1 kernel-rt_debug-devel-4.12.14-10.106.1 kernel-rt_debug-devel-debuginfo-4.12.14-10.106.1 kernel-syms-rt-4.12.14-10.106.1 ocfs2-kmp-rt-4.12.14-10.106.1 ocfs2-kmp-rt-debuginfo-4.12.14-10.106.1 References: o https://www.suse.com/security/cve/CVE-2021-4037.html o https://www.suse.com/security/cve/CVE-2022-2153.html o https://www.suse.com/security/cve/CVE-2022-2964.html o https://www.suse.com/security/cve/CVE-2022-3521.html o https://www.suse.com/security/cve/CVE-2022-3524.html o https://www.suse.com/security/cve/CVE-2022-3542.html o https://www.suse.com/security/cve/CVE-2022-3545.html o https://www.suse.com/security/cve/CVE-2022-3565.html o https://www.suse.com/security/cve/CVE-2022-3586.html o https://www.suse.com/security/cve/CVE-2022-3594.html o https://www.suse.com/security/cve/CVE-2022-3621.html o https://www.suse.com/security/cve/CVE-2022-3628.html o https://www.suse.com/security/cve/CVE-2022-3629.html o https://www.suse.com/security/cve/CVE-2022-3646.html o https://www.suse.com/security/cve/CVE-2022-3649.html o https://www.suse.com/security/cve/CVE-2022-43750.html o https://bugzilla.suse.com/1065729 o https://bugzilla.suse.com/1198702 o https://bugzilla.suse.com/1200788 o https://bugzilla.suse.com/1202686 o https://bugzilla.suse.com/1202972 o https://bugzilla.suse.com/1203387 o https://bugzilla.suse.com/1204241 o https://bugzilla.suse.com/1204354 o https://bugzilla.suse.com/1204355 o https://bugzilla.suse.com/1204402 o https://bugzilla.suse.com/1204415 o https://bugzilla.suse.com/1204431 o https://bugzilla.suse.com/1204439 o https://bugzilla.suse.com/1204479 o https://bugzilla.suse.com/1204574 o https://bugzilla.suse.com/1204635 o https://bugzilla.suse.com/1204646 o https://bugzilla.suse.com/1204647 o https://bugzilla.suse.com/1204653 o https://bugzilla.suse.com/1204755 o https://bugzilla.suse.com/1204868 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23S8MkNZI30y1K9AQgFEQ//XTiKt7CzIC64kYK9vv7CL0+pnBHzw6s8 hJkMsqp1WO1uhOGyMB1VKtNdn+n6RU1nbGg54pP+uyRZx11W3UIvMSOlLYeS+HDT 5B7DHshsBh4YvBJXkr+3SUsToWoZA9Utqm3WgEfhy8wdizazj2ktseFHXZ3X2qCs qGrH404sSzgU7n7DC+jrS8jo9pix9miLP0LUdpWZ3Ha+yrVAebquPQcZnA2Oq3Vj YrcvXvAdrEh/9oAlqKcJ2YwmzT3PnxrFIwK8A1pJbitt6Ro091JHJoLOcZCHNwRm J/p2PuWoSF3L8tNlbQP6SEBYLEkqJ6+ZW73L/9vcJif1K9ah0Q3iMYQfecUo9xk2 cIQ7W5Rr3tT92GhHOHHbJWgNvB9hJvrldQ0ko187l+dPrCF+i6EOiZ9FUtE6J96C Gc+G0ZZ6P3xvLQlPAr3DyhFqQUOcQEXU2HqxodL6MoSFDRudOyrF7fKBu6YaKjJJ FFGSDzBPEKUqw4FleyCw3nbTBTmkaXU92vvnORI6e6UIpsUZl9RyC1aLtl6tZhic CMu3QuVTA6tj19Miy2Aj9Oq58IrzFqhrMcq9c/NSm4nv/hMBx+5jaqL1YTVJV/Ws vAMzR8rbOrFLddxDNgGZ5CTzKM/MlkPSkoYcKm/D2RLssWA/i7TnAAzZALCqKXBj TCUvM+arsug= =9afY -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5812 - [SUSE] libarchive: CVSS (Max): 4.4

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5812 Security update for libarchive 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: libarchive Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2021-31566 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20223935-1 Comment: CVSS (Max): 4.4 CVE-2021-31566 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/I:R/S:U/C:N/I:L/A:L - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for libarchive ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:3935-1 Rating: moderate References: #1192426 #1192427 Cross-References: CVE-2021-31566 Affected Products: SUSE Enterprise Storage 7.1 SUSE Linux Enterprise Desktop 15-SP3 SUSE Linux Enterprise High Performance Computing 15-SP3 SUSE Linux Enterprise Module for Basesystem 15-SP3 SUSE Linux Enterprise Module for Development Tools 15-SP3 SUSE Linux Enterprise Server 15-SP3 SUSE Linux Enterprise Server for SAP Applications 15-SP3 SUSE Manager Proxy 4.2 SUSE Manager Retail Branch Server 4.2 SUSE Manager Server 4.2 openSUSE Leap 15.3 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update for libarchive fixes the following issues: - - CVE-2021-31566: Fixed incorrect usage of file flags (bsc#1192426). - Fixed issues where postprocessing alters symlink targets instead of actual file (bsc# 1192427). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-3935=1 o SUSE Linux Enterprise Module for Development Tools 15-SP3: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-3935=1 o SUSE Linux Enterprise Module for Basesystem 15-SP3: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-3935=1 Package List: o openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): bsdtar-3.4.2-150200.4.12.1 bsdtar-debuginfo-3.4.2-150200.4.12.1 libarchive-debugsource-3.4.2-150200.4.12.1 libarchive-devel-3.4.2-150200.4.12.1 libarchive13-3.4.2-150200.4.12.1 libarchive13-debuginfo-3.4.2-150200.4.12.1 o openSUSE Leap 15.3 (x86_64): libarchive13-32bit-3.4.2-150200.4.12.1 libarchive13-32bit-debuginfo-3.4.2-150200.4.12.1 o SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64): bsdtar-3.4.2-150200.4.12.1 bsdtar-debuginfo-3.4.2-150200.4.12.1 libarchive-debugsource-3.4.2-150200.4.12.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64): libarchive-debugsource-3.4.2-150200.4.12.1 libarchive-devel-3.4.2-150200.4.12.1 libarchive13-3.4.2-150200.4.12.1 libarchive13-debuginfo-3.4.2-150200.4.12.1 References: o https://www.suse.com/security/cve/CVE-2021-31566.html o https://bugzilla.suse.com/1192426 o https://bugzilla.suse.com/1192427 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23S6MkNZI30y1K9AQhoUA/8CojpfzrK+XZIL6m3gZaPFSv4Waqst0TM 8dGcnx7ASJgIEtWkhRgLDVhdXyh39V+2fukPJ9FHTVBbk15Kls1Fe1ue5TU/IXX1 MxGW9C5mTK6iUMgYuyToIvGihKC2zW+JfBY4trjc4iA1YfX9aInqNi9l33DCRXCS dXT6Xq/YLvCWPdvdEDBd6iCedpnzWevmF16U7w8lR18v6+ojhuyZp9V641qfZGTh WCq7QFTFaz7mTCgSnvZ6jncnY4ViVpZFx0p83VfWhl/qkO5IPYHXTW2e9zgFhhB0 Q0ZWdJBD5dhpwS30rxsmU71kpl3+VzYzlLBmkdOiUpMzlGoFwaEMtKdeVXH/JfxR LC7XMail2TVqz7EnSKBFMxt20fmk/uqtcLBZznUDVgUYNOjXqVlRyFIDgCka2JUg 8yfkR6uoiFdHd598BKHjowbFx3LYCUwFxzuZFsCYWxJpvIW+DjGqvsKaayhl40qj QCfr9mB7c872o2p/YYdY6NvZ/EkUNqF8+/V1dUnLJekCqCH/OaosH9rr/mk7sWdM Fd1fIUv/ULXm+TNjoed5Oak5AZgWgMtEMRigXQ/sIUWpbE9fkDjqrT0bd104JnCm YZQPFWrH45dbWahVn/s4xx1ZA9DJOKa4eZ/rIes3pUsFHIrDkE97mJYNWRgLJfb6 t9kS6PoABxw= =v7aM -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5811 - [SUSE] kernel: CVSS (Max): 7.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5811 Security update for the Linux Kernel 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-43750 CVE-2022-42703 CVE-2022-39189 CVE-2022-28748 CVE-2022-3649 CVE-2022-3646 CVE-2022-3640 CVE-2022-3629 CVE-2022-3625 CVE-2022-3621 CVE-2022-3594 CVE-2022-3586 CVE-2022-3577 CVE-2022-3565 CVE-2022-3545 CVE-2022-3542 CVE-2022-3535 CVE-2022-3524 CVE-2022-3521 CVE-2022-3424 CVE-2022-3176 CVE-2022-2978 CVE-2022-2964 CVE-2022-2153 CVE-2021-4037 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20223929-1 Comment: CVSS (Max): 7.8 CVE-2022-3176 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:3929-1 Rating: important References: #1032323 #1065729 #1196018 #1198702 #1200465 #1200788 #1201725 #1202686 #1202700 #1203066 #1203098 #1203387 #1203391 #1203496 #1204053 #1204166 #1204168 #1204354 #1204355 #1204382 #1204402 #1204415 #1204417 #1204431 #1204439 #1204470 #1204479 #1204574 #1204575 #1204619 #1204635 #1204637 #1204646 #1204647 #1204653 #1204728 #1204753 #1204754 Cross-References: CVE-2021-4037 CVE-2022-2153 CVE-2022-28748 CVE-2022-2964 CVE-2022-2978 CVE-2022-3176 CVE-2022-3424 CVE-2022-3521 CVE-2022-3524 CVE-2022-3535 CVE-2022-3542 CVE-2022-3545 CVE-2022-3565 CVE-2022-3577 CVE-2022-3586 CVE-2022-3594 CVE-2022-3621 CVE-2022-3625 CVE-2022-3629 CVE-2022-3640 CVE-2022-3646 CVE-2022-3649 CVE-2022-39189 CVE-2022-42703 CVE-2022-43750 Affected Products: SUSE Linux Enterprise Micro 5.1 SUSE Linux Enterprise Micro 5.2 SUSE Linux Enterprise Module for Realtime 15-SP3 SUSE Linux Enterprise Real Time 15-SP3 openSUSE Leap Micro 5.2 ______________________________________________________________________________ An update that solves 25 vulnerabilities, contains four features and has 13 fixes is now available. Description: The SUSE Linux Enterprise 15-SP3 RT kernel was updated to receive various security and bugfixes. The following security bugs were fixed: o CVE-2022-2964, CVE-2022-28748: Fixed memory corruption issues in ax88179_178a devices (bnc#1202686 bsc#1196018). o CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bnc#1198702). o CVE-2022-2153: Fixed vulnerability in KVM that could allow an unprivileged local attacker on the host to cause DoS (bnc#1200788). o CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bnc#1204354). o CVE-2022-2978: Fixed use-after-free in the NILFS file system that could lead to local privilege escalation or DoS (bnc#1202700). o CVE-2022-3176: Fixed use-after-free in io_uring when using POLLFREE (bnc# 1203391). o CVE-2022-3521: Fixed race condition in kcm_tx_work() in net/kcm/kcmsock.c (bnc#1204355). o CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault () and gru_handle_user_call_os() that could lead to kernel panic (bsc# 1204166). o CVE-2022-3535: Fixed memory leak in mvpp2_dbgfs_port_init() in drivers/net/ ethernet/marvell/mvpp2/mvpp2_debugfs.c (bnc#1204417). o CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ ethernet/broadcom/bnx2x/bnx2x_cmn.c (bnc#1204402). o CVE-2022-3545: Fixed use-after-free in area_cache_get() in drivers/net/ ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bnc#1204415). o CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/ l1oip_core.c (bnc#1204431). o CVE-2022-3577: Fixed out-of-bounds memory write flaw in bigben device driver that could lead to local privilege escalation or DoS (bnc#1204470). o CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bnc#1204439). o CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/ net/usb/r8152.c (bnc#1204479). o CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level () in fs/nilfs2/inode.c (bnc#1204574). o CVE-2022-3625: Fixed use-after-free in devlink_param_set()/ devlink_param_get() in net/core/devlink.c (bnc#1204637). o CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/ af_vsock.c (bnc#1204635). o CVE-2022-3640: Fixed use-after-free in l2cap_conn_del() in net/bluetooth/ l2cap_core.c (bnc#1204619). o CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/ segment.c (bnc#1204646). o CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/ inode.c (bnc#1204647). o CVE-2022-39189: Fixed a flaw in the x86 KVM subsystem that could allow unprivileged guest users to compromise the guest kernel via TLB flush operations on preempted vCPU (bnc#1203066). o CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bnc#1204168). o CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor's internal memory (bnc#1204653). The following non-security bugs were fixed: o ACPI: APEI: do not add task_work to kernel thread to avoid memory leak (git-fixes). o ACPI: HMAT: Release platform device in case of platform_device_add_data() fails (git-fixes). o ACPI: extlog: Handle multiple records (git-fixes). o ACPI: video: Add Toshiba Satellite/Portege Z830 quirk (git-fixes). o ALSA: Use del_timer_sync() before freeing timer (git-fixes). o ALSA: ac97: fix possible memory leak in snd_ac97_dev_register() (git-fixes). o ALSA: aoa: Fix I2S device accounting (git-fixes). o ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev() (git-fixes). o ALSA: asihpi - Remove useless code in hpi_meter_get_peak() (git-fixes). o ALSA: au88x0: use explicitly signed char (git-fixes). o ALSA: dmaengine: increment buffer pointer atomically (git-fixes). o ALSA: hda/hdmi: Do not skip notification handling during PM operation (git-fixes). o ALSA: hda/realtek: Add Intel Reference SSID to support headset keys (git-fixes). o ALSA: hda/realtek: Add quirk for ASUS GV601R laptop (git-fixes). o ALSA: hda/realtek: Correct pin configs for ASUS G533Z (git-fixes). o ALSA: hda/realtek: remove ALC289_FIXUP_DUAL_SPK for Dell 5530 (git-fixes). o ALSA: hda: Fix position reporting on Poulsbo (git-fixes). o ALSA: oss: Fix potential deadlock at unregistration (git-fixes). o ALSA: rawmidi: Drop register_mutex in snd_rawmidi_free() (git-fixes). o ALSA: rme9652: use explicitly signed char (git-fixes). o ALSA: usb-audio: Fix NULL dererence at error path (git-fixes). o ALSA: usb-audio: Fix potential memory leaks (git-fixes). o ASoC: eureka-tlv320: Hold reference returned from of_find_xxx API (git-fixes). o ASoC: fsl_sai: Remove unnecessary FIFO reset in ISR (git-fixes). o ASoC: mt6660: Fix PM disable depth imbalance in mt6660_i2c_probe (git-fixes). o ASoC: rsnd: Add check for rsnd_mod_power_on (git-fixes). o ASoC: wcd9335: fix order of Slimbus unprepare/disable (git-fixes). o ASoC: wcd934x: fix order of Slimbus unprepare/disable (git-fixes). o ASoC: wm5102: Fix PM disable depth imbalance in wm5102_probe (git-fixes). o ASoC: wm5110: Fix PM disable depth imbalance in wm5110_probe (git-fixes). o ASoC: wm8997: Fix PM disable depth imbalance in wm8997_probe (git-fixes). o Bluetooth: L2CAP: Fix user-after-free (git-fixes). o Bluetooth: L2CAP: initialize delayed works at l2cap_chan_create() (git-fixes). o Bluetooth: hci_core: Fix not handling link timeouts propertly (git-fixes). o Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times (git-fixes). o HID: hidraw: fix memory leak in hidraw_release() (git-fixes). o HID: magicmouse: Do not set BTN_MOUSE on double report (git-fixes). o HID: multitouch: Add memory barriers (git-fixes). o HID: roccat: Fix use-after-free in roccat_read() (git-fixes). o HSI: omap_ssi: Fix refcount leak in ssi_probe (git-fixes). o HSI: omap_ssi_port: Fix dma_map_sg error check (git-fixes). o IB/cm: Cancel mad on the DREQ event when the state is MRA_REP_RCVD (git-fixes) o IB/cma: Allow XRC INI QPs to set their local ACK timeout (git-fixes) o IB/core: Only update PKEY and GID caches on respective events (git-fixes) o IB/hfi1: Adjust pkey entry in index 0 (git-fixes) o IB/hfi1: Fix abba locking issue with sc_disable() (git-fixes) o IB/hfi1: Fix possible null-pointer dereference in _extend_sdma_tx_descs() (git-fixes) o IB/mlx4: Add support for REJ due to timeout (git-fixes) o IB/mlx4: Use port iterator and validation APIs (git-fixes) o IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields (git-fixes) o IB/rdmavt: Add __init/__exit annotations to module init/exit funcs (git-fixes) o IB/srpt: Remove redundant assignment to ret (git-fixes) o Input: i8042 - fix refount leak on sparc (git-fixes). o Input: xpad - add supported devices as contributed on github (git-fixes). o Input: xpad - fix wireless 360 controller breaking after suspend (git-fixes). o KVM: nVMX: Unconditionally purge queued/injected events on nested "exit" (git-fixes). o KVM: s390: Clarify SIGP orders versus STOP/RESTART (git-fixes). o KVM: s390: VSIE: fix MVPG handling for prefixing and MSO (git-fixes). o KVM: s390: clear kicked_mask before sleeping again (git-fixes). o KVM: s390: preserve deliverable_mask in __airqs_kick_single_vcpu (git-fixes). o KVM: s390: pv: do not present the ecall interrupt twice (git-fixes). o KVM: s390: split kvm_s390_real_to_abs (git-fixes). o KVM: s390x: fix SCK locking (git-fixes). o KVM: x86/emulator: Fix handing of POP SS to correctly set interruptibility (git-fixes). o PCI: Dynamically map ECAM regions (bsc#1204382). o PCI: Fix used_buses calculation in pci_scan_child_bus_extend() (git-fixes). o PCI: Sanitise firmware BAR assignments behind a PCI-PCI bridge (git-fixes). o PM: domains: Fix handling of unavailable/disabled idle states (git-fixes). o PM: hibernate: Allow hybrid sleep to work with s2idle (git-fixes). o RDMA/bnxt_re: Add missing spin lock initialization (git-fixes) o RDMA/bnxt_re: Fix query SRQ failure (git-fixes) o RDMA/cm: Fix memory leak in ib_cm_insert_listen (git-fixes) o RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests (git-fixes) o RDMA/cma: Fix arguments order in net device validation (git-fixes) o RDMA/core: Sanitize WQ state received from the userspace (git-fixes) o RDMA/cxgb4: Remove MW support (git-fixes) o RDMA/efa: Free IRQ vectors on error flow (git-fixes) o RDMA/efa: Remove double QP type assignment (git-fixes) o RDMA/efa: Use ib_umem_num_dma_pages() (git-fixes) o RDMA/hfi1: Fix potential integer multiplication overflow errors (git-fixes) o RDMA/hns: Remove unnecessary check for the sgid_attr when modifying QP (git-fixes) o RDMA/i40iw: Use ib_umem_num_dma_pages() (git-fixes) o RDMA/iwcm: Release resources if iw_cm module initialization fails (git-fixes) o RDMA/mlx4: Return missed an error if device does not support steering (git-fixes) o RDMA/mlx5: Add missing check for return value in get namespace flow (git-fixes) o RDMA/mlx5: Block FDB rules when not in switchdev mode (git-fixes) o RDMA/mlx5: Fix memory leak in error flow for subscribe event routine (git-fixes) o RDMA/mlx5: Make mkeys always owned by the kernel's PD when not enabled (git-fixes) o RDMA/mlx5: Set user priority for DCT (git-fixes) o RDMA/mlx5: Use set_mkc_access_pd_addr_fields() in reg_create() (git-fixes) o RDMA/qedr: Fix NULL deref for query_qp on the GSI QP (git-fixes) o RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr() (git-fixes) o RDMA/qedr: Fix reporting QP timeout attribute (git-fixes) o RDMA/qib: Remove superfluous fallthrough statements (git-fixes) o RDMA/rtrs-srv: Pass the correct number of entries for dma mapped SGL (git-fixes) o RDMA/rxe: Do not overwrite errno from ib_umem_get() (git-fixes) o RDMA/rxe: Fix "kernel NULL pointer dereference" error (git-fixes) o RDMA/rxe: Fix error unwind in rxe_create_qp() (git-fixes) o RDMA/rxe: Fix extra copies in build_rdma_network_hdr (git-fixes) o RDMA/rxe: Fix extra copy in prepare_ack_packet (git-fixes) o RDMA/rxe: Fix failure during driver load (git-fixes) o RDMA/rxe: Fix over copying in get_srq_wqe (git-fixes) o RDMA/rxe: Fix redundant call to ip_send_check (git-fixes) o RDMA/rxe: Fix redundant skb_put_zero (git-fixes) o RDMA/rxe: Fix rnr retry behavior (git-fixes) o RDMA/rxe: Fix the error caused by qp->sk (git-fixes) o RDMA/rxe: Fix wrong port_cap_flags (git-fixes) o RDMA/rxe: Generate a completion for unsupported/invalid opcode (git-fixes) o RDMA/rxe: Remove unused pkt->offset (git-fixes) o RDMA/rxe: Return CQE error if invalid lkey was supplied (git-fixes) o RDMA/sa_query: Use strscpy_pad instead of memcpy to copy a string (git-fixes) o RDMA/siw: Always consume all skbuf data in sk_data_ready() upcall. (git-fixes) o RDMA/siw: Fix a condition race issue in MPA request processing (git-fixes) o RDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event (git-fixes) o RDMA/siw: Pass a pointer to virt_to_page() (git-fixes) o RDMA/usnic: fix set-but-not-unused variable 'flags' warning (git-fixes) o RDMA: Verify port when creating flow rule (git-fixes) o RDMA: remove useless condition in siw_create_cq() (git-fixes) o RDMa/mthca: Work around -Wenum-conversion warning (git-fixes) o Revert "usb: storage: Add quirk for Samsung Fit flash" (git-fixes). o Revert "usb: storage: Add quirk for Samsung Fit flash" (git-fixes). o USB: serial: console: move mutex_unlock() before usb_serial_put() (git-fixes). o USB: serial: ftdi_sio: fix 300 bps rate for SIO (git-fixes). o USB: serial: qcserial: add new usb-id for Dell branded EM7455 (git-fixes). o USB: serial: qcserial: add new usb-id for Dell branded EM7455 (git-fixes). o arm64: assembler: add cond_yield macro (git-fixes) o ata: fix ata_id_has_devslp() (git-fixes). o ata: fix ata_id_has_dipm() (git-fixes). o ata: fix ata_id_has_ncq_autosense() (git-fixes). o ata: fix ata_id_sense_reporting_enabled() and ata_id_has_sense_reporting() (git-fixes). o ata: libahci_platform: Sanity check the DT child nodes number (git-fixes). o can: bcm: check the result of can_send() in bcm_can_tx() (git-fixes). o can: kvaser_usb: Fix possible completions during init_completion (git-fixes). o can: kvaser_usb: Fix use of uninitialized completion (git-fixes). o can: kvaser_usb_leaf: Fix CAN state after restart (git-fixes). o can: kvaser_usb_leaf: Fix TX queue out of sync after restart (git-fixes). o can: mscan: mpc5xxx: mpc5xxx_can_probe(): add missing put_clock() in error path (git-fixes). o cgroup/cpuset: Enable update_tasks_cpumask() on top_cpuset (bsc#1204753). o clk: bcm2835: Make peripheral PLLC critical (git-fixes). o clk: bcm2835: fix bcm2835_clock_rate_from_divisor declaration (git-fixes). o clk: berlin: Add of_node_put() for of_get_parent() (git-fixes). o clk: mediatek: mt8183: mfgcfg: Propagate rate changes to parent (git-fixes). o clk: oxnas: Hold reference returned by of_get_parent() (git-fixes). o clk: qcom: gcc-msm8916: use ARRAY_SIZE instead of specifying num_parents (git-fixes). o clk: qoriq: Hold reference returned by of_get_parent() (git-fixes). o clk: tegra20: Fix refcount leak in tegra20_clock_init (git-fixes). o clk: tegra: Fix refcount leak in tegra114_clock_init (git-fixes). o clk: tegra: Fix refcount leak in tegra210_clock_init (git-fixes). o clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe (git-fixes). o clk: zynqmp: Fix stack-out-of-bounds in strncpy` (git-fixes). o clk: zynqmp: pll: rectify rate rounding in zynqmp_pll_round_rate (git-fixes). o crypto: akcipher - default implementation for setting a private key (git-fixes). o crypto: arm64/sha - fix function types (git-fixes) o crypto: arm64/sha1-ce - simplify NEON yield (git-fixes) o crypto: arm64/sha2-ce - simplify NEON yield (git-fixes) o crypto: arm64/sha3-ce - simplify NEON yield (git-fixes) o crypto: arm64/sha512-ce - simplify NEON yield (git-fixes) o crypto: cavium - prevent integer overflow loading firmware (git-fixes). o crypto: ccp - Release dma channels before dmaengine unrgister (git-fixes). o crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr (git-fixes). o device property: Fix documentation for *_match_string() APIs (git-fixes). o dmaengine: ioat: stop mod_timer from resurrecting deleted timer in __cleanup() (git-fixes). o dmaengine: xilinx_dma: Report error in case of dma_set_mask_and_coherent API failure (git-fixes). o dmaengine: xilinx_dma: cleanup for fetching xlnx,num-fstores property (git-fixes). o docs: update mediator information in CoC docs (git-fixes). o drivers: serial: jsm: fix some leaks in probe (git-fixes). o drm/amdgpu: fix initial connector audio value (git-fixes). o drm/bridge: Avoid uninitialized variable warning (git-fixes). o drm/bridge: megachips: Fix a null pointer dereference bug (git-fixes). o drm/bridge: parade-ps8640: Fix regulator supply order (git-fixes). o drm/i915/gvt: fix a memory leak in intel_gvt_init_vgpu_types (git-fixes). o drm/mipi-dsi: Detach devices when removing the host (git-fixes). o drm/msm/dpu: Fix comment typo (git-fixes). o drm/msm/dpu: index dpu_kms->hw_vbif using vbif_idx (git-fixes). o drm/msm/dsi: fix memory corruption with too many bridges (git-fixes). o drm/msm/hdmi: fix memory corruption with too many bridges (git-fixes). o drm/msm: Fix return type of mdp4_lvds_connector_mode_valid (git-fixes). o drm/msm: Make .remove and .shutdown HW shutdown consistent (git-fixes). o drm/nouveau/nouveau_bo: fix potential memory leak in nouveau_bo_alloc() (git-fixes). o drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table() (git-fixes). o drm/omap: dss: Fix refcount leak bugs (git-fixes). o drm/scheduler: quieten kernel-doc warnings (git-fixes). o drm/udl: Restore display mode on resume (git-fixes). o drm: Prevent drm_copy_field() to attempt copying a NULL pointer (git-fixes). o drm: Use size_t type for len variable in drm_copy_field() (git-fixes). o drm: bridge: adv7511: fix CEC power down control register offset (git-fixes). o drm: fix drm_mipi_dbi build errors (git-fixes). o drm: panel-orientation-quirks: Add quirk for Anbernic Win600 (git-fixes). o drm:pl111: Add of_node_put() when breaking out of for_each_available_child_of_node() (git-fixes). o dyndbg: fix module.dyndbg handling (git-fixes). o dyndbg: let query-modname override actual module name (git-fixes). o efi: Correct Macmini DMI match in uefi cert quirk (git-fixes). o efi: libstub: drop pointless get_memory_map() call (git-fixes). o exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1204053 bsc#1201725). o fbdev: cyber2000fb: fix missing pci_disable_device() (git-fixes). o fbdev: da8xx-fb: Fix error handling in .remove() (git-fixes). o firmware: arm_scmi: Add SCMI PM driver remove routine (git-fixes). o firmware: google: Test spinlock on panic path to avoid lockups (git-fixes). o fpga: prevent integer overflow in dfl_feature_ioctl_set_irq() (git-fixes). o gpio: rockchip: request GPIO mux to pinctrl when setting direction (git-fixes). o hid: hid-logitech-hidpp: avoid unnecessary assignments in hidpp_connect_event (git-fixes). o hwmon/coretemp: Handle large core ID value (git-fixes). o iio: ABI: Fix wrong format of differential capacitance channel ABI (git-fixes). o iio: adc: ad7923: fix channel readings for some variants (git-fixes). o iio: adc: at91-sama5d2_adc: check return status for pressure and touch (git-fixes). o iio: adc: at91-sama5d2_adc: fix AT91_SAMA5D2_MR_TRACKTIM_MAX (git-fixes). o iio: adc: at91-sama5d2_adc: lock around oversampling and sample freq (git-fixes). o iio: adc: mcp3911: use correct id bits (git-fixes). o iio: dac: ad5593r: Fix i2c read protocol requirements (git-fixes). o iio: inkern: only release the device node when done with it (git-fixes). o iio: light: tsl2583: Fix module unloading (git-fixes). o iio: pressure: dps310: Refactor startup procedure (git-fixes). o iio: pressure: dps310: Reset chip after timeout (git-fixes). o irqchip/ls-extirq: Fix invalid wait context by avoiding to use regmap (git-fixes). o kABI: arm64/crypto/sha512 Preserve function signature (git-fixes). o kbuild: Add skip_encoding_btf_enum64 option to pahole (git-fixes). o kbuild: remove the target in signal traps when interrupted (git-fixes). o kbuild: sink stdout from cmd for silent build (git-fixes). o kbuild: skip per-CPU BTF generation for pahole v1.18-v1.21 (jsc#SLE-24559). o kthread: Extract KTHREAD_IS_PER_CPU (bsc#1204753). o lib/sg_pool: change module_init(sg_pool_init) to subsys_initcall (git-fixes). o locking/csd_lock: Change csdlock_debug from early_param to __setup (git-fixes). o mISDN: fix use-after-free bugs in l1oip timer handlers (git-fixes). o mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq (git-fixes). o mac802154: Fix LQI recording (git-fixes). o mailbox: bcm-ferxrm-mailbox: Fix error check for dma_map_sg (git-fixes). o media: cedrus: Set the platform driver data earlier (git-fixes). o media: cx88: Fix a null-ptr-deref bug in buffer_prepare() (git-fixes). o media: v4l2-dv-timings: add sanity checks for blanking values (git-fixes). o media: videodev2.h: V4L2_DV_BT_BLANKING_HEIGHT should check 'interlaced' (git-fixes). o media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init (git-fixes). o memory: of: Fix refcount leak bug in of_get_ddr_timings() (git-fixes). o memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() (git-fixes). o mfd: fsl-imx25: Fix an error handling path in mx25_tsadc_setup_irq() (git-fixes). o mfd: intel_soc_pmic: Fix an error handling path in intel_soc_pmic_i2c_probe () (git-fixes). o mfd: lp8788: Fix an error handling path in lp8788_irq_init() and lp8788_irq_init() (git-fixes). o mfd: lp8788: Fix an error handling path in lp8788_probe() (git-fixes). o mfd: sm501: Add check for platform_driver_register() (git-fixes). o misc: ocxl: fix possible refcount leak in afu_ioctl() (git-fixes). o mm, memcg: avoid stale protection values when cgroup is above protection (bsc#1204754). o mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page (bsc #1204575). o mm: memcontrol: fix occasional OOMs due to proportional memory.low reclaim (bsc#1204754). o mmc: au1xmmc: Fix an error handling path in au1xmmc_probe() (git-fixes). o mmc: core: Fix kernel panic when remove non-standard SDIO card (git-fixes). o mmc: core: Replace with already defined values for readability (git-fixes). o mmc: core: Terminate infinite loop in SD-UHS voltage switch (git-fixes). o mmc: sdhci-msm: add compatible string check for sdm670 (git-fixes). o mmc: sdhci-sprd: Fix minimum clock limit (git-fixes). o mmc: wmt-sdmmc: Fix an error handling path in wmt_mci_probe() (git-fixes). o mtd: devices: docg3: check the return value of devm_ioremap() in the probe (git-fixes). o mtd: rawnand: atmel: Unmap streaming DMA mappings (git-fixes). o mtd: rawnand: marvell: Use correct logic for nand-keep-config (git-fixes). o mtd: rawnand: meson: fix bit map use in meson_nfc_ecc_correct() (git-fixes). o net/ieee802154: fix uninit value bug in dgram_sendmsg (git-fixes). o net: ieee802154: return -EINVAL for unknown addr type (git-fixes). o net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes). o net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes). o openvswitch: Fix double reporting of drops in dropwatch (git-fixes). o openvswitch: Fix overreporting of drops in dropwatch (git-fixes). o openvswitch: switch from WARN to pr_warn (git-fixes). o phy: qualcomm: call clk_disable_unprepare in the error handling (git-fixes). o pinctrl: armada-37xx: Add missing GPIO-only pins (git-fixes). o pinctrl: armada-37xx: Checks for errors in gpio_request_enable callback (git-fixes). o pinctrl: armada-37xx: Fix definitions for MPP pins 20-22 (git-fixes). o pinctrl: rockchip: add pinmux_ops.gpio_set_direction callback (git-fixes). o platform/x86: msi-laptop: Change DMI match / alias strings to fix module autoloading (git-fixes). o platform/x86: msi-laptop: Fix old-ec check for backlight registering (git-fixes). o platform/x86: msi-laptop: Fix resource cleanup (git-fixes). o power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() (git-fixes). o powerpc/64: Remove unused SYS_CALL_TABLE symbol (jsc#SLE-9246 git-fixes). o powerpc/fadump: align destination address to pagesize (bsc#1204728 ltc# 200074). o powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe() (jsc# SLE-13847 git-fixes). o powerpc/mm/64s: Drop pgd_huge() (bsc#1065729). o powerpc/mm: remove pmd_huge/pud_huge stubs and include hugetlb.h (bsc# 1065729). o powerpc/pci_dn: Add missing of_node_put() (bsc#1065729). o powerpc/powernv: add missing of_node_put() in opal_export_attrs() (bsc# 1065729). o powerpc/pseries: Interface to represent PAPR firmware attributes (bsc# 1200465 ltc#197256 jsc#PED-1931). o quota: widen timestamps for the fs_disk_quota structure (bsc#1203387). o regulator: qcom_rpm: Fix circular deferral regression (git-fixes). o rpmsg: qcom: glink: replace strncpy() with strscpy_pad() (git-fixes). o rtc: stmp3xxx: Add failure handling for stmp3xxx_wdt_register() (git-fixes). o s390/hypfs: avoid error message under KVM (bsc#1032323). o sbitmap: Avoid leaving waitqueue in invalid state in __sbq_wake_up() (git-fixes). o sbitmap: fix possible io hung due to lost wakeup (git-fixes). o scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() (git-fixes). o scsi: mpt3sas: Fix return value check of dma_get_required_mask() (git-fixes). o scsi: qla2xxx: Fix disk failure to rediscover (git-fixes). o selftest/powerpc: Add PAPR sysfs attributes sniff test (bsc#1200465 ltc# 197256 jsc#PED-1931). o selftests/powerpc: Skip energy_scale_info test on older firmware (git-fixes). o soc: qcom: smem_state: Add refcounting for the 'state->of_node' (git-fixes). o soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() (git-fixes). o soc: sunxi_sram: Make use of the helper function devm_platform_ioremap_resource() (git-fixes). o spi/omap100k:Fix PM disable depth imbalance in omap1_spi100k_probe (git-fixes). o spi: mt7621: Fix an error message in mt7621_spi_probe() (git-fixes). o spi: qup: add missing clk_disable_unprepare on error in spi_qup_pm_resume_runtime() (git-fixes). o spi: qup: add missing clk_disable_unprepare on error in spi_qup_resume() (git-fixes). o spi: s3c64xx: Fix large transfers with DMA (git-fixes). o staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv() (git-fixes). o staging: vt6655: fix potential memory leak (git-fixes). o staging: vt6655: fix some erroneous memory clean-up loops (git-fixes). o struct pci_config_window kABI workaround (bsc#1204382). o thermal: intel_powerclamp: Use first online CPU as control_cpu (git-fixes). o thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash (git-fixes). o tty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown (git-fixes). o tty: xilinx_uartps: Fix the ignore_status (git-fixes). o uas: add no-uas quirk for Hiksemi usb_disk (git-fixes). o uas: ignore UAS for Thinkplus chips (git-fixes). o usb-storage: Add Hiksemi USB3-FW to IGNORE_UAS (git-fixes). o usb: add quirks for Lenovo OneLink+ Dock (git-fixes). o usb: bdc: change state when port disconnected (git-fixes). o usb: dwc3: gadget: Do not set IMI for no_interrupt (git-fixes). o usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes). o usb: gadget: function: fix dangling pnp_string in f_printer.c (git-fixes). o usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info() (git-fixes). o usb: idmouse: fix an uninit-value in idmouse_open (git-fixes). o usb: mon: make mmapped memory read only (git-fixes). o usb: musb: Fix musb_gadget.c rxstate overflow bug (git-fixes). o vhost/vsock: Use kvmalloc/kvfree for larger packets (git-fixes). o watchdog: armada_37xx_wdt: Fix .set_timeout callback (git-fixes). o watchdog: ftwdt010_wdt: fix test for platform_get_irq() failure (git-fixes). o wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() (git-fixes). o wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg() (git-fixes). o wifi: brcmfmac: fix invalid address access when enabling SCAN log level (git-fixes). o wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() (git-fixes). o wifi: cfg80211: update hidden BSSes to avoid WARN_ON (git-fixes). o wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (other cases) (git-fixes). o wifi: mac80211: allow bw change during channel switch in mesh (git-fixes). o wifi: mac80211: do not drop packets smaller than the LLC-SNAP header on fast-rx (git-fixes). o wifi: mac80211_hwsim: avoid mac80211 warning on bad rate (git-fixes). o wifi: rt2x00: correctly set BBP register 86 for MT7620 (git-fixes). o wifi: rt2x00: do not run Rt5592 IQ calibration on MT7620 (git-fixes). o wifi: rt2x00: set SoC wmac clock register (git-fixes). o wifi: rt2x00: set VGC gain for both chains of MT7620 (git-fixes). o wifi: rt2x00: set correct TX_SW_CFG1 MAC register for MT7620 (git-fixes). o wifi: rtl8xxxu: Fix AIFS written to REG_EDCA_*_PARAM (git-fixes). o wifi: rtl8xxxu: Fix skb misuse in TX queue selection (git-fixes). o wifi: rtl8xxxu: Improve rtl8xxxu_queue_select (git-fixes). o wifi: rtl8xxxu: Remove copy-paste leftover in gen2_update_rate_mask (git-fixes). o wifi: rtl8xxxu: gen2: Fix mistake in path B IQ calibration (git-fixes). o wifi: rtl8xxxu: tighten bounds checking in rtl8xxxu_read_efuse() (git-fixes). o xfs: add missing assert in xfs_fsmap_owner_from_rmap (git-fixes). o xfs: enable big timestamps (bsc#1203387). o xfs: enable new inode btree counters feature (bsc#1203387). o xfs: explicitly define inode timestamp range (bsc#1203387). o xfs: fix memory corruption during remote attr value buffer invalidation (git-fixes). o xfs: fix s_maxbytes computation on 32-bit kernels (git-fixes). o xfs: hoist out xfs_resizefs_init_new_ags() (git-fixes). o xfs: move incore structures out of xfs_da_format.h (git-fixes). o xfs: quota: move to time64_t interfaces (bsc#1203387). o xfs: redefine xfs_ictimestamp_t (bsc#1203387). o xfs: redefine xfs_timestamp_t (bsc#1203387). o xfs: refactor remote attr value buffer invalidation (git-fixes). o xfs: remove obsolete AGF counter debugging (git-fixes). o xfs: rename `new' to `delta' in xfs_growfs_data_private() (git-fixes). o xfs: reserve data and rt quota at the same time (bsc#1203496). o xfs: slightly tweak an assert in xfs_fs_map_blocks (git-fixes). o xfs: store inode btree block counts in AGI header (bsc#1203387). o xfs: streamline xfs_attr3_leaf_inactive (git-fixes). o xfs: use a struct timespec64 for the in-core crtime (bsc#1203387). o xfs: use the finobt block counts to speed up mount times (bsc#1203387). o xfs: widen ondisk inode timestamps to deal with y2038+ (bsc#1203387). o xfs: widen ondisk quota expiration timestamps to handle y2038+ (bsc# 1203387). o xhci: Do not show warning for reinit on known broken suspend (git-fixes). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap Micro 5.2: zypper in -t patch openSUSE-Leap-Micro-5.2-2022-3929=1 o SUSE Linux Enterprise Module for Realtime 15-SP3: zypper in -t patch SUSE-SLE-Module-RT-15-SP3-2022-3929=1 o SUSE Linux Enterprise Micro 5.2: zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-3929=1 o SUSE Linux Enterprise Micro 5.1: zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-3929=1 Package List: o openSUSE Leap Micro 5.2 (x86_64): kernel-rt-5.3.18-150300.109.1 kernel-rt-debuginfo-5.3.18-150300.109.1 kernel-rt-debugsource-5.3.18-150300.109.1 o SUSE Linux Enterprise Module for Realtime 15-SP3 (x86_64): cluster-md-kmp-rt-5.3.18-150300.109.1 cluster-md-kmp-rt-debuginfo-5.3.18-150300.109.1 dlm-kmp-rt-5.3.18-150300.109.1 dlm-kmp-rt-debuginfo-5.3.18-150300.109.1 gfs2-kmp-rt-5.3.18-150300.109.1 gfs2-kmp-rt-debuginfo-5.3.18-150300.109.1 kernel-rt-5.3.18-150300.109.1 kernel-rt-debuginfo-5.3.18-150300.109.1 kernel-rt-debugsource-5.3.18-150300.109.1 kernel-rt-devel-5.3.18-150300.109.1 kernel-rt-devel-debuginfo-5.3.18-150300.109.1 kernel-rt_debug-debuginfo-5.3.18-150300.109.1 kernel-rt_debug-debugsource-5.3.18-150300.109.1 kernel-rt_debug-devel-5.3.18-150300.109.1 kernel-rt_debug-devel-debuginfo-5.3.18-150300.109.1 kernel-syms-rt-5.3.18-150300.109.1 ocfs2-kmp-rt-5.3.18-150300.109.1 ocfs2-kmp-rt-debuginfo-5.3.18-150300.109.1 o SUSE Linux Enterprise Module for Realtime 15-SP3 (noarch): kernel-devel-rt-5.3.18-150300.109.1 kernel-source-rt-5.3.18-150300.109.1 o SUSE Linux Enterprise Micro 5.2 (x86_64): kernel-rt-5.3.18-150300.109.1 kernel-rt-debuginfo-5.3.18-150300.109.1 kernel-rt-debugsource-5.3.18-150300.109.1 o SUSE Linux Enterprise Micro 5.1 (x86_64): kernel-rt-5.3.18-150300.109.1 kernel-rt-debuginfo-5.3.18-150300.109.1 kernel-rt-debugsource-5.3.18-150300.109.1 References: o https://www.suse.com/security/cve/CVE-2021-4037.html o https://www.suse.com/security/cve/CVE-2022-2153.html o https://www.suse.com/security/cve/CVE-2022-28748.html o https://www.suse.com/security/cve/CVE-2022-2964.html o https://www.suse.com/security/cve/CVE-2022-2978.html o https://www.suse.com/security/cve/CVE-2022-3176.html o https://www.suse.com/security/cve/CVE-2022-3424.html o https://www.suse.com/security/cve/CVE-2022-3521.html o https://www.suse.com/security/cve/CVE-2022-3524.html o https://www.suse.com/security/cve/CVE-2022-3535.html o https://www.suse.com/security/cve/CVE-2022-3542.html o https://www.suse.com/security/cve/CVE-2022-3545.html o https://www.suse.com/security/cve/CVE-2022-3565.html o https://www.suse.com/security/cve/CVE-2022-3577.html o https://www.suse.com/security/cve/CVE-2022-3586.html o https://www.suse.com/security/cve/CVE-2022-3594.html o https://www.suse.com/security/cve/CVE-2022-3621.html o https://www.suse.com/security/cve/CVE-2022-3625.html o https://www.suse.com/security/cve/CVE-2022-3629.html o https://www.suse.com/security/cve/CVE-2022-3640.html o https://www.suse.com/security/cve/CVE-2022-3646.html o https://www.suse.com/security/cve/CVE-2022-3649.html o https://www.suse.com/security/cve/CVE-2022-39189.html o https://www.suse.com/security/cve/CVE-2022-42703.html o https://www.suse.com/security/cve/CVE-2022-43750.html o https://bugzilla.suse.com/1032323 o https://bugzilla.suse.com/1065729 o https://bugzilla.suse.com/1196018 o https://bugzilla.suse.com/1198702 o https://bugzilla.suse.com/1200465 o https://bugzilla.suse.com/1200788 o https://bugzilla.suse.com/1201725 o https://bugzilla.suse.com/1202686 o https://bugzilla.suse.com/1202700 o https://bugzilla.suse.com/1203066 o https://bugzilla.suse.com/1203098 o https://bugzilla.suse.com/1203387 o https://bugzilla.suse.com/1203391 o https://bugzilla.suse.com/1203496 o https://bugzilla.suse.com/1204053 o https://bugzilla.suse.com/1204166 o https://bugzilla.suse.com/1204168 o https://bugzilla.suse.com/1204354 o https://bugzilla.suse.com/1204355 o https://bugzilla.suse.com/1204382 o https://bugzilla.suse.com/1204402 o https://bugzilla.suse.com/1204415 o https://bugzilla.suse.com/1204417 o https://bugzilla.suse.com/1204431 o https://bugzilla.suse.com/1204439 o https://bugzilla.suse.com/1204470 o https://bugzilla.suse.com/1204479 o https://bugzilla.suse.com/1204574 o https://bugzilla.suse.com/1204575 o https://bugzilla.suse.com/1204619 o https://bugzilla.suse.com/1204635 o https://bugzilla.suse.com/1204637 o https://bugzilla.suse.com/1204646 o https://bugzilla.suse.com/1204647 o https://bugzilla.suse.com/1204653 o https://bugzilla.suse.com/1204728 o https://bugzilla.suse.com/1204753 o https://bugzilla.suse.com/1204754 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23PMskNZI30y1K9AQiWWg/9FM+CEUiem80QB2XdNkceZLBrGhoqdzds tqweBPqouUdPcx0CEwJXb5KdkYlRB0xLtQQrZQH9mFyuphCQIaxRN1hc6iH8UOrW dGaXu2CE+VVdr1E1mMZSfjB/74psK0sviQme51kj5EC/A7vMsZkS7he9VEn/VXYE 6Ku+BYlOOJSTiJswlINSROHNwRy/R0ZBaHZ4ucHC9BbaNHJ9/Z9ofkVDHkCpmViO Lgw+1B+MW22X4eNv9VD5l+C0eg/AaueLd3jcF7Jm2GdAGWJBl0OOSC22xcEAW6qE 4AyM4fdO+Vuid8rBddqq/80p/w5JDufd1uaEFCCaIev1sismOsLMws8eAbmoiD9e a3l3MxqVCR91iwjd1Jy7+hQ+Z4Ag7wZGFdNrd1uVkjjOIOSegfTRI32wPeC+O0Y1 qkmdUfM2DReeJPIqWfP+o7xmDBZj0tnXhBeeDl+18LOqdWBOJAcWNaXnZ+jUgxkw GwcsHABwTEIS/2wPsQ+hNwKGnt/xVlQv6Z3UGCjrxpwrnmpeKmcSzcUSiThxmK/c sQXLLoij9Xpl0UJv/fhXE90IR0/HGahpQ473aIiOqwpqNXK6gxJWiLGfGDK8z52z cBkRilzHI2qXSKBrF4nEMspd/+faSXSMdnn9BGR8L3mKlDOTFvOQMForTYG8zJoV AVxwsb6kmZk= =j/NF -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5810 - [SUSE] xen: CVSS (Max): 8.1

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5810 Security update for xen 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: xen Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-42326 CVE-2022-42325 CVE-2022-42323 CVE-2022-42322 CVE-2022-42321 CVE-2022-42320 CVE-2022-42319 CVE-2022-42318 CVE-2022-42317 CVE-2022-42316 CVE-2022-42315 CVE-2022-42314 CVE-2022-42313 CVE-2022-42312 CVE-2022-42311 CVE-2022-42310 CVE-2022-42309 CVE-2022-33748 CVE-2022-33746 CVE-2022-33742 CVE-2022-33741 CVE-2022-33740 CVE-2022-26365 CVE-2022-26364 CVE-2022-26363 CVE-2021-28689 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20223928-1 Comment: CVSS (Max): 8.1 CVE-2022-26364 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:3928-1 Rating: important References: #1185104 #1193923 #1199966 #1200762 #1203806 #1203807 #1204482 #1204485 #1204487 #1204488 #1204489 #1204490 #1204494 #1204496 Cross-References: CVE-2021-28689 CVE-2022-26365 CVE-2022-33740 CVE-2022-33741 CVE-2022-33742 CVE-2022-33746 CVE-2022-33748 CVE-2022-42309 CVE-2022-42310 CVE-2022-42311 CVE-2022-42312 CVE-2022-42313 CVE-2022-42314 CVE-2022-42315 CVE-2022-42316 CVE-2022-42317 CVE-2022-42318 CVE-2022-42319 CVE-2022-42320 CVE-2022-42321 CVE-2022-42322 CVE-2022-42323 CVE-2022-42325 CVE-2022-42326 Affected Products: SUSE CaaS Platform 4.0 SUSE Enterprise Storage 6 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS SUSE Linux Enterprise Server 15-SP1-BCL SUSE Linux Enterprise Server 15-SP1-LTSS SUSE Linux Enterprise Server for SAP 15-SP1 ______________________________________________________________________________ An update that fixes 24 vulnerabilities is now available. Description: This update for xen fixes the following issues: o CVE-2022-33746: Fixed DoS due to excessively long P2M pool freeing (bsc# 1203806). o CVE-2022-33748: Fixed DoS due to race in locking (bsc#1203807). o CVE-2021-28689: Fixed speculative vulnerabilities with bare (non-shim) 32-bit PV guests (bsc#1185104). o CVE-2022-42311, CVE-2022-42312, CVE-2022-42313, CVE-2022-42314, CVE-2022-42315, CVE-2022-42316, CVE-2022-42317, CVE-2022-42318: xen: Xenstore: Guests can let xenstored run out of memory (bsc#1204482) o CVE-2022-42309: xen: Xenstore: Guests can crash xenstored (bsc#1204485) o CVE-2022-42310: xen: Xenstore: Guests can create orphaned Xenstore nodes (bsc#1204487) o CVE-2022-42319: xen: Xenstore: Guests can cause Xenstore to not free temporary memory (bsc#1204488) o CVE-2022-42320: xen: Xenstore: Guests can get access to Xenstore nodes of deleted domains (bsc#1204489) o CVE-2022-42321: xen: Xenstore: Guests can crash xenstored via exhausting the stack (bsc#1204490) o CVE-2022-42322,CVE-2022-42323: xen: Xenstore: cooperating guests can create arbitrary numbers of nodes (bsc#1204494) o CVE-2022-42325,CVE-2022-42326: xen: Xenstore: Guests can create arbitray number of nodes via transactions (bsc#1204496) o CVE-2022-26363,CVE-2022-26364: xen: Insufficient care with non-coherent mappings (bsc#1199966). o CVE-2022-26365,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742: xen: Linux disk/nic frontends data leaks (bsc#1200762). o xen: Frontends vulnerable to backends (bsc#1193923). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Server for SAP 15-SP1: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3928=1 o SUSE Linux Enterprise Server 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3928=1 o SUSE Linux Enterprise Server 15-SP1-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3928=1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3928=1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3928=1 o SUSE Enterprise Storage 6: zypper in -t patch SUSE-Storage-6-2022-3928=1 o SUSE CaaS Platform 4.0: To install this update, use the SUSE CaaS Platform 'skuba' tool. I will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. Package List: o SUSE Linux Enterprise Server for SAP 15-SP1 (x86_64): xen-4.12.4_30-150100.3.80.1 xen-debugsource-4.12.4_30-150100.3.80.1 xen-devel-4.12.4_30-150100.3.80.1 xen-libs-4.12.4_30-150100.3.80.1 xen-libs-debuginfo-4.12.4_30-150100.3.80.1 xen-tools-4.12.4_30-150100.3.80.1 xen-tools-debuginfo-4.12.4_30-150100.3.80.1 xen-tools-domU-4.12.4_30-150100.3.80.1 xen-tools-domU-debuginfo-4.12.4_30-150100.3.80.1 o SUSE Linux Enterprise Server 15-SP1-LTSS (x86_64): xen-4.12.4_30-150100.3.80.1 xen-debugsource-4.12.4_30-150100.3.80.1 xen-devel-4.12.4_30-150100.3.80.1 xen-libs-4.12.4_30-150100.3.80.1 xen-libs-debuginfo-4.12.4_30-150100.3.80.1 xen-tools-4.12.4_30-150100.3.80.1 xen-tools-debuginfo-4.12.4_30-150100.3.80.1 xen-tools-domU-4.12.4_30-150100.3.80.1 xen-tools-domU-debuginfo-4.12.4_30-150100.3.80.1 o SUSE Linux Enterprise Server 15-SP1-BCL (x86_64): xen-4.12.4_30-150100.3.80.1 xen-debugsource-4.12.4_30-150100.3.80.1 xen-devel-4.12.4_30-150100.3.80.1 xen-libs-4.12.4_30-150100.3.80.1 xen-libs-debuginfo-4.12.4_30-150100.3.80.1 xen-tools-4.12.4_30-150100.3.80.1 xen-tools-debuginfo-4.12.4_30-150100.3.80.1 xen-tools-domU-4.12.4_30-150100.3.80.1 xen-tools-domU-debuginfo-4.12.4_30-150100.3.80.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (x86_64): xen-4.12.4_30-150100.3.80.1 xen-debugsource-4.12.4_30-150100.3.80.1 xen-devel-4.12.4_30-150100.3.80.1 xen-libs-4.12.4_30-150100.3.80.1 xen-libs-debuginfo-4.12.4_30-150100.3.80.1 xen-tools-4.12.4_30-150100.3.80.1 xen-tools-debuginfo-4.12.4_30-150100.3.80.1 xen-tools-domU-4.12.4_30-150100.3.80.1 xen-tools-domU-debuginfo-4.12.4_30-150100.3.80.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (x86_64): xen-4.12.4_30-150100.3.80.1 xen-debugsource-4.12.4_30-150100.3.80.1 xen-devel-4.12.4_30-150100.3.80.1 xen-libs-4.12.4_30-150100.3.80.1 xen-libs-debuginfo-4.12.4_30-150100.3.80.1 xen-tools-4.12.4_30-150100.3.80.1 xen-tools-debuginfo-4.12.4_30-150100.3.80.1 xen-tools-domU-4.12.4_30-150100.3.80.1 xen-tools-domU-debuginfo-4.12.4_30-150100.3.80.1 o SUSE Enterprise Storage 6 (x86_64): xen-4.12.4_30-150100.3.80.1 xen-debugsource-4.12.4_30-150100.3.80.1 xen-devel-4.12.4_30-150100.3.80.1 xen-libs-4.12.4_30-150100.3.80.1 xen-libs-debuginfo-4.12.4_30-150100.3.80.1 xen-tools-4.12.4_30-150100.3.80.1 xen-tools-debuginfo-4.12.4_30-150100.3.80.1 xen-tools-domU-4.12.4_30-150100.3.80.1 xen-tools-domU-debuginfo-4.12.4_30-150100.3.80.1 o SUSE CaaS Platform 4.0 (x86_64): xen-4.12.4_30-150100.3.80.1 xen-debugsource-4.12.4_30-150100.3.80.1 xen-devel-4.12.4_30-150100.3.80.1 xen-libs-4.12.4_30-150100.3.80.1 xen-libs-debuginfo-4.12.4_30-150100.3.80.1 xen-tools-4.12.4_30-150100.3.80.1 xen-tools-debuginfo-4.12.4_30-150100.3.80.1 xen-tools-domU-4.12.4_30-150100.3.80.1 xen-tools-domU-debuginfo-4.12.4_30-150100.3.80.1 References: o https://www.suse.com/security/cve/CVE-2021-28689.html o https://www.suse.com/security/cve/CVE-2022-26365.html o https://www.suse.com/security/cve/CVE-2022-33740.html o https://www.suse.com/security/cve/CVE-2022-33741.html o https://www.suse.com/security/cve/CVE-2022-33742.html o https://www.suse.com/security/cve/CVE-2022-33746.html o https://www.suse.com/security/cve/CVE-2022-33748.html o https://www.suse.com/security/cve/CVE-2022-42309.html o https://www.suse.com/security/cve/CVE-2022-42310.html o https://www.suse.com/security/cve/CVE-2022-42311.html o https://www.suse.com/security/cve/CVE-2022-42312.html o https://www.suse.com/security/cve/CVE-2022-42313.html o https://www.suse.com/security/cve/CVE-2022-42314.html o https://www.suse.com/security/cve/CVE-2022-42315.html o https://www.suse.com/security/cve/CVE-2022-42316.html o https://www.suse.com/security/cve/CVE-2022-42317.html o https://www.suse.com/security/cve/CVE-2022-42318.html o https://www.suse.com/security/cve/CVE-2022-42319.html o https://www.suse.com/security/cve/CVE-2022-42320.html o https://www.suse.com/security/cve/CVE-2022-42321.html o https://www.suse.com/security/cve/CVE-2022-42322.html o https://www.suse.com/security/cve/CVE-2022-42323.html o https://www.suse.com/security/cve/CVE-2022-42325.html o https://www.suse.com/security/cve/CVE-2022-42326.html o https://bugzilla.suse.com/1185104 o https://bugzilla.suse.com/1193923 o https://bugzilla.suse.com/1199966 o https://bugzilla.suse.com/1200762 o https://bugzilla.suse.com/1203806 o https://bugzilla.suse.com/1203807 o https://bugzilla.suse.com/1204482 o https://bugzilla.suse.com/1204485 o https://bugzilla.suse.com/1204487 o https://bugzilla.suse.com/1204488 o https://bugzilla.suse.com/1204489 o https://bugzilla.suse.com/1204490 o https://bugzilla.suse.com/1204494 o https://bugzilla.suse.com/1204496 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23PJ8kNZI30y1K9AQiGkg/+IE2jQVryH0XVAIc7z08+zzQzOAnHJjVy BshsnkjmNJYPx7P43SXMqIqzCV6X/Gx0muSx85lrda/4bZmScDw90no0DFTcvM1O 0FE6xl3Mf+F/AfHaJZVnbKzltwpsnV08OH0swVFJCSqr1aF80IzmF4+Br1uNSe/Q CMUKCFZPBnwVqhlCyMU9luy0GMVvBbmQvRNVAJPZaYk6BCTluq6Gr4wUXUQ3o6ZD 28TdpBk64ucd+egG5jjbHmLg7BuCQMDG3H7w0ZTRkTFgJvYHSXBJjPD2CioldIPN jpAtsbctVjfEFpCYg3ru5tnN8AeCKcx5kN1LHH9d4fRuAuMxid3u6qVyMKtLLFPU UOD2C3CnBbpCn+QHblFnT1uCtcjP/Bf/1ErtwWL/ZreDXoAwFsuPtBby/LXfLrnq pV6W9gS0FmLDSjNV/F5YJAmROcUaNa2omCW+2wCbeCE1czMQvdgPZTNMyxDqufkj pVcMMpuwPq1PW3eAvkeI45vPn/W0cd9bMYtafF1LCBmkBTILUkgeUCoJaM4YF9kS VWJBS3q2dAydS6Jk0PKRDAuO33WnifQB/DgmmQBP/4RVPzOL07F9acFOZTSCRZ+I sKgv4x2fSawS+CVerk3Hc+Y1DV/E6TXy8cnF0eeZMEzX4fymFuiEd7HjduH0bP5z JH0SDTZtByE= =nylf -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5809 - [SUSE] python3-lxml: CVSS (Max): 6.1

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5809 Security update for python3-lxml 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: python3-lxml Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2021-28957 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20223934-1 Comment: CVSS (Max): 6.1 CVE-2021-28957 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for python3-lxml ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:3934-1 Rating: moderate References: #1184177 Cross-References: CVE-2021-28957 Affected Products: SUSE Linux Enterprise High Performance Computing 12 SUSE Linux Enterprise Module for Public Cloud 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Server 12-SP3 SUSE Linux Enterprise Server 12-SP4 SUSE Linux Enterprise Server 12-SP5 SUSE Linux Enterprise Server for SAP Applications 12 SUSE Linux Enterprise Server for SAP Applications 12-SP3 SUSE Linux Enterprise Server for SAP Applications 12-SP4 SUSE Linux Enterprise Server for SAP Applications 12-SP5 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for python3-lxml fixes the following issues: - - CVE-2021-28957: Fixed XSS due to missing input sanitization for HTML5 attributes (bsc#1184177). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-3934=1 Package List: o SUSE Linux Enterprise Module for Public Cloud 12 (aarch64 ppc64le s390x x86_64): python3-lxml-3.3.5-3.15.1 o SUSE Linux Enterprise Module for Public Cloud 12 (noarch): python3-lxml-doc-3.3.5-3.15.1 References: o https://www.suse.com/security/cve/CVE-2021-28957.html o https://bugzilla.suse.com/1184177 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23PG8kNZI30y1K9AQjXlQ/+JHImz47fnNoYSIEZ+N4lsjcnBb4dy6py XUWjyue3BrU6gM0MMmk/zJ+lAQ7DJZdZA8aAI7e9G8wPKOFHAR/T+Fd4MdbS28iI lAzwgVzeoRwbaRRhGNd1isMd7cs4z3JfGt0rlXNs+yJB4xmSVFQ8vN+G1GVy2Bbh MbEcx5AjNT8x5A//3ZPzgRpRk6DT+fI6PPcJNXp3V7TG+tuidGA0Q7yvrU9AA8du WGFtrXEln9oOuq9KgMT0YEf7zn/IRI00/FK1TmkG+poBRPTg870kpR28dvW9e+7v W0GaEdU7glvj9wJj1ocf3d9ysB8ij6Q7p46j05ZiVH5sfEAY4dH12YShNGS6eh+g BjdO/MV4FzO63MNamtGURNp7N7pbI5jH7iWuzUkR6TyjQWdhO4rOS/9I5L7XZa26 QyuZXsCzEqG4jt99IziRWB5z7Br4QaRcGl+wgxPo8HuXkq8NjEri8JREyTAmFoqS 04vAQDws5kjgIT3OmDu1dXr7j3gBEne56qXqoaC26ZfbD1kvwSRqj5aQBwcn0nUx 23/YkAyC9r0qxhbpErAWoS6ZNaTs14Aau+qH/dp0p6WkNw7tAoISktk+Eg2L2Zvn F86Zm9LNtyocx/V0phbRZQ6Qrk82cFwW0chEc7k09AWxj4X49g8LKocMr2q37IJl AuTJpVj/XoE= =7W7p -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5808 - [SUSE] git: CVSS (Max): 6.3

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5808 Security update for git 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: git Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-39260 CVE-2022-39253 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20223931-1 Comment: CVSS (Max): 6.3 CVE-2022-39260 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for git ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:3931-1 Rating: moderate References: #1204455 #1204456 Cross-References: CVE-2022-39253 CVE-2022-39260 Affected Products: SUSE Enterprise Storage 7.1 SUSE Linux Enterprise Desktop 15-SP3 SUSE Linux Enterprise Desktop 15-SP4 SUSE Linux Enterprise High Performance Computing 15-SP3 SUSE Linux Enterprise High Performance Computing 15-SP4 SUSE Linux Enterprise Module for Basesystem 15-SP3 SUSE Linux Enterprise Module for Basesystem 15-SP4 SUSE Linux Enterprise Module for Development Tools 15-SP3 SUSE Linux Enterprise Module for Development Tools 15-SP4 SUSE Linux Enterprise Server 15-SP3 SUSE Linux Enterprise Server 15-SP4 SUSE Linux Enterprise Server for SAP Applications 15-SP3 SUSE Linux Enterprise Server for SAP Applications 15-SP4 SUSE Manager Proxy 4.2 SUSE Manager Proxy 4.3 SUSE Manager Retail Branch Server 4.2 SUSE Manager Retail Branch Server 4.3 SUSE Manager Server 4.2 SUSE Manager Server 4.3 openSUSE Leap 15.3 openSUSE Leap 15.4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for git fixes the following issues: - - CVE-2022-39260: Fixed overflow in split_cmdline() (bsc#1204456). - CVE-2022-39253: Fixed dereference issue with symbolic links via the `--local` clone mechanism (bsc#1204455). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-3931=1 o openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-3931=1 o SUSE Linux Enterprise Module for Development Tools 15-SP4: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2022-3931=1 o SUSE Linux Enterprise Module for Development Tools 15-SP3: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-3931=1 o SUSE Linux Enterprise Module for Basesystem 15-SP4: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3931=1 o SUSE Linux Enterprise Module for Basesystem 15-SP3: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-3931=1 Package List: o openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64): git-2.35.3-150300.10.18.1 git-arch-2.35.3-150300.10.18.1 git-core-2.35.3-150300.10.18.1 git-core-debuginfo-2.35.3-150300.10.18.1 git-credential-gnome-keyring-2.35.3-150300.10.18.1 git-credential-gnome-keyring-debuginfo-2.35.3-150300.10.18.1 git-credential-libsecret-2.35.3-150300.10.18.1 git-credential-libsecret-debuginfo-2.35.3-150300.10.18.1 git-cvs-2.35.3-150300.10.18.1 git-daemon-2.35.3-150300.10.18.1 git-daemon-debuginfo-2.35.3-150300.10.18.1 git-debuginfo-2.35.3-150300.10.18.1 git-debugsource-2.35.3-150300.10.18.1 git-email-2.35.3-150300.10.18.1 git-gui-2.35.3-150300.10.18.1 git-p4-2.35.3-150300.10.18.1 git-svn-2.35.3-150300.10.18.1 git-web-2.35.3-150300.10.18.1 gitk-2.35.3-150300.10.18.1 perl-Git-2.35.3-150300.10.18.1 o openSUSE Leap 15.4 (noarch): git-doc-2.35.3-150300.10.18.1 o openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): git-2.35.3-150300.10.18.1 git-arch-2.35.3-150300.10.18.1 git-core-2.35.3-150300.10.18.1 git-core-debuginfo-2.35.3-150300.10.18.1 git-credential-gnome-keyring-2.35.3-150300.10.18.1 git-credential-gnome-keyring-debuginfo-2.35.3-150300.10.18.1 git-credential-libsecret-2.35.3-150300.10.18.1 git-credential-libsecret-debuginfo-2.35.3-150300.10.18.1 git-cvs-2.35.3-150300.10.18.1 git-daemon-2.35.3-150300.10.18.1 git-daemon-debuginfo-2.35.3-150300.10.18.1 git-debuginfo-2.35.3-150300.10.18.1 git-debugsource-2.35.3-150300.10.18.1 git-email-2.35.3-150300.10.18.1 git-gui-2.35.3-150300.10.18.1 git-p4-2.35.3-150300.10.18.1 git-svn-2.35.3-150300.10.18.1 git-web-2.35.3-150300.10.18.1 gitk-2.35.3-150300.10.18.1 perl-Git-2.35.3-150300.10.18.1 o openSUSE Leap 15.3 (noarch): git-doc-2.35.3-150300.10.18.1 o SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le s390x x86_64): git-2.35.3-150300.10.18.1 git-arch-2.35.3-150300.10.18.1 git-cvs-2.35.3-150300.10.18.1 git-daemon-2.35.3-150300.10.18.1 git-daemon-debuginfo-2.35.3-150300.10.18.1 git-debuginfo-2.35.3-150300.10.18.1 git-debugsource-2.35.3-150300.10.18.1 git-email-2.35.3-150300.10.18.1 git-gui-2.35.3-150300.10.18.1 git-svn-2.35.3-150300.10.18.1 git-web-2.35.3-150300.10.18.1 gitk-2.35.3-150300.10.18.1 perl-Git-2.35.3-150300.10.18.1 o SUSE Linux Enterprise Module for Development Tools 15-SP4 (noarch): git-doc-2.35.3-150300.10.18.1 o SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64): git-2.35.3-150300.10.18.1 git-arch-2.35.3-150300.10.18.1 git-cvs-2.35.3-150300.10.18.1 git-daemon-2.35.3-150300.10.18.1 git-daemon-debuginfo-2.35.3-150300.10.18.1 git-debuginfo-2.35.3-150300.10.18.1 git-debugsource-2.35.3-150300.10.18.1 git-email-2.35.3-150300.10.18.1 git-gui-2.35.3-150300.10.18.1 git-svn-2.35.3-150300.10.18.1 git-web-2.35.3-150300.10.18.1 gitk-2.35.3-150300.10.18.1 o SUSE Linux Enterprise Module for Development Tools 15-SP3 (noarch): git-doc-2.35.3-150300.10.18.1 o SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64): git-core-2.35.3-150300.10.18.1 git-core-debuginfo-2.35.3-150300.10.18.1 git-debuginfo-2.35.3-150300.10.18.1 git-debugsource-2.35.3-150300.10.18.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64): git-core-2.35.3-150300.10.18.1 git-core-debuginfo-2.35.3-150300.10.18.1 git-debuginfo-2.35.3-150300.10.18.1 git-debugsource-2.35.3-150300.10.18.1 perl-Git-2.35.3-150300.10.18.1 References: o https://www.suse.com/security/cve/CVE-2022-39253.html o https://www.suse.com/security/cve/CVE-2022-39260.html o https://bugzilla.suse.com/1204455 o https://bugzilla.suse.com/1204456 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23PE8kNZI30y1K9AQhmxxAAt1rwTJoHfOhWzIUH8cfH4Jv2TPviLz91 vD9ffF13TIu3onkjsKamSVAOTTOvUZo1PK2HaI88tvjn4RMmfbRq1Yzd4XYx9tpo fGyVAxHSfmZj2MCn3nEZNy2ateZkFRsr0Y2YMWr0+6TmA2ZeDpInFkziw47Y+qg2 gvmI7d330Fj0EaFQ9BKLeriQPYm0Qf+nuJuw4QuNvu0druse/I1flqGsXci/dVfZ fCt1Fffq52Q3zQambBkc3vg8YslgJJxc6IEYpNoFCkSwq3x7UcgKGqEcfyT8JC1R 6vMBICpnMgX4AixIyw72tqX/kCBYB4OHkH21RRQO4Hm1TcCXp2iNegB/P5MpJWzS cXan53klHh8C/ygGmDIle34siqzqlxmNS+Yd8PfEJd41wsex5uXyaYoOGq1bxCIZ zGSDuq6oKF4ao0bSJaI1J1ehCVrlP2PXP6THZolvkKoIoA14bmkJ7wxQXHp8kpou OfCOr4BFH34QG4HY7SkQkOJi1VmXkBJvlkc/N8+tPcvKSjeEOUddBxM3HQW4sy6K X+xY8GUYgjZ0OwFdNVRVBleFf/bjmCP+2I7kWrWLw2yo+L4ByiKUjSk61Aoyudn6 Qp023qUl5YVuWgclpf8BMb97Juys/aEkQX6HCt5wzPkiyeJaOD+LUiwsDqijsSU1 qLeQiQ3dGwk= =v28v -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5807 - [SUSE] python: CVSS (Max): 7.4

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5807 Security update for python 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: python Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2021-28861 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20223940-1 Comment: CVSS (Max): 7.4 CVE-2021-28861 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for python ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:3940-1 Rating: important References: #1202624 Cross-References: CVE-2021-28861 Affected Products: SUSE Linux Enterprise Server 12-SP2-BCL SUSE Linux Enterprise Server 12-SP3-BCL ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for python fixes the following issues: o CVE-2021-28861: Fixed an open redirection vulnerability in the HTTP server when an URI path starts with // BaseHTTPServer (bsc#1202624). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Server 12-SP3-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2022-3940=1 o SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-3940=1 Package List: o SUSE Linux Enterprise Server 12-SP3-BCL (noarch): python-doc-2.7.18-28.90.1 python-doc-pdf-2.7.18-28.90.1 o SUSE Linux Enterprise Server 12-SP3-BCL (x86_64): libpython2_7-1_0-2.7.18-28.90.1 libpython2_7-1_0-32bit-2.7.18-28.90.1 libpython2_7-1_0-debuginfo-2.7.18-28.90.1 libpython2_7-1_0-debuginfo-32bit-2.7.18-28.90.1 python-2.7.18-28.90.1 python-32bit-2.7.18-28.90.1 python-base-2.7.18-28.90.1 python-base-32bit-2.7.18-28.90.1 python-base-debuginfo-2.7.18-28.90.1 python-base-debuginfo-32bit-2.7.18-28.90.1 python-base-debugsource-2.7.18-28.90.1 python-curses-2.7.18-28.90.1 python-curses-debuginfo-2.7.18-28.90.1 python-debuginfo-2.7.18-28.90.1 python-debuginfo-32bit-2.7.18-28.90.1 python-debugsource-2.7.18-28.90.1 python-demo-2.7.18-28.90.1 python-devel-2.7.18-28.90.1 python-gdbm-2.7.18-28.90.1 python-gdbm-debuginfo-2.7.18-28.90.1 python-idle-2.7.18-28.90.1 python-tk-2.7.18-28.90.1 python-tk-debuginfo-2.7.18-28.90.1 python-xml-2.7.18-28.90.1 python-xml-debuginfo-2.7.18-28.90.1 o SUSE Linux Enterprise Server 12-SP2-BCL (noarch): python-doc-2.7.18-28.90.1 python-doc-pdf-2.7.18-28.90.1 o SUSE Linux Enterprise Server 12-SP2-BCL (x86_64): libpython2_7-1_0-2.7.18-28.90.1 libpython2_7-1_0-32bit-2.7.18-28.90.1 libpython2_7-1_0-debuginfo-2.7.18-28.90.1 libpython2_7-1_0-debuginfo-32bit-2.7.18-28.90.1 python-2.7.18-28.90.1 python-32bit-2.7.18-28.90.1 python-base-2.7.18-28.90.1 python-base-32bit-2.7.18-28.90.1 python-base-debuginfo-2.7.18-28.90.1 python-base-debuginfo-32bit-2.7.18-28.90.1 python-base-debugsource-2.7.18-28.90.1 python-curses-2.7.18-28.90.1 python-curses-debuginfo-2.7.18-28.90.1 python-debuginfo-2.7.18-28.90.1 python-debuginfo-32bit-2.7.18-28.90.1 python-debugsource-2.7.18-28.90.1 python-demo-2.7.18-28.90.1 python-gdbm-2.7.18-28.90.1 python-gdbm-debuginfo-2.7.18-28.90.1 python-idle-2.7.18-28.90.1 python-tk-2.7.18-28.90.1 python-tk-debuginfo-2.7.18-28.90.1 python-xml-2.7.18-28.90.1 python-xml-debuginfo-2.7.18-28.90.1 References: o https://www.suse.com/security/cve/CVE-2021-28861.html o https://bugzilla.suse.com/1202624 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23PB8kNZI30y1K9AQhXnBAAmjbXyQriEcnBc51dg5j4jGW1nztLslmi 2eL0Uia9oF9YmLDfjjsRrNYK7NgZNde1PhTQ+UUK7cO6D+1XFcM/cqJavhBul4Bk FmTBbvFGS3IXQV3vuaC0rPGaUDLP1IVNM9mVw1l8pxA4NhHkkbwFvMRh+yWhucqm tubcp1A4Oc/6xTBYJQmrrauYmpmcuTLaCeTlc+a0TU4QQ8pSSgndTKSiwvQrR7Gd 3MAcflMsDTjxd7vB4UGP2Q6OYGIXZImJ9AkHOVZdjXLz6Nmb3feBegHsZY33wREI 35uKNLaa3kxk8m/E23/4XWKR+l0HJMXeEnm/CmGswWKJQLKErs6f7q2h4/he2zIv m03K8Vy4xQACv5gYhm+yitM1pHrOYRm3wXyp9tH8k3Q1Bpu962yUtL7HIxwPeFno EDiJuKe/D8PEnw49YknnrGqUijjgf+SiuxetrxjvjF5xePzWSff/n3n0QMP8j9f0 SS2d09ja+Mrvx3GU2SYW765+bWTq4oXv3AHXiGlwNYnX4mW+dkuRTBUz1am6XXBT XE/tVl1eYzm0+le2FErV1N7OwJniGu3zIwuiKu9k46LMMZEoKthSY1IobNCDakrG hbKTs2E5ed/MDHPOlzdHvFG5kWMmc9YDZg/zJDnbg49euVt7rdzoUYu2jYwc/fvG WM3urQnnoUQ= =ZhR0 -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5806 - [Android] Intel Support Android App: CVSS (Max): 5.9

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5806 Intel Support Android App Advisory 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Intel Support Android App Publisher: Intel Operating System: Android Resolution: Patch/Upgrade CVE Names: CVE-2022-36367 CVE-2022-30691 Original Bulletin: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00740.html Comment: CVSS (Max): 5.9 CVE-2022-30691 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H) CVSS Source: Intel Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- Intel ID: INTEL-SA-00740 Advisory Category: Software Impact of vulnerability : Escalation of Privilege, Information Disclosure Severity rating : MEDIUM Original release: 11/08/2022 Last revised: 11/08/2022 Summary: Potential security vulnerabilities in the Intel Support Android application may allow escalation of privilege or information disclosure. Intel is releasing software updates to mitigate these potential vulnerabilities. Vulnerability Details: CVEID: CVE-2022-30691 Description: Uncontrolled resource consumption in the Intel(R) Support Android application before version 22.02.28 may allow an authenticated user to potentially enable denial of service via local access. CVSS Base Score: 5.9 Medium CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H CVEID: CVE-2022-36367 Description: Incorrect default permissions in the Intel(R) Support Android application before version v22.02.28 may allow a privileged user to potentially enable information disclosure via local access. CVSS Base Score: 4.4 Medium CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N Affected Products: Intel Support Android application before version v22.02.28. Recommendations: Intel recommends updating the Intel Support Android application to version v22.02.28 or later. Updates are available for download at this location: https://play.google.com/store/apps/details?id=com.intel.ark Acknowledgements: Intel would like to thank Sheikh Rishad for reporting these issues. Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available. Revision History Revision Date Description 1.0 11/08/2022 Initial Release - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23KrMkNZI30y1K9AQg+Ag//cjN5f3A1J24O9ZDL5BM8Ff+4OySSvglF vx7G8dY50F9quATCIyrlOff9ApaVdoQaYvez5VXL3EuZgG9xA+fSoetmRIgZJ3hm 1UID2azIoBasVKapy0XB9Kww2+65he1MS3w14Ed6aBDi+SPrQV9tL9FYrdjOQ0I2 NVJinkVDLPbjn7Xud8BVtYlfaXEZ1rguzhSxeP3LzIoYfJtPGhTjyz7NIlx9+Ve4 VlgAuOKMge33CY+YK6pbMVKAJWIb2VlccHJwFxGlzebz4GPikMLzsOk52nvb0Z2O 6itZqW+tPfdKPIrugkP8F483AV45a95VGgOYCUFwj1CA1v0WE1eE6JySf0r0KvGl z9WP9pQa2y67MRuGo0kaOfuuK9DW/k3kBIrhT/GsNXx/1r7WtSpN96dGO4wjQWqp CHhHRHcG1MoHcx+bqa5fhTamvgBbMkCLQ4Ar2b567+hdVT48qjdyu/RtDV/4garF VXaukC72S1kcyV/Sbw2mGMJWf1zfsP91//w+tvgq+6vn3+VkKwy9+zqSrQhyADkH qU1hzz/BwnWltBpZf0K9V4XJ4x0jcBK7X2NgYybsmbmrCGakvc3eA7RHiXLn++Tu J5mHbAZJs/6aL8JU/veEm6jMzksRnoF2QRaZSRsZni3VyXKoET+j+isU/UhUvrBq 6kt5r0S2Z8M= =W+C2 -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5805 - [Win] Intel NUC Kit Wireless Adapter: CVSS (Max): 6.7

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5805 Intel NUC Kit Wireless Adapter Advisory 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Intel NUC Kit Wireless Adapter Publisher: Intel Operating System: Windows Resolution: Patch/Upgrade CVE Names: CVE-2022-36400 CVE-2022-36384 CVE-2022-36380 CVE-2022-36377 Original Bulletin: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html Comment: CVSS (Max): 6.7 CVE-2022-36400 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H) CVSS Source: Intel Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- Intel ID: INTEL-SA-00747 Advisory Category: Software Impact of vulnerability : Escalation of Privilege Severity rating : MEDIUM Original release: 11/08/2022 Last revised: 11/08/2022 Summary: Potential security vulnerabilities in some Intel NUC Kit Wireless Adapter driver installer software may allow escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities. Vulnerability Details: CVEID: CVE-2022-36400 Description: Path traversal in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access. CVSS Base Score: 6.7 Medium CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H CVEID: CVE-2022-36384 Description: Unquoted search path in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access. CVSS Base Score: 6.7 Medium CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H CVEID: CVE-2022-36380 Description: Uncontrolled search path in the installer software for some Intel (r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access. CVSS Base Score: 6.7 Medium CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H CVEID: CVE-2022-36377 Description: Incorrect default permissions in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access. CVSS Base Score: 6.7 Medium CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: Intel NUC 8 Rugged Kit - NUC8CCHKR. Intel NUC Kits - NUC5PPYH, NUC5PGYH, NUC6CAYH, NUC6CAYS. Intel NUC Board - NUC8CCHB. Recommendations: Intel recommends updating Intel NUC Kit Wireless Adapter driver installer software to version 22.40.0 or later. Updates are available for download at this location: https://www.intel.com/content/www/us/en/download/716640/ intel-wireless-technology-based-driver-for-windows-10-windows-11-for-intel-nuc-products.html Acknowledgements: Intel would like to thank Sahnoun (CVE-2022-36380 & CVE-2022-36400), Mazoz Ocher (CVE-2022-36377 & CVE-2022-36380) for reporting these issues. Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available. Revision History Revision Date Description 1.0 11/08/2022 Initial Release - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23KR8kNZI30y1K9AQgKpBAAmkVlihT2HzW9gP2P8dD4RaKHLHlhskoy VtNchnFd1jmFww5phKZiyDWNbQKgPrvyV9PLC7Oc8k2qrhowmVgAxGRnHu0wbQSZ S7/Ves7c7V5wSn8szfvmo94TK8mke8VLvVRXqZC6B7uF0qlrxPjKxVLkOUwQi+97 0/D2fku42IBgsmvce8yQ1vlUN6cyUMcFz7iAo76Cpakd7/0WOkUVNlQJhcby+H9W ma45vRF3PRusH6uZpdGmS/TF6WdQVmvX8LkEBCyZCNlEhbZquYS2zIGy7gGW1Z56 P2Bc1kWLlLCU7VIdVauWEQcFovb0Ni5rOKcW95zbtM2KV6AUt3YC8WOp4E07uhwA CRJ0hg9vo5sm6u/sJOhg/gle4bi+0UCBks7I3uo6TJiABbtRYyk3WMDwaX1g9Xhz Z27KW77Lh2F+EUUPr8aIut8pnuZnTWZjS4fLzMHoa1KKjVH4fPob77dxJ3rZNWK7 oE3GzbZRSL4rM7FeluT3EPJTW/zV+aSwV+j48ozGzAnAQCUVaJeuY6GJpTNBC+gr dExPc4z9Asutk2wkMVhN1TswTgCqmFJUAEXa2W/0wZqhOiPglSo8ayTaOJQqmlUy GTJucvtz3istEg7+DIwXc0++IajfwTsJ7NYoPhlqxzZjjicxWwVVr2w2x3AXh68N GI3Nvoe+MsA= =B50A -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5804 - [Win][UNIX/Linux] Intel NUC BIOS firmware: CVSS (Max):7.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5804 Intel NUC Firmware Advisory 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Intel NUC BIOS firmware Publisher: Intel Operating System: Windows UNIX variants (UNIX, Linux, OSX) Resolution: Patch/Upgrade CVE Names: CVE-2022-38099 CVE-2022-37345 CVE-2022-37334 CVE-2022-36789 CVE-2022-36370 CVE-2022-36349 CVE-2022-35276 CVE-2022-34152 CVE-2022-33176 CVE-2022-32569 CVE-2022-26124 CVE-2022-21794 CVE-2021-33164 Original Bulletin: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html Comment: CVSS (Max): 8.2 CVE-2022-33164 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) CVSS Source: Intel Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- Intel ID: INTEL-SA-00752 Advisory Category: Firmware Impact of vulnerability : Escalation of Privilege, Denial of Service Severity rating : HIGH Original release: 11/08/2022 Last revised: 11/08/2022 Summary: Potential security vulnerabilities in some Intel NUC BIOS firmware may allow escalation of privilege or denial of service. Intel is releasing firmware updates to mitigate these potential vulnerabilities. Vulnerability Details: CVEID: CVE-2021-33164 Description: Improper access control in BIOS firmware for some Intel(R) NUCs before version INWHL357.0046 may allow a privileged user to potentially enable escalation of privilege via local access. CVSS Base Score: 8.2 High CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVEID: CVE-2022-33176 Description: Improper input validation in BIOS firmware for some Intel(R) NUC 11 Performance kits and Intel(R) NUC 11 Performance Mini PCs before version PATGL357.0042 may allow a privileged user to potentially enable escalation of privilege via local access. CVSS Base Score: 8.2 High CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVEID: CVE-2022-37345 Description: Improper authentication in BIOS firmware for some Intel(R) NUC Kits before version RY0386 may allow an authenticated user to potentially enable escalation of privilege via local access. CVSS Base Score: 7.8 High CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H CVEID: CVE-2022-21794 Description: Improper authentication in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC Business, Intel(R) NUC Enthusiast, Intel(R) NUC Kits before version HN0067 may allow a privileged user to potentially enable escalation of privilege via local access. CVSS Base Score: 7.7 High CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H CVEID: CVE-2022-34152 Description: Improper input validation in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC Kits before version TY0070 may allow a privileged user to potentially enable escalation of privilege via local access. CVSS Base Score: 7.7 High CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H CVEID: CVE-2022-32569 Description: Improper buffer restrictions in BIOS firmware for some Intel(R) NUC M15 Laptop Kits before version BCTGL357.0074 may allow a privileged user to potentially enable escalation of privilege via local access. CVSS Base Score: 7.5 High CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H CVEID: CVE-2022-36789 Description: Improper access control in BIOS firmware for some Intel(R) NUC 10 Performance Kits and Intel(R) NUC 10 Performance Mini PCs before version FNCML357.0053 may allow a privileged user to potentially enable escalation of privilege via local access. CVSS Base Score: 7.5 High CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H CVEID: CVE-2022-35276 Description: Improper access control in BIOS firmware for some Intel(R) NUC 8 Compute Elements before version CBWHL357.0096 may allow a privileged user to potentially enable escalation of privilege via local access. CVSS Base Score: 7.5 High CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H CVEID: CVE-2022-38099 Description: Improper input validation in BIOS firmware for some Intel(R) NUC 11 Compute Elements before version EBTGL357.0065 may allow a privileged user to potentially enable escalation of privilege via local access. CVSS Base Score: 7.5 High CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H CVEID: CVE-2022-26124 Description: Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access. CVSS Base Score: 7.5 High CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H CVEID: CVE-2022-36370 Description: Improper authentication in BIOS firmware for some Intel(R) NUC Boards and Intel(R) NUC Kits before version MYi30060 may allow a privileged user to potentially enable escalation of privilege via local access. CVSS Base Score: 7.5 High CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H CVEID: CVE-2022-37334 Description: Improper initialization in BIOS firmware for some Intel(R) NUC 11 Pro Kits and Intel(R) NUC 11 Pro Boards before version TNTGL357.0064 may allow an authenticated user to potentially enable escalation of privilege via local access. CVSS Base Score: 7.0 High CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H CVEID: CVE-2022-36349 Description: Insecure default variable initialization in BIOS firmware for some Intel(R) NUC Boards and Intel(R) NUC Kits before version MYi30060 may allow an authenticated user to potentially enable denial of service via local access. CVSS Base Score: 5.2 Medium CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L Affected Products: +------------------------------------+-----------------------------+------------------------------+ |Product |Download Link |CVE ID | +------------------------------------+-----------------------------+------------------------------+ |Intel NUC Mini PC NUC8i7INH and |INWHL357.0046 |CVE-2021-33164 | |NUC8i5INH. | | | +------------------------------------+-----------------------------+------------------------------+ |Intel NUC 11 Performance kit - |BIOS Update [PATGL357] |CVE-2022-33176 | |NUC11PAHi70Z, NUC11PAHi50Z, | | | |NUC11PAHi30Z, NUC11PAHi3, | | | |NUC11PAHi5, NUC11PAHi7, NUC11PAKi3, | | | |NUC11PAKi5, NUC11PAKi7. | | | | | | | |Intel NUC 11 Performance Mini PC - | | | |NUC11PAQi50WA, NUC11PAQi70QA. | | | +------------------------------------+-----------------------------+------------------------------+ |Intel NUC Kit - NUC5i3RYH, |BIOS Update [RYBDWi35] |CVE-2022-37345 | |NUC5i7RYH, NUC5i5RYK, NUC5i5RYH, | | | |NUC5i3RYK, NUC5i5RYHS, NUC5i3RYHS, | | | |NUC5i3RYHSN. | | | +------------------------------------+-----------------------------+------------------------------+ |Intel NUC Kit - NUC8i7HNK, |BIOS Update [HNKBLi70] |CVE-2022-21794 | |NUC8i7HVK. | | | | | | | |Intel NUC 8 Enthusiast - | | | |NUC8i7HVKVA, NUC8i7HVKVAW. | | | | | | | |Intel NUC 8 Business - NUC8i7HNKQC. | | | +------------------------------------+-----------------------------+------------------------------+ |Intel NUC Kit - DE3815TYKHE. |BIOS Update [TYBYT10H] |CVE-2022-34152 | | | | | |Intel NUC Board - DE3815TYBE. | | | +------------------------------------+-----------------------------+------------------------------+ |Intel NUC M15 Laptop Kit |BIOS Update for the Intel NUC|CVE-2022-32569 | | |M15 Laptop Kit | | +------------------------------------+-----------------------------+------------------------------+ |Intel NUC 10 Performance kit - |BIOS Update [FNCML357] |CVE-2022-36789 | |NUC10i7FNHN, NUC10i5FNKN, | | | |NUC10i5FNHN, NUC10i7FNKN, | | | |NUC10i3FNHN, NUC10i3FNKN. | | | | | | | |Intel NUC 10 Performance Mini PC - | | | |NUC10i5FNHJA, NUC10i3FNHF, | | | |NUC10i7FNKPA, NUC10i5FNHCA, | | | |NUC10i3FNHFA, NUC10i5FNHJ, | | | |NUC10i7FNHC, NUC10i7FNHJA, | | | |NUC10i3FNHJA, NUC10i3FNK, | | | |NUC10i7FNHAA, NUC10i5FNH, | | | |NUC10i5FNK, NUC10i7FNH, NUC10i5FNHF,| | | |NUC10i5FNKPA, NUC10i3FNH, | | | |NUC10i7FNK, NUC10i7FNKP, | | | |NUC10i5FNKP. | | | +------------------------------------+-----------------------------+------------------------------+ |Intel NUC 8 Compute Element - |BIOS Update [CBWHL357] |CVE-2022-35276 | |CM8i7CB, CM8i3CB, CM8CCB, CM8i5CB, | | | |CM8PCB. | | | +------------------------------------+-----------------------------+------------------------------+ |Intel NUC 8 Rugged Kit NUC8CCHKRN, |BIOS Update [CHAPLCEL] |CVE-2022-26124 | |NUC8CCHKR. | | | | | | | |Intel NUC 8 Rugged Board - | | | |NUC8CCHBN. | | | | | | | |Intel NUC Board - NUC8CCHB. | | | +------------------------------------+-----------------------------+------------------------------+ |Intel NUC Board - NUC5i3MYBE. |BIOS Update [MYBDWi30] |CVE-2022-36370 | | | | | |Intel NUC Kit - NUC5i3MYHE. | | | +------------------------------------+-----------------------------+------------------------------+ |Intel NUC 11 Pro Kit - NUC11TNHi70Z,|BIOS Update [TNTGL357] |CVE-2022-37334 | |NUC11TNKi70Z, NUC11TNKi30Z, | | | |NUC11TNHi30Z, NUC11TNKi50Z, | | | |NUC11TNHi50Z, NUC11TNBi30Z, | | | |NUC11TNBi50Z, NUC11TNBi70Z, | | | |NUC11TNHi3, NUC11TNHi5. | | | +------------------------------------+-----------------------------+------------------------------+ |Intel NUC Board - NUC5i3MYBE. |BIOS Update [MYBDWi30] |CVE-2022-36349 | | | | | |Intel NUC Kit - NUC5i3MYHE. | | | +------------------------------------+-----------------------------+------------------------------+ Recommendations: Intel recommends updating the affected Intel NUC BIOS firmware to the latest version (see provided table above). Acknowledgements: The following issues were found internally by Intel employees; CVE-2021-33164 and CVE-2022-37334. Intel would like to thank Benny Zeltser, Yehonatan Lusky (CVE-2021-33164) and Brent Holtsclaw (CVE-2022-37334). Intel would like to thank Yngweijw (Jiawei Yin) (CVE-2022-33176, CVE-2022-37345, CVE-2022-21794, CVE-2022-34152, CVE-2022-36789, CVE-2022-35276, CVE-2022-36370), the BINARLY efiXplorer team (CVE-2022-32569), Dmitry Frolov (CVE-2022-26124, CVE-2022-38099) and the TCG Vulnerability Response Team (CVE-2022-36349). Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available. Revision History Revision Date Description 1.0 11/08/2022 Initial Release - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23JtskNZI30y1K9AQhfaBAAlOPI1R5AAxvOggM09gfmT7IWBhB3bHoH pcW1n58uQmElwOUf75ZJqzXaVpg4/cohYUl9Rv1Q+KOPIyQTZ1/qavY6bp7U3wiy o3kXFAeDpzkFGfvazgBUjMiopHc/ShhbaSHrI3LQym135c33V8uH2iH9gNOhW6Z5 MQYNWN+XkGu7GtEP95z69tNiGYHiLd39gr+ouCbjhOLbYJs7E34EbZjkKqY4PUjF fmpgQtN7X1r8kJ9/1YniDlgLd3S3wMggUDHq5Wwzzv6lID+QHg249yLaSI8g0+Rs Vfg/eHOX3uMcuH74qgqd/arF+zNhtUKe7xfChF5Vkc0Z03rVI3AzafklRi7KabaA rUEtnpqAH7LM4ZpZBRmHs6xAdK0WDL+/zcBrIn7uG0ad/NQcbEWY94qKDduO/zCZ EPh3fjXcKv0z8s/8LUZvzcC6iFiu+0PfseQABX9GiahcP6p2MkNGQUtR7zyGCy5/ +7ABJ90BOZKIs3BJk67V95dXYr+s5mbYj+oaYH6sKOzS3PVWq0bIBQaf/33m5tif yjBKlZNr6+u0WVqvZYvXFve5pmmoR8ondlcWHDI25qxAxSyi3uws/pV+YkgqiHiz Ehea4IifAAUJNmTW83IUaaWhkngNjlUId++uodf6VkWuc8elWoe551iDm+f/L+bJ 8gY8b6OC6z8= =u5DQ -----END PGP SIGNATURE-----
2022. november 11.

ESB-2022.5803 - [Appliance] Siemens Parasolid: CVSS (Max): 7.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.5803 Advisory (icsa-22-314-01) Siemens Parasolid 11 November 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Siemens Parasolid Publisher: ICS-CERT Operating System: Network Appliance Resolution: Patch/Upgrade CVE Names: CVE-2022-43397 CVE-2022-39157 Original Bulletin: https://us-cert.cisa.gov/ics/advisories/icsa-22-314-01 Comment: CVSS (Max): 7.8 CVE-2022-39157 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: ICS-CERT Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- ICS Advisory (ICSA-22-314-01) Siemens Parasolid Original release date: November 10, 2022 Legal Notice All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/ . 1. EXECUTIVE SUMMARY. o CVSS v3 7.8 o ATTENTION: Low attack complexity o Vendor: Siemens o Equipment: Parasolid o Vulnerabilities: Out-of-bounds Read, Out-of-bounds Write 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to execute code in the context of the current process. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Siemens reports these vulnerabilities affect the following Parasolid 3D geometric modeling tools: o Parasolid V34.0: versions prior to V34.0.252 o Parasolid V34.0: versions prior to V34.0.254 o Parasolid V34.1: versions prior to V34.1.242 o Parasolid V34.1: versions prior to V34.1.244 o Parasolid V35.0: versions prior to V35.0.184 o Parasolid V35.0: versions prior to V35.0.170 3.2 VULNERABILITY OVERVIEW 3.2.1 OUT-OF-BOUNDS READ CWE-125 Siemens Parasolid contains an out-of-bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. CVE-2022-39157 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( CVSS:3.1/AV:L/AC:L/PR:N/ UI:R/S:U/C:H/I:H/A:H ). 3.2.2 OUT-OF-BOUNDS WRITE CWE-787 Siemens Parasolid contains an out-of-bounds write past the end of an allocated buffer while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. CVE-2022-43397 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ( CVSS:3.1/AV:L/AC:L/PR:N/ UI:R/S:U/C:H/I:H/A:H ). 3.3 BACKGROUND o CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing o COUNTRIES/AREAS DEPLOYED: Worldwide o COMPANY HEADQUARTERS LOCATION: Germany 3.4 RESEARCHER An anonymous researcher working with Trend Micro Zero Day Initiative reported these vulnerabilities to Siemens. 4. MITIGATIONS Siemens has released updates for the affected products and recommends updating to the latest versions: o Parasolid V34.0: Update to V34.0.252 or later version. o Parasolid V34.0: Update to V34.0.254 or later version. o Parasolid V34.1: Update to V34.1.242 or later version. o Parasolid V34.1: Update to V34.1.244 or later version. o Parasolid V35.0: Update to V35.0.184 or later version. o Parasolid V35.0: Update to V35.0.170 or later version. Siemens has identified the following specific workaround and mitigation customers can apply to reduce the risk: o Do not open untrusted X_T files in Parasolid. As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens' operational guidelines for industrial security and to follow the recommendations in the product manuals. Siemens also provides additional information on industrial security on their website . For more information on security vulnerabilities in Siemens' products, users should contact Siemens . For more information, see the associated Siemens security advisory SSA-853037 in HTML or CSAF formats. CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics . Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies . Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. CISA also recommends users take the following measures to protect themselves from social engineering attacks: o Do not click web links or open attachments in unsolicited email messages. o Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. o Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks. No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely. These vulnerabilities have a low attack complexity For any questions related to this report, please contact the CISA at: Email: CISAservicedesk@cisa.dhs.gov Toll Free: 1-888-282-0870 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY23Hj8kNZI30y1K9AQh7Fw/+PNMQCfuYWomcprIbvoBfiL05EkkeAgbI S5Ttf8UNx06mb6JbkP/0BY9fwKT/A7yGKtJDiboHXlYYuKLYp8UtZfqjbKFF7s70 kNOLnneuVUqB/eQx7sTP+hohfJAAom62PwQCwPNbSPWjaAzwCeFkVAOnniX8/j+F NQxECaQ/JsF/FzwUGlL0XxH/x79Ruf/NcOW2X4ePDpBW03+gk8rJVaviL9Xy8Wu5 Lyiuopc007bRoZyGgXj8EYCOu9evZK2IlyWzrRWUVi2FTY1Jid8xc3EuGLrDBv/a UVgPBK+G2CZ5RIQHHnaAoLZwtM+j9Ho27LidrUVIijb0yo0hagvLfnlo665+wI0e WCmaC0P5pFM9z3JcwC9lI7VnkV+yiBsQvsaAR4a+ZkzAaHxzVMl5U7AHDub3HFEw 94+nyrCzPOtPP9u6MbZa8aELGiJNxw+rVdxWR6PbB611FfMEe/FVLZpSlQ80ARky yvYt6YtupCnTK2rJgNKmdqwfmSiI5Pznf1ZVP5Em9CXI5c01YyGZlogpIFE155uu /r7aoss+vvB3Injm21qqSYigFpZf7sPUpUdvp01pJbQCcVYd4WPjQ/kQEUPdQ78K I/vTUfTuXt08yJORQf9l7RBH5ulF1lLJDFRWNw8xjvLOyYlRNGKx7pFK2tcwHzJU Y9scXQOXZxs= =IEHe -----END PGP SIGNATURE-----