AusCERT - Security Bulletins

Subscribe to AusCERT - Security Bulletins hírcsatorna
Latest published security bulletins. See https://www.auscert.org.au/rss/ for feed information.
Frissítve: 2 óra 53 perc
2022. május 12.

ESB-2022.2318 - [Win][UNIX/Linux] Intel XTU Advisory: CVSS (Max): 6.7

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2318 Intel XTU Advisory 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Intel XTU Advisory Publisher: Intel Operating System: Windows UNIX variants (UNIX, Linux, OSX) Resolution: Patch/Upgrade CVE Names: CVE-2022-22139 Original Bulletin: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00663.html Comment: CVSS (Max): 6.7 CVE-2022-22139 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H) CVSS Source: Intel Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- Intel ID: INTEL-SA-00663 Advisory Category: Software Impact of vulnerability : Escalation of Privilege Severity rating : MEDIUM Original release: 05/10/2022 Last revised: 05/10/2022 Summary: A potential security vulnerability in the Intel Extreme Tuning Utility (XTU) software may allow escalation of privilege. Intel is releasing software updates to mitigate this potential vulnerability. Vulnerability Details: CVEID: CVE-2022-22139 Description: Uncontrolled search path in the Intel(R) XTU software before version 7.3.0.33 may allow an authenticated user to potentially enable escalation of privilege via local access. CVSS Base Score: 6.7 Medium CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: Intel XTU software before version 7.3.0.33. Recommendations: Intel recommends updating the Intel XTU software to version 7.3.0.33 or later. Updates are available for download at this location: https://www.intel.com/content/www/us/en/download/17881/ intel-extreme-tuning-utility-intel-xtu.html Acknowledgements: Intel would like to thank Marius Gabriel Mihai for reporting this issue. Intel and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available. Revision History Revision Date Description 1.0 05/10/2022 Initial Release - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxbEckNZI30y1K9AQiSwQ/9FzwL7IHcepNX0tDgRlfgpNlDPDkQXgIn +02plWrg4ayufPD6cRLds1Id1BDg4kS4z+V3jSFpEwey18YeU8FtNfWL601EBj4g qa08GiO1o0Hfj+Fhfw9I8rxfAka5ILADJdKib4vAQDAI1DAwuLR+fRNQgOQlW0RC jjvzg9yBQbkKcpWVoedWjK3zyvV3QIcAWPoIQKgBgE1rbH9kaHKQ+OHy4XzzvNME ERCbChjlNdOdj2jVCa2oOKOgQ2HZPbIGc+H5XKkv8pInexAiRTqXAh2M3BkAvuHg nNcViowjB7dqRubdyxyflFnGU1s2Z/uJf+ouKXzk611kWh9+cPzTL0zJOzdnq/cW UuYNiLIF802jLfU615qspx4Ke9e2lK1dE8mPt0m/h1ceUTurqw18zppjloax0nwc 1gN1k4l6e9Dq+N5Kcvv++DoPAWzVQaVK9+ooq6sOvHYpArtJLsOoLsLhMBO4JPSz ZlB1R6CaiR7D4CxVjnFrpofReNj5mTs4UQP3jjpxwluTpbhQVuZsxrND8fHQi6uj jv7xFhinbkUaXuFrR0oW2+N5EPAyIpRdfLTZrp4bpnSMxrVXDyZZgVfr7cYZLKr/ dhwfPc6nnvfjXAmuX6pJjemUQjWhrb5q3p+//BOw9yL02izSGic7v2i9egdjafSk 4Wrx+L30kbY= =70Ef -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2317 - [Ubuntu] NSS: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2317 USN-5410-1: NSS vulnerability 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: NSS Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2020-25648 Original Bulletin: https://ubuntu.com/security/notices/USN-5410-1 Comment: CVSS (Max): 7.5 CVE-2020-25648 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- USN-5410-1: NSS vulnerability 11 May 2022 NSS could be made to stop responding if it received a specially crafted message. Releases o Ubuntu 20.04 LTS o Ubuntu 18.04 LTS Packages o nss - Network Security Service library Details Lenny Wang discovered that NSS incorrectly handled certain messages. A remote attacker could possibly use this issue to cause servers compiled with NSS to stop responding, resulting in a denial of service. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 o libnss3 - 2:3.49.1-1ubuntu1.7 Ubuntu 18.04 o libnss3 - 2:3.35-2ubuntu2.14 After a standard system update you need to restart any applications that use NSS to make all the necessary changes. References o CVE-2020-25648 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxas8kNZI30y1K9AQiYQhAAh/ysThCWxcEThdftwbT01PvdgsTcmvbg L2KToWJahW6dtQ/Wa6keT/WocUxFlifyOzVWhD+0xFEo/iYWgFncZtgGJReOxkYp p0625NAttMuNnyGjzPSIdXgr98+mFnBEU+QFhwiHYzyiGpILnTDlvks3oCsivXWv F6LRpB4rq1pWi/uM5+VMIoflvPtdJ7+tj/Pvpk0OfDMJveoFZTlWYrL/HmIye74b mPWxBbd2nFUmISDGzVJYd6NeHkS5TSnscH6rOKtk88n32VpnJ/SS6lsjslRimv1B 02bD6jIEYQBapzY/mo74UNaYbvLJ9l69JkTEDYSrmSai7XGYfE0kuorKgZxKJukK BXtqQhfCdpU0m/B/Wu4W6tIvFEl9uzIhdOjFwpqW7Sueug+lkYlyKFpMN2vP+pVW jInOk16cupx0+9FUPMJfHAEIsfAymJwjdO2hbTv4PeeqlIRnmvHlqGeb6XudZjRm yGy7laAHY86PgOD7Gen2MJldPBaSCaj0SkNU6lOk8CMQxUN4fuazXFn5bkwNtg/m nzUdIx6iV+EL/bjG/KMBwNdnDYgw/kHFISDKJNkibBV/RACaT6p9qUhUC4gJ2Ppk u1/EPJN+pKZJ8JbBae4EEK1Ey5PgtCDC7rDPu3LGUET/e5S2f0+KcvM8VDBTcdhD /TqaIhFKoaI= =Q8vQ -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2316 - [Ubuntu] curl: CVSS (Max): 6.3

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2316 USN-5412-1: curl vulnerabilities 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: curl Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2022-27782 CVE-2022-27781 CVE-2022-27780 Original Bulletin: https://ubuntu.com/security/notices/USN-5412-1 Comment: CVSS (Max): 6.3 CVE-2022-27780 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L - --------------------------BEGIN INCLUDED TEXT-------------------- USN-5412-1: curl vulnerabilities 11 May 2022 Several security issues were fixed in curl. Releases o Ubuntu 22.04 LTS o Ubuntu 21.10 o Ubuntu 20.04 LTS o Ubuntu 18.04 LTS Packages o curl - HTTP, HTTPS, and FTP client and client libraries Details Axel Chong discovered that curl incorrectly handled percent-encoded URL separators. A remote attacker could possibly use this issue to trick curl into using the wrong URL and bypass certain checks or filters. This issue only affected Ubuntu 22.04 LTS. ( CVE-2022-27780 ) Florian Kohnhuser discovered that curl incorrectly handled returning a TLS server's certificate chain details. A remote attacker could possibly use this issue to cause curl to stop responding, resulting in a denial of service. ( CVE-2022-27781 ) Harry Sintonen discovered that curl incorrectly reused a previous connection when certain options had been changed, contrary to expectations. ( CVE-2022-27782 ) Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 o libcurl3-gnutls - 7.81.0-1ubuntu1.2 o libcurl3-nss - 7.81.0-1ubuntu1.2 o libcurl4 - 7.81.0-1ubuntu1.2 o curl - 7.81.0-1ubuntu1.2 Ubuntu 21.10 o libcurl3-gnutls - 7.74.0-1.3ubuntu2.2 o libcurl3-nss - 7.74.0-1.3ubuntu2.2 o libcurl4 - 7.74.0-1.3ubuntu2.2 o curl - 7.74.0-1.3ubuntu2.2 Ubuntu 20.04 o libcurl3-gnutls - 7.68.0-1ubuntu2.11 o libcurl3-nss - 7.68.0-1ubuntu2.11 o libcurl4 - 7.68.0-1ubuntu2.11 o curl - 7.68.0-1ubuntu2.11 Ubuntu 18.04 o libcurl3-gnutls - 7.58.0-2ubuntu3.18 o libcurl3-nss - 7.58.0-2ubuntu3.18 o libcurl4 - 7.58.0-2ubuntu3.18 o curl - 7.58.0-2ubuntu3.18 In general, a standard system update will make all the necessary changes. References o CVE-2022-27780 o CVE-2022-27782 o CVE-2022-27781 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxaiskNZI30y1K9AQjaQhAArw+6CQ7MKrm7nDoEWKFNgAPbVR2dEOd9 IanVuMKrSY5xw9PsNlbCYyQXyDvwm8xZ9QWdln+ay2vEZj+3V8sqLzo8jteeyEZv CkNmxEeJe7KEO/kMJt5BT1ygxgFYT04qZFDCnyyQ5dK/L+BkgboXxhnZNVLx/Afn H7DL/3/qqY2oouoLQzheViySymLA8QFpXpt56wY7KPMWqM3dQCMicI52Dz7rz7cz AE5lvmY99MEYxusm9d3C2ZwNM7Vz9eXBX6b7LA4qH7F6wHoKyTyxLezTKup3FbfE 0NCqTUKVhrZu0ROmnwIDQJoxvP75aXruu9rVyV1vRWd/TyTNPB5fPgFxeyrMv22w asIssKva3B/bB+fBLDxQw9rAuNS4XHmGA7wkKC++oZwqZfq68fEOnCjtg2P+mh/L GdDkeZinKJ4kon/qYfhUD2624XEMgTEAn3Heajj/Bw1B65XLpXnBkshxlInwtF8o j5dkkpCbXhykOZCPnVws9OU8sr/n1KXGY/PKP9uGOat0acOfG9LzTEqPGsSkACas ULAuHr7tE0MOR98rQvbRUsPYYgly9dXhStUjloO8ItLCJWjVWceJLnl/Oxdh+bLJ eZL9jhCklEwvkRg3G1O2KEh8bJ+PlYXmFwhFrtO/XmYtFPK1kwWU8AjJVR6Z1PWT rIjI+vwgHok= =rMsF -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2315 - [Ubuntu] Firefox: CVSS (Max): 7.5*

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2315 USN-5411-1: Firefox vulnerabilities 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Firefox Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2022-29918 CVE-2022-29917 CVE-2022-29916 CVE-2022-29915 CVE-2022-29914 CVE-2022-29912 CVE-2022-29911 CVE-2022-29909 Original Bulletin: https://ubuntu.com/security/notices/USN-5411-1 Comment: CVSS (Max): 7.5* CVE-2022-29917 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * Not all CVSS available when published - --------------------------BEGIN INCLUDED TEXT-------------------- USN-5411-1: Firefox vulnerabilities 11 May 2022 Firefox could be made to crash or run programs as your login if it opened a malicious website. Releases o Ubuntu 21.10 o Ubuntu 20.04 LTS o Ubuntu 18.04 LTS Packages o firefox - Mozilla Open Source web browser Details Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, spoof the browser UI, bypass permission prompts, obtain sensitive information, bypass security restrictions, or execute arbitrary code. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 21.10 o firefox - 100.0+build2-0ubuntu0.21.10.1 Ubuntu 20.04 o firefox - 100.0+build2-0ubuntu0.20.04.1 Ubuntu 18.04 o firefox - 100.0+build2-0ubuntu0.18.04.1 After a standard system update you need to restart Firefox to make all the necessary changes. References o CVE-2022-29915 o CVE-2022-29918 o CVE-2022-29912 o CVE-2022-29917 o CVE-2022-29914 o CVE-2022-29916 o CVE-2022-29911 o CVE-2022-29909 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxaJckNZI30y1K9AQggeQ//doqjzNet6hIHASe7QrPu8DuBPm9ppWzz yLRiwtQW6YGZWpR2xv+PkktoGpIn0CuI2xB5URr1tNIbfdFC15AhBWqN2rFMbd6v C78zicsSbdk9rqkpoFObkL6rfDJ6MCAGqrIxwnmzLBENAPJBupDMb7fgkP/NydeL Jk9uLq+xEZA4MEa9sNXc5kPpOMlDNvcNc+sKYrgRFrFYw8EGTU4GwimVjHETDSGt Gy7Rel9a+kVNrbyF3Wh/y51dje+Q7Aw6Wgoo0Pua11+QFJc0s1CF4ILcPScoYZcC DUYE16zh7iVabGjqs1wVdT13Ca4wj1iYs8DHq0dmEAHc5W9QyRNptZOZJDV31ZEl 4lDC6pRiu38FWF0C/NAuuUFZ3XzFUkmG7xU6xL/j1NMN2IrttMw6zQq98bM/lKZi ZNdza7IqKQdeczt8Anhop2NilNFSC1nKds+YO+0TKgXOCwxxJ/lZgzO85ZTv8xZD r7R1vHVpQmFIGXpMMzkPCPL/6r24ICPEKRUxf4f4LGR+tNkQgcz2k8x4J20U/N9w /NYb1i+AIQ4TiWqgvj7sPnKjOK7CcXhwzkJEgwL6bL3fBmiabyCrfsM7N/LQUsO5 X9I/qvCnFSS/lCh0zhOQIFufTuWUrRphnVS4zp/WEAoT4HawbJCTn1XeZ56PEQiH jZkD86Xxl3o= =fipE -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2314 - [SUSE] Linux Kernel: CVSS (Max): 7.4

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2314 Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP2) 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux Kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-1158 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221629-1 Comment: CVSS (Max): 7.4 CVE-2022-1158 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP2) ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1629-1 Rating: important References: #1198133 Cross-References: CVE-2022-1158 Affected Products: SUSE Linux Enterprise High Performance Computing 15-SP2 SUSE Linux Enterprise Module for Live Patching 15-SP2 SUSE Linux Enterprise Server 15-SP2 SUSE Linux Enterprise Server for SAP Applications 15-SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 5.3.18-24_102 fixes one issue. The following security issue was fixed: o - CVE-2022-1158: Fixed KVM x86/mmu compare-and-exchange of gPTE via the user address (bsc#1198133) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Live Patching 15-SP2: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2022-1629=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-1630=1 Package List: o SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x x86_64): kernel-livepatch-5_3_18-24_102-default-6-150200.2.1 kernel-livepatch-5_3_18-24_102-default-debuginfo-6-150200.2.1 kernel-livepatch-5_3_18-24_107-default-5-150200.2.1 kernel-livepatch-5_3_18-24_107-default-debuginfo-5-150200.2.1 kernel-livepatch-SLE15-SP2_Update_24-debugsource-6-150200.2.1 o SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le x86_64): kernel-livepatch-SLE15-SP2_Update_25-debugsource-5-150200.2.1 References: o https://www.suse.com/security/cve/CVE-2022-1158.html o https://bugzilla.suse.com/1198133 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxZ/ckNZI30y1K9AQgV5g//a0fMmBq2ZgPzVEmvRCF96U+0bEMrv81h EHfdj7g458fEk+M7GE1aBubA/bwXgXqoFsXZMyJw0I9A45Kj7RGGz2VbsHHQOstG mNHBrcGIdSe4VCBW6nK+MHM75CitxO3zsuiOwm6IqNPjrCTYCazdp4KNv4DzCxYC WKjV6oNiY9DKgZBvOlcmDHCvwqu0Y7qfGeb9piElOmE1jJKJlaK2kWVsMu4/baes sds/Ns+ZNjX1KI0k5JfN48Ze9+fIH0RJYCy8uGT1asS9ZEjojcKGoUdwvWSJYKBW zn5gYkNz039uuuFHQj5nWKdhCS9PIBS+iT/7vhHE9gmj7GEvlX+IoooUPmvG8i21 UHY9SQZqqRK3OH4wvT5UsDPFt6KPtm96eajRXaO9KQNYLWg3mMPcPD8r5J9gGN+C S2i+Bi9P10//ybCHDbXUY7ZgBUeAMR09tuVRSfaGiX5FZE7lAbz88vrMr4+mGlfM 531Ob6Jpk5eki7w3aVxYNkqFFkH+hysY9fViowzv3UHBIMUUqY9Z2ATuc0M7fQmG /XxAFNEE2CxfR52TsmLjq1iNs4jjZ5E296P1GpcmWsit2gD+wy6xyG+wXl/OoH9D GLBS+F+/bBla0Lkr4NqWzT1kE4esOtAnqUt+baO28Hx2R5p6XvcLghaqNaKHuKae 6LQwqGnrQio= =Au3q -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2313 - [SUSE] Linux Kernel: CVSS (Max): 7.4

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2313 Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP2) 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux Kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-1158 CVE-2022-1011 CVE-2021-39698 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221634-1 Comment: CVSS (Max): 7.4 CVE-2022-1158 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP2) ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1634-1 Rating: important References: #1196959 #1197344 #1198133 Cross-References: CVE-2021-39698 CVE-2022-1011 CVE-2022-1158 Affected Products: SUSE Linux Enterprise High Performance Computing 15-SP2 SUSE Linux Enterprise Module for Live Patching 15-SP2 SUSE Linux Enterprise Server 15-SP2 SUSE Linux Enterprise Server for SAP Applications 15-SP2 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for the Linux Kernel 5.3.18-150200_24_112 fixes several issues. The following security issues were fixed: o - CVE-2022-1158: Fixed KVM x86/mmu compare-and-exchange of gPTE via the user address (bsc#1198133) o CVE-2022-1011: A use-after-free flaw was found in the FUSE filesystem in the way a user triggers write(). This flaw allowed a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation. (bsc#1197344) o - CVE-2021-39698: In aio_poll_complete_work of aio.c, there was a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1196959) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Live Patching 15-SP2: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2022-1634=1 Package List: o SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x x86_64): kernel-livepatch-5_3_18-150200_24_112-default-2-150200.2.1 kernel-livepatch-5_3_18-150200_24_112-default-debuginfo-2-150200.2.1 kernel-livepatch-SLE15-SP2_Update_26-debugsource-2-150200.2.1 References: o https://www.suse.com/security/cve/CVE-2021-39698.html o https://www.suse.com/security/cve/CVE-2022-1011.html o https://www.suse.com/security/cve/CVE-2022-1158.html o https://bugzilla.suse.com/1196959 o https://bugzilla.suse.com/1197344 o https://bugzilla.suse.com/1198133 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxZtckNZI30y1K9AQhCNg//R7GQwlFlAxnNwxcIm6o7FUlp7ZZ5/QBr O7OndvsA6Z7/nSm6YHCRCPwEZcjN+ThEtZkVllxws5Hpikjjsc9seFDg4qAAjo4J NZhEAnRg6ZidRPYF/udKp4o/HWMvsrNIY9m1HinHPYQ6b0pR9WFnaEEolXNtAMrI qu8AcgCK95swz7gr8jtjxL1dP6RsfVDPL+5hnCChoD152R5vhBTycHzCFZcf9tOO NbtmhXSijNUQyiNiwiTAdJ5EcB7nJG98dm7rG1938pUIyNHURrkRaIDC5QmrYA0f 6DyfMYSGTIo9KYeAK3OB/HHFqoFcVKdBHNSunrX0uyP3BbtQfMsGhOjOJTrVORhs DCYmnrdM3p74MGMprSQtJSNTkVLummHL//1dgNGI3Pk3jIGQzDh6cfdeRDt4sBsD ZmryGHpXQieKQGJ+jCmwRnkxnVSvhX/smb6HWwS/vCgJQbcTJ6Zl3miRrHnIjNn8 FV5WgvgjbBEZKpuuMrshw4EBWnCq01KswUGHsiiDMxlCr3BiOM/17ixU7z68UE4C nEgmp4UG6dl8c1hf2Y+NMxnBV6cZKv246MuFLGkkOItKtqtdNgpE+1cUFzxQVkv+ 3x9r6onU+tbtLY8Fy2Eq9G9kcbbogbjY1S2ZQsL4d7rIbJ1Zx/hz3QYyONBDIUNj 0YXNBMSNwnA= =0vIb -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2312 - [SUSE] Linux Kernel: CVSS (Max): 7.4

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2312 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2) 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux Kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-1158 CVE-2022-0330 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221605-1 Comment: CVSS (Max): 7.4 CVE-2022-1158 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2) ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1605-1 Rating: important References: #1195950 #1198133 Cross-References: CVE-2022-0330 CVE-2022-1158 Affected Products: SUSE Linux Enterprise High Performance Computing 15-SP2 SUSE Linux Enterprise High Performance Computing 15-SP3 SUSE Linux Enterprise Micro 5.1 SUSE Linux Enterprise Module for Live Patching 15-SP2 SUSE Linux Enterprise Module for Live Patching 15-SP3 SUSE Linux Enterprise Server 15-SP2 SUSE Linux Enterprise Server 15-SP3 SUSE Linux Enterprise Server for SAP Applications 15-SP2 SUSE Linux Enterprise Server for SAP Applications 15-SP3 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues. The following security issues were fixed: o - CVE-2022-1158: Fixed KVM x86/mmu compare-and-exchange of gPTE via the user address (bsc#1198133) o CVE-2022-0330: A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bsc#1195950) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Live Patching 15-SP3: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2022-1601=1 SUSE-SLE-Module-Live-Patching-15-SP3-2022-1614=1 SUSE-SLE-Module-Live-Patching-15-SP3-2022-1620=1 SUSE-SLE-Module-Live-Patching-15-SP3-2022-1621=1 SUSE-SLE-Module-Live-Patching-15-SP3-2022-1623=1 SUSE-SLE-Module-Live-Patching-15-SP3-2022-1631=1 SUSE-SLE-Module-Live-Patching-15-SP3-2022-1632=1 SUSE-SLE-Module-Live-Patching-15-SP3-2022-1633=1 SUSE-SLE-Module-Live-Patching-15-SP3-2022-1635=1 o SUSE Linux Enterprise Module for Live Patching 15-SP2: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2022-1603=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-1604=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-1605=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-1610=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-1612=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-1615=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-1618=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-1619=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-1622=1 Package List: o SUSE Linux Enterprise Module for Live Patching 15-SP3 (ppc64le s390x x86_64): kernel-livepatch-5_3_18-57-default-16-150200.3.1 kernel-livepatch-5_3_18-57-default-debuginfo-16-150200.3.1 kernel-livepatch-5_3_18-59_10-default-14-150300.2.1 kernel-livepatch-5_3_18-59_10-default-debuginfo-14-150300.2.1 kernel-livepatch-5_3_18-59_13-default-14-150300.2.1 kernel-livepatch-5_3_18-59_13-default-debuginfo-14-150300.2.1 kernel-livepatch-5_3_18-59_16-default-13-150300.2.1 kernel-livepatch-5_3_18-59_16-default-debuginfo-13-150300.2.1 kernel-livepatch-5_3_18-59_19-default-12-150300.2.1 kernel-livepatch-5_3_18-59_19-default-debuginfo-12-150300.2.1 kernel-livepatch-5_3_18-59_24-default-10-150300.2.1 kernel-livepatch-5_3_18-59_24-default-debuginfo-10-150300.2.1 kernel-livepatch-5_3_18-59_27-default-10-150300.2.1 kernel-livepatch-5_3_18-59_27-default-debuginfo-10-150300.2.1 kernel-livepatch-5_3_18-59_34-default-9-150300.2.1 kernel-livepatch-5_3_18-59_34-default-debuginfo-9-150300.2.1 kernel-livepatch-5_3_18-59_5-default-14-150300.2.1 kernel-livepatch-5_3_18-59_5-default-debuginfo-14-150300.2.1 kernel-livepatch-SLE15-SP3_Update_0-debugsource-16-150200.3.1 kernel-livepatch-SLE15-SP3_Update_1-debugsource-14-150300.2.1 kernel-livepatch-SLE15-SP3_Update_2-debugsource-14-150300.2.1 kernel-livepatch-SLE15-SP3_Update_3-debugsource-14-150300.2.1 kernel-livepatch-SLE15-SP3_Update_4-debugsource-13-150300.2.1 kernel-livepatch-SLE15-SP3_Update_5-debugsource-12-150300.2.1 kernel-livepatch-SLE15-SP3_Update_6-debugsource-10-150300.2.1 kernel-livepatch-SLE15-SP3_Update_7-debugsource-10-150300.2.1 kernel-livepatch-SLE15-SP3_Update_9-debugsource-9-150300.2.1 o SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x x86_64): kernel-livepatch-5_3_18-24_53_4-default-14-150200.2.1 kernel-livepatch-5_3_18-24_53_4-default-debuginfo-14-150200.2.1 kernel-livepatch-5_3_18-24_67-default-14-150200.2.1 kernel-livepatch-5_3_18-24_67-default-debuginfo-14-150200.2.1 kernel-livepatch-5_3_18-24_70-default-14-150200.2.1 kernel-livepatch-5_3_18-24_70-default-debuginfo-14-150200.2.1 kernel-livepatch-5_3_18-24_75-default-13-150200.2.1 kernel-livepatch-5_3_18-24_75-default-debuginfo-13-150200.2.1 kernel-livepatch-5_3_18-24_78-default-12-150200.2.1 kernel-livepatch-5_3_18-24_78-default-debuginfo-12-150200.2.1 kernel-livepatch-5_3_18-24_83-default-10-150200.2.1 kernel-livepatch-5_3_18-24_83-default-debuginfo-10-150200.2.1 kernel-livepatch-5_3_18-24_86-default-10-150200.2.1 kernel-livepatch-5_3_18-24_86-default-debuginfo-10-150200.2.1 kernel-livepatch-5_3_18-24_93-default-9-150200.2.1 kernel-livepatch-5_3_18-24_93-default-debuginfo-9-150200.2.1 kernel-livepatch-5_3_18-24_96-default-8-150200.2.1 kernel-livepatch-5_3_18-24_96-default-debuginfo-8-150200.2.1 kernel-livepatch-SLE15-SP2_Update_14-debugsource-14-150200.2.1 kernel-livepatch-SLE15-SP2_Update_15-debugsource-14-150200.2.1 kernel-livepatch-SLE15-SP2_Update_16-debugsource-14-150200.2.1 kernel-livepatch-SLE15-SP2_Update_17-debugsource-13-150200.2.1 kernel-livepatch-SLE15-SP2_Update_18-debugsource-12-150200.2.1 kernel-livepatch-SLE15-SP2_Update_19-debugsource-10-150200.2.1 kernel-livepatch-SLE15-SP2_Update_20-debugsource-10-150200.2.1 kernel-livepatch-SLE15-SP2_Update_21-debugsource-9-150200.2.1 kernel-livepatch-SLE15-SP2_Update_22-debugsource-8-150200.2.1 References: o https://www.suse.com/security/cve/CVE-2022-0330.html o https://www.suse.com/security/cve/CVE-2022-1158.html o https://bugzilla.suse.com/1195950 o https://bugzilla.suse.com/1198133 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxZeMkNZI30y1K9AQjpjg//YXbVgHsDTqPko+Y7VYJHqZhIiWMmDL1V 3KwDm4iRmDKkvkZRbFljf6nyffcavFNS8RVP+FhakhUBz26G3MT0iM3TWsIAwi7M z1jA/Mrk9sHCOIGJ5LRxBLqm+oxFNnrQP3oNlEFEaCWmRSeFX+LVLQHv4DaFuces Gn0ogbGmHJrKJu/Z3r1z2jj/DKFxUofoD7rVCnJYRjFf/V23muyDAgtoVFFlkHhZ tH34doQIJIYWM675SgIBIYCNe80/sPAc8vB9uXhWeV8xmiZ39obmgSBah6qrRoa8 2Zoy3tQSMbKSXHwvqiZWS2kQ18lCyPkiD0gYeGHon4VySBgTpYMxYoJbXOIdRWZo wtnM7xKoyNcRJYk6ZbZ72zl4XLCXi9foeNys/OviES9Va7A3hG3m9OhhjmfZdRi4 Aycyitd8fleUBmaG9Emao534SOBG6xDM5z55s4fbACk4zeDb2gpT5qHVe5fo1Ro6 VTn7iDP2llX1eK5kbmyr1PPnqmr1XSdiF0eBmNXvN4vTAerq5cHHpKQUAhuAwPJf IW277/WI0NJch81fDdU0a0t2sCR4pZMUJvG3WrSWOBqQ7ATZ03eVcanknMQvXUG6 wdOUtCpKyi5UPmmWkSBOrdu6oJ3qP6b5zwc9s/rv28c/PGdPeKm/zYblIktNAYvL CrCz6SiLlds= =j2lm -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2311 - [SUSE] Linux Kernel: CVSS (Max): 7.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2311 Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP1) 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux Kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-0330 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221589-1 Comment: CVSS (Max): 7.0 CVE-2022-0330 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP1) ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1589-1 Rating: important References: #1195950 Cross-References: CVE-2022-0330 Affected Products: SUSE Linux Enterprise High Performance Computing 15 SUSE Linux Enterprise High Performance Computing 15-SP1 SUSE Linux Enterprise Live Patching 12-SP4 SUSE Linux Enterprise Live Patching 12-SP5 SUSE Linux Enterprise Module for Live Patching 15 SUSE Linux Enterprise Module for Live Patching 15-SP1 SUSE Linux Enterprise Server 15 SUSE Linux Enterprise Server 15-SP1 SUSE Linux Enterprise Server for SAP Applications 15 SUSE Linux Enterprise Server for SAP Applications 15-SP1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 4.12.14-197_102 fixes one issue. The following security issue was fixed: o CVE-2022-0330: A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bsc#1195950) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Live Patching 15-SP1: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2022-1589=1 SUSE-SLE-Module-Live-Patching-15-SP1-2022-1590=1 SUSE-SLE-Module-Live-Patching-15-SP1-2022-1592=1 SUSE-SLE-Module-Live-Patching-15-SP1-2022-1602=1 o SUSE Linux Enterprise Module for Live Patching 15: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-2022-1608=1 SUSE-SLE-Module-Live-Patching-15-2022-1613=1 SUSE-SLE-Module-Live-Patching-15-2022-1636=1 o SUSE Linux Enterprise Live Patching 12-SP5: zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2022-1596=1 SUSE-SLE-Live-Patching-12-SP5-2022-1599=1 SUSE-SLE-Live-Patching-12-SP5-2022-1600=1 SUSE-SLE-Live-Patching-12-SP5-2022-1607=1 SUSE-SLE-Live-Patching-12-SP5-2022-1628=1 o SUSE Linux Enterprise Live Patching 12-SP4: zypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2022-1606=1 Package List: o SUSE Linux Enterprise Module for Live Patching 15-SP1 (ppc64le x86_64): kernel-livepatch-4_12_14-197_102-default-8-150100.2.1 kernel-livepatch-4_12_14-197_89-default-16-150100.2.1 kernel-livepatch-4_12_14-197_92-default-15-150100.2.1 kernel-livepatch-4_12_14-197_99-default-13-150100.2.1 o SUSE Linux Enterprise Module for Live Patching 15 (ppc64le x86_64): kernel-livepatch-4_12_14-150_72-default-16-150000.2.1 kernel-livepatch-4_12_14-150_72-default-debuginfo-16-150000.2.1 kernel-livepatch-4_12_14-150_75-default-13-150000.2.1 kernel-livepatch-4_12_14-150_75-default-debuginfo-13-150000.2.1 kernel-livepatch-4_12_14-150_78-default-8-150000.2.1 kernel-livepatch-4_12_14-150_78-default-debuginfo-8-150000.2.1 o SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64): kgraft-patch-4_12_14-122_71-default-16-2.1 kgraft-patch-4_12_14-122_74-default-14-2.1 kgraft-patch-4_12_14-122_80-default-13-2.1 kgraft-patch-4_12_14-122_83-default-12-2.1 kgraft-patch-4_12_14-122_88-default-10-2.1 o SUSE Linux Enterprise Live Patching 12-SP4 (ppc64le s390x x86_64): kgraft-patch-4_12_14-95_74-default-16-2.1 References: o https://www.suse.com/security/cve/CVE-2022-0330.html o https://bugzilla.suse.com/1195950 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxZPskNZI30y1K9AQhTzg/+M06MILZk4YPKg7FmzEIX8wGp3rsgKXMy v7TWKrS8T4FiCB9w0+f2dt2soIZHOmwPwEtSxjeRRj+EdqZqlIQct25RQjyoZR7o T4MUWbKvW/VuEE6fyx3ej5bgQuzSVf24m+awcB4y2gQI4/zRgWUNqNT9/tVJAP6e 4KEaubSprKZW0GB29mLbndn1vH/J1YdYimHpQYooVvNOYAm0ClGJCg9t6XL+T0Lf Bxbqku7t7+sXotsOqRmOA34rBv3CrjmHXIM2zSZayX+drS6U951DI3xFuNTMkSuL 4Sudr4g0F2hsg4APKzr5aotjBuirJHuY6XN2YAQqvYajb8gAgJgOcQq2JJeZ+5V6 qYy18SUDmlB6nEvz3VayKXQtJQQTeKBGfMTAxMXmRMtPClHT8CaSoQ8gaI4sgWHl WS++7oAZRKQTmUXFAQoSGkHVN0oh+zJgTAnHhccE5sopG2fgQ89vEGJY70Gh/kYR VdWxGtR00F3dZb1l3wbjPHYGYb87Vj0LBVk/aytByJhbZCsrBsIUWz1kk3VbZMXD fF7CP3qFHgz23pjcja8M7ewa6/fDD5jp9m9JjYQJ+QMGAa32sqkxfb001RYmwqOo 5EshbFzwu2j6kKnvTIGllb0+Ymqj029gVXgHx1WXIPUG90hTjEdA1xcw/iEujSRI IR+1JPUKEOI= =1Z8A -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2310 - [SUSE] Linux Kernel: CVSS (Max): 7.4

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2310 Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP2) 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux Kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-1158 CVE-2022-0330 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221637-1 Comment: CVSS (Max): 7.4 CVE-2022-1158 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP2) ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1637-1 Rating: important References: #1195950 #1198133 Cross-References: CVE-2022-0330 CVE-2022-1158 Affected Products: SUSE Linux Enterprise High Performance Computing 15-SP2 SUSE Linux Enterprise Module for Live Patching 15-SP2 SUSE Linux Enterprise Server 15-SP2 SUSE Linux Enterprise Server for SAP Applications 15-SP2 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 5.3.18-24_99 fixes several issues. The following security issues were fixed: o - CVE-2022-1158: Fixed KVM x86/mmu compare-and-exchange of gPTE via the user address (bsc#1198133) o CVE-2022-0330: A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bsc#1195950) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Live Patching 15-SP2: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2022-1637=1 Package List: o SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x x86_64): kernel-livepatch-5_3_18-24_99-default-7-150200.2.1 kernel-livepatch-5_3_18-24_99-default-debuginfo-7-150200.2.1 kernel-livepatch-SLE15-SP2_Update_23-debugsource-7-150200.2.1 References: o https://www.suse.com/security/cve/CVE-2022-0330.html o https://www.suse.com/security/cve/CVE-2022-1158.html o https://bugzilla.suse.com/1195950 o https://bugzilla.suse.com/1198133 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxZCskNZI30y1K9AQi/Qw/9GHc6ngZI1/B+54oQR4Syn6zpruK1aPEv R/8lDLh1O6tJgzpjWwNpej62kjQgk7o+kcyhVm3WhWDPl2wtfn26VTrJwDWhQJHL A+2I0SFcdzzdQGpPc0IxcoTN/4kEIfUIpza9SFvIfawzzv++fRiV60lb7AmzPxXl 60L08A4dYunVs5n52y8eDhlVhA7L+dGowXVJMePjo4ZV0d0e8uM0ChZAhcvf0GY5 RCP1pDinBFhG6pGJf9iEev9S4TPrBYPT56XfVcIsiJrKhKHJAC8IEx+Yg4PAJAKX 4Cm4IMzx3u025WMptdvqgMu2Jb1bfz1nIfXRjXUL/n2ylnL1NEjko4CYJeUVAgjM pgQfJWj6Ck77phbzjLyyM7OT7LHcQg9dHV+xBoB6vCbHj4LmiBrYMIfDA7Y7WvDA Whe7kkyNdIOXG+PQC449d3K23EPHizF4YVJ88HJjOnBpXT4I6C6B5cE+aNyoJKGF U3bfJQ5+3hnkhuBW25wpNtYQkeya6JPh7TG7eOe1UiAQyE3jkqEGqZsgGHRaCgiU C60KHhuKHb4FS/jUt3VufMFIkqreks3Mgent6hLs45KdhnAOl8GpoL6+vCskIgAf b6R2ER2o2ynYnCoURQxshIqNUugVnHZ8eNWpn6llCVndwlDWX5jCIewsvMOJG6Kh szdPV3T3lC8= =Omto -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2309 - [SUSE] Linux Kernel: CVSS (Max): 7.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2309 Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux Kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-0330 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221640-1 Comment: CVSS (Max): 7.0 CVE-2022-0330 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1640-1 Rating: important References: #1195950 Cross-References: CVE-2022-0330 Affected Products: SUSE Linux Enterprise Server 12-SP3-LTSS SUSE Linux Enterprise Server for SAP 12-SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 4.4.180-94_150 fixes one issue. The following security issue was fixed: o CVE-2022-0330: A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bsc#1195950) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Server for SAP 12-SP3: zypper in -t patch SUSE-SLE-SAP-12-SP3-2022-1638=1 SUSE-SLE-SAP-12-SP3-2022-1639=1 SUSE-SLE-SAP-12-SP3-2022-1640=1 o SUSE Linux Enterprise Server 12-SP3-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2022-1638=1 SUSE-SLE-SERVER-12-SP3-2022-1639=1 SUSE-SLE-SERVER-12-SP3-2022-1640=1 Package List: o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64): kgraft-patch-4_4_180-94_144-default-15-2.1 kgraft-patch-4_4_180-94_144-default-debuginfo-15-2.1 kgraft-patch-4_4_180-94_147-default-12-2.1 kgraft-patch-4_4_180-94_147-default-debuginfo-12-2.1 kgraft-patch-4_4_180-94_150-default-8-2.1 kgraft-patch-4_4_180-94_150-default-debuginfo-8-2.1 o SUSE Linux Enterprise Server 12-SP3-LTSS (ppc64le x86_64): kgraft-patch-4_4_180-94_144-default-15-2.1 kgraft-patch-4_4_180-94_144-default-debuginfo-15-2.1 kgraft-patch-4_4_180-94_147-default-12-2.1 kgraft-patch-4_4_180-94_147-default-debuginfo-12-2.1 kgraft-patch-4_4_180-94_150-default-8-2.1 kgraft-patch-4_4_180-94_150-default-debuginfo-8-2.1 References: o https://www.suse.com/security/cve/CVE-2022-0330.html o https://bugzilla.suse.com/1195950 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxYe8kNZI30y1K9AQjrrw//eWDmqLnD+8lTIURqTaNLX7a9+iH4i8WZ WM1TIJ1p8CLERkcF+O1VQJwRIrXMQJYi+pJ7emERAQhocvFdrm+qirXdEMXb4xqZ 2qpEoTYp224l6RxJD56TQv0Qfh1B0kfOQ15qI9vpJqg0IUN17DRgrVdfODEOpT/l Y9T6L1px7EzHY9Vf0H0A0s7BzqsaOysb/cUJXW+RpP5k/Dhp+KOgyPjZbdkfxzvS 0zUPrv7WovLCiW0G8o3tdvPlNVc/npdtsi7sMWFzzLnzBAbfN1RPUBQUuVlhwEuE rvRN1lwwx+pSr3CNlerG/AZmtCwWIxgbEJ9GFbNd+LlnwLlPh74csoGKzrMmEO5/ yduT+Liq3rB1jc+tdw9WEe+RRfuqP282ULdZnGmypHjHSa4dpdX+xMxG029UiCRi IbYc7OF65gJuk4qcleTHloi/GOYhc7xhzPoh3hozR/lIyPc9CwydoTD/r/v2FJOB E4ir9cZj+fk+v75eHG9g795u5NGg/tlAgyO4knmLlcR0/6PqzXazMLm/A75nE/3e reii49iAwHrvCLeLNTZckS6SZ/Hyvsou/7pjKY8xPvNZNKhFuksflsywkchQYcrv b1wYb2wiK2tfsZ8LVms+ucIkBIdNV4LMAEtHWIe0+GqvusSDKTLxM+H4/LSXzcM9 sqh6GQD58X4= =WPc+ -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2308 - [SUSE] Linux Kernel: CVSS (Max): 7.4

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2308 Security update for the Linux Kernel (Live Patch 44 for SLE 12 SP3) 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux Kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-1011 CVE-2021-39713 CVE-2021-28688 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221641-1 Comment: CVSS (Max): 7.4 CVE-2021-39713 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel (Live Patch 44 for SLE 12 SP3) ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1641-1 Rating: important References: #1182294 #1197211 #1197344 Cross-References: CVE-2021-28688 CVE-2021-39713 CVE-2022-1011 Affected Products: SUSE Linux Enterprise Server 12-SP3-LTSS SUSE Linux Enterprise Server for SAP 12-SP3 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for the Linux Kernel 4.4.180-94_161 fixes several issues. The following security issues were fixed: o CVE-2022-1011: A use-after-free flaw was found in the FUSE filesystem in the way a user triggers write(). This flaw allowed a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation. (bsc#1197344) o CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free. (bsc#1197211) o CVE-2021-28688: The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11 (bsc#1182294) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Server for SAP 12-SP3: zypper in -t patch SUSE-SLE-SAP-12-SP3-2022-1641=1 o SUSE Linux Enterprise Server 12-SP3-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2022-1641=1 Package List: o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64): kgraft-patch-4_4_180-94_161-default-2-2.1 kgraft-patch-4_4_180-94_161-default-debuginfo-2-2.1 o SUSE Linux Enterprise Server 12-SP3-LTSS (ppc64le x86_64): kgraft-patch-4_4_180-94_161-default-2-2.1 kgraft-patch-4_4_180-94_161-default-debuginfo-2-2.1 References: o https://www.suse.com/security/cve/CVE-2021-28688.html o https://www.suse.com/security/cve/CVE-2021-39713.html o https://www.suse.com/security/cve/CVE-2022-1011.html o https://bugzilla.suse.com/1182294 o https://bugzilla.suse.com/1197211 o https://bugzilla.suse.com/1197344 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxYL8kNZI30y1K9AQj5+hAAoh+4fPJfqXvaDr/k9eWNM4pXMsOlbX5R GURJ2Dw0FjvuXJ2V6vj2MZdTtlLsQJYh2nYlDWT1+e9W/+zwmFf9W99MeM3ejClo GHkzmuSWGzpb0TX0bWvrJxDEIrgUDqD4R8S1PwdUcEXvVNGy6qYHa/55P3OacO6t Uqr2ULxkp0Y6h8H7kQ4eldwVDbZx0yyt51CNBOKbgmjxquEZsnULTPx96hKo1FLU OJox6e7kJrfuj69dMFqxwgA08J0AstSbzwz0Mk+zC/X5IzjEC3vhCzqhNzxzJcn3 VRZC+6JEG35M9KBGdNApcVjPCb9QaNce/DK1EUZfCIyMUVz6ypGzsbCXKB3nNT6K Nk0pobGs2D9rb8Sbn6blUvQfVbkpPQVvzr464eYeP3uVLMKuQGFjZuAf8rOyjaXu NWj7HoewTA+d73ADxr9n5Q9dXeOE0KpoQWUzJF7u5yWj5UjcE+eoIGfdoLWpZT0P gcuZxYnnt84wqv/eSE2F33bumQeU5SSYfsxFHbqPWYUUjQBiqU3AG+Vrhs+PVpcm QGAPfl1jjOZmLMCgqb0ZnG7ZPJOL3K/HZXF7bZXxh5pvTDBmWTHvltksbbESBANW PIj1GigV2qHe3FnxKIs/F7A6SU8QJ5243fgrgwhMe+KgC08zIOL3MfdWWC2VO8Tu CQEnIPsTMxs= =bmXo -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2307 - [RedHat] Openshift Logging: CVSS (Max): 8.3

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2307 Openshift Logging Security and Bug update Release (5.2.10) 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Openshift Logging Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-25636 CVE-2022-21698 CVE-2022-21496 CVE-2022-21476 CVE-2022-21443 CVE-2022-21434 CVE-2022-21426 CVE-2022-1271 CVE-2022-1154 CVE-2022-0778 CVE-2022-0759 CVE-2021-43797 CVE-2021-37137 CVE-2021-37136 CVE-2021-4028 CVE-2018-25032 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:2218 Comment: CVSS (Max): 8.3 CVE-2022-0759 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Openshift Logging Security and Bug update Release (5.2.10) Advisory ID: RHSA-2022:2218-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2022:2218 Issue date: 2022-05-11 CVE Names: CVE-2018-25032 CVE-2021-4028 CVE-2021-37136 CVE-2021-37137 CVE-2021-43797 CVE-2022-0759 CVE-2022-0778 CVE-2022-1154 CVE-2022-1271 CVE-2022-21426 CVE-2022-21434 CVE-2022-21443 CVE-2022-21476 CVE-2022-21496 CVE-2022-21698 CVE-2022-25636 ===================================================================== 1. Summary: Openshift Logging Bug Fix Release (5.2.10) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Openshift Logging Bug Fix Release (5.2.10) Security Fix(es): * kubeclient: kubeconfig parsing error can lead to MITM attacks (CVE-2022-0759) * netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data (CVE-2021-37136) * netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way (CVE-2021-37137) * netty: control chars in header names may lead to HTTP request smuggling (CVE-2021-43797) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For OpenShift Container Platform 4.8 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update: https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html For Red Hat OpenShift Logging 5.2, see the following instructions to apply this update: https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2004133 - CVE-2021-37136 netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data 2004135 - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way 2031958 - CVE-2021-43797 netty: control chars in header names may lead to HTTP request smuggling 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter 2058404 - CVE-2022-0759 kubeclient: kubeconfig parsing error can lead to MITM attacks 5. JIRA issues fixed (https://issues.jboss.org/): LOG-1972 - Getting message, "Prometheus could not scrape fluentd for more than 10m." LOG-2335 - [release-5.2] Events listing out of order in Kibana 6.8.1 LOG-2475 - http.max_header_size set to 128kb causes communication with elasticsearch to stop working LOG-2480 - EO shouldn't grant cluster-wide permission to system:serviceaccount:openshift-monitoring:prometheus-k8s when ES cluster is deployed. [openshift-logging 5.2] 6. References: https://access.redhat.com/security/cve/CVE-2018-25032 https://access.redhat.com/security/cve/CVE-2021-4028 https://access.redhat.com/security/cve/CVE-2021-37136 https://access.redhat.com/security/cve/CVE-2021-37137 https://access.redhat.com/security/cve/CVE-2021-43797 https://access.redhat.com/security/cve/CVE-2022-0759 https://access.redhat.com/security/cve/CVE-2022-0778 https://access.redhat.com/security/cve/CVE-2022-1154 https://access.redhat.com/security/cve/CVE-2022-1271 https://access.redhat.com/security/cve/CVE-2022-21426 https://access.redhat.com/security/cve/CVE-2022-21434 https://access.redhat.com/security/cve/CVE-2022-21443 https://access.redhat.com/security/cve/CVE-2022-21476 https://access.redhat.com/security/cve/CVE-2022-21496 https://access.redhat.com/security/cve/CVE-2022-21698 https://access.redhat.com/security/cve/CVE-2022-25636 https://access.redhat.com/security/updates/classification/#moderate 7. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYnw2RtzjgjWX9erEAQh8nQ/+OAarTUnxgBkNViezx9XDTr+csYzudmtx CNQV8M0aTveV2QT3aAOW35TJSEgy+bm4PYpIMXVr1sqCXEU/DWuFvLgtjJtO8x5t QnudEmHQZGQg1pkXE84ybihqRshFAIEdxe57Y7pDiyvpnEv8mUZ17T+GMnkYUkKO 6dZi0sq6c1fGRWC+h+lP7Q3RZXk2J+uOTP8wfGexUoyZxDAmO3HfmoSg+gKV8A0f y2ZD+ThRAtw08f3VvXWbiSMTDMwe64CEZcyJO4uNaPuZ/1nXun15I9K/GDn1khVL Jg0XeEOF2oo68ZDPqeSlDo64C2COuZphJ7wozNqW9aMuPr7ZzDyz99ztZSsEYEE6 3a9t3ssL936pnyEkDvSRubxoymzBQg/xVCNPrqs6rrGLZEebuYXHFLkItvpy3jbz kglI4C/d3hyasjkrZUhamJZu8kGoL6QX/hMOdyTIqI7kb2veCShXf2LsHHW3IRq5 U1MubYGsLaIulm342kijuIg3hBG5DwM32t0f/1TNwtE7+vjPg9CGi9ShrpafVB0Y de1G6mh1rMdbvZ7NYc4EEmivnHeCiMNwzITHuzRptlUE/3rTQbH2gv19Lq1jXqTb HL5a1ajIo3JkwelRkAtyKC3SK1jr0tYw04aJ3yPw/NARHYxgjG9FanvYRVExbBPx MlQOsxrJi0U= =5Cek - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxI/skNZI30y1K9AQhBHw/+KWF/izKczuUHL+7XehIKab8m0Gglogeh M0/E87K3u3tB16zIEdiPhHc4Kadefw5TfsK+f8nXjm295gpTuGziEM/t8uQIlfih yICxzoeujDpCa8kkKLQraqZBnGh0N/rczlOHy2YiG/4ZhI0ZPWL1ba5pnriEESxm WJseGyvBgNPzW6eMNdgyVo/h9a48qemiLxr18HEJc6SKPYA14lIuGq9WqcaNUMlW ioOW/PpQas1e6dnLHnQ8l9SvWuV/87u6Qw/opD/lnoLp4YWu7gjhRtnL0rV6CzO3 A4yJwsK/G3B2rLNZlIa0OA72dc0o3Dx+eQjuDfb8/zzh08lUXCM1pVwlcdmPjs+z 8z4/4r+9/dHxxhjb+AIWc0cNU1ZvE8vnZi/46gZgj5HKW3M6i5IjBd7GIYMRCeVm L3XYIx/BYszwToeKH2HNhDVapHK2rlRsCfGXD4y36MYf4vHiGUo1EIB5NGnueYvY 3p25r+7UDd4rBjvle/j69Xv8j+X7dmZTEDFSk2BE21iYhLzurHBE8YavMEnmIUbv op90fPpakfSEPHmPOa22b3czjLY+n3E0aaVjrRbQv8XK8SIgKqKLy0UJhYEwst9W 35aXzqWNRxxJO6/Erdz0c4IRaP5OzTNtDzw2ZLGSSaDDb2BXclmq7FgEjcZEKkJ+ Zge+Gf7UwmY= =Kcj1 -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2306 - [RedHat] Red Hat OpenShift Logging: CVSS (Max): 8.3

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2306 Red Hat OpenShift Logging Security and Bug update Release 5.3.7 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat OpenShift Logging Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-25636 CVE-2022-21698 CVE-2022-21496 CVE-2022-21476 CVE-2022-21443 CVE-2022-21434 CVE-2022-21426 CVE-2022-1271 CVE-2022-1154 CVE-2022-0778 CVE-2022-0759 CVE-2021-43797 CVE-2021-37137 CVE-2021-37136 CVE-2021-4028 CVE-2018-25032 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:2217 Comment: CVSS (Max): 8.3 CVE-2022-0759 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat OpenShift Logging Security and Bug update Release 5.3.7 Advisory ID: RHSA-2022:2217-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2022:2217 Issue date: 2022-05-11 CVE Names: CVE-2018-25032 CVE-2021-4028 CVE-2021-37136 CVE-2021-37137 CVE-2021-43797 CVE-2022-0759 CVE-2022-0778 CVE-2022-1154 CVE-2022-1271 CVE-2022-21426 CVE-2022-21434 CVE-2022-21443 CVE-2022-21476 CVE-2022-21496 CVE-2022-21698 CVE-2022-25636 ===================================================================== 1. Summary: Openshift Logging Bug Fix Release (5.3.7) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Openshift Logging Bug Fix Release (5.3.7) Security Fix(es): * kubeclient: kubeconfig parsing error can lead to MITM attacks (CVE-2022-0759) * netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data (CVE-2021-37136) * netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way (CVE-2021-37137) * netty: control chars in header names may lead to HTTP request smuggling (CVE-2021-43797) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update: https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html For Red Hat OpenShift Logging 5.3, see the following instructions to apply this update: https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2004133 - CVE-2021-37136 netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data 2004135 - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way 2031958 - CVE-2021-43797 netty: control chars in header names may lead to HTTP request smuggling 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter 2058404 - CVE-2022-0759 kubeclient: kubeconfig parsing error can lead to MITM attacks 5. JIRA issues fixed (https://issues.jboss.org/): LOG-2334 - [release-5.3] Events listing out of order in Kibana 6.8.1 LOG-2450 - http.max_header_size set to 128kb causes communication with elasticsearch to stop working LOG-2481 - EO shouldn't grant cluster-wide permission to system:serviceaccount:openshift-monitoring:prometheus-k8s when ES cluster is deployed. [openshift-logging 5.3] 6. References: https://access.redhat.com/security/cve/CVE-2018-25032 https://access.redhat.com/security/cve/CVE-2021-4028 https://access.redhat.com/security/cve/CVE-2021-37136 https://access.redhat.com/security/cve/CVE-2021-37137 https://access.redhat.com/security/cve/CVE-2021-43797 https://access.redhat.com/security/cve/CVE-2022-0759 https://access.redhat.com/security/cve/CVE-2022-0778 https://access.redhat.com/security/cve/CVE-2022-1154 https://access.redhat.com/security/cve/CVE-2022-1271 https://access.redhat.com/security/cve/CVE-2022-21426 https://access.redhat.com/security/cve/CVE-2022-21434 https://access.redhat.com/security/cve/CVE-2022-21443 https://access.redhat.com/security/cve/CVE-2022-21476 https://access.redhat.com/security/cve/CVE-2022-21496 https://access.redhat.com/security/cve/CVE-2022-21698 https://access.redhat.com/security/cve/CVE-2022-25636 https://access.redhat.com/security/updates/classification/#moderate 7. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYnw2U9zjgjWX9erEAQi7Sw/+L7yfu+C6un45ah5GgF3MXRTXRLaBr3WU zDESM/2JnBZFHeJAjhyr71CxiSUc/ISjU40PZU4RC1VfsDk0yIZGVbcU5kexCkJj yfM95bUnzJiyCjHE3Xdq8TDQOUGVM+TDYqaGeGcATHTgSPj8WqWHgvV9KlotY5FL lhsb2TDn3h/rHbV7FpQ3mTJT7yrxPXGLFQN69n6IXIiSDOKedo3DBKBYROt2+BEW TkPnTZMWGyIkpnD0J8naJm5DtbJIvMOqQR9WW6GW4ISMAdVroI0423IeEy/JKyA/ 25dZrJ/bFbh0riqlCQSH0/Ud45g73ebqidYNGValKrmRMH9/EAblVKGKjR84G8XF /PGix26s9TMS7Iqv9IaJckc+b6ODZMDH8In/p3G+R4FQm1OqhHkOziXNhcbcIilm 2UYX5difbNRwbwzRkPJvAfg1BvtlobvuPj7UwjPcD4pBXKBjazqQCuwm2GB8Tehh dVp6ERe/Iuo32ETq+8/dBb2D9EEJdX33r9XX8si+q0g5+nHhFc473jP+uvwEBDpB 0B9bcknB6mgn4FyGMA5ujuFJ+31SEZf9LniEc6lQ8+DY5C38/ptBncDEp376HAFs WH4I6Z0xub7Uc2Jn1GmRuoUpQf+MRjn6ZFUImOQaROAYKPDrAWnirmLaAor9QwU0 PYI0DDsEFj0= =48O2 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxI3skNZI30y1K9AQi6ww/+MdvnnJH2n+oFFoOoy9VceJiPyApPPPf0 CMGiH+VBhNLvCeeVw/WewJOHxx2KCzwNb5BXEpJ0RnE4W3De1HaYT8dLDZ9dq2CN dPGabAQN+P3eYhEM3S505j81C/8RItrNvlPjkJ/WbdwOVObkTcWGG6OODrxuLg6J VC8/1LOwkg+6RL62wpLvikyFsVlghOUNF2o4zuzzjsjuuPShpUDgg6rI3wOJ8J6Z JoILE5xNMlZ0UGqEtrguQdJyCYkYqeP7FUnZjeZYNy9xV5aUeJDmPPvAfnaykn7o Qhy9JQxxOr6o4qbdyIyZxwn/IoD9TEzNpyB5eAq7BsUGnlHIRJcu3EfcKUv/kQyB ftZhTlg1AOiQzGd9IxxMP9a1tzL9RXd6zRIcNjXE05PpA8iKrbFzWs43PSiC7Mgf ldZzH+uVT4MDmo3MaejAtFPY+ceiZGBJQc+2tBDz+7VWpxiVD62E5BxjgIl8pLhf KFgIfJeH8pspA7V0swM3yTBTE3V2fBTCsK1B/Ua4XAbPypK3U61lXQ2GmW93rKst dZf6Yu6FPtB4636YaW0trwARyM5EedBEiT1iUbOIj3pyCvWQznW7SO1eW5V6PanF X7d28lsZkbIrL0ifIns6OXe5w4BCVX5Ael8tp1KJtLR6i/mm+BiBcoinvC3SGQK6 wYdoNLIWGag= =dN1G -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2305 - [RedHat] Red Hat OpenShift Logging: CVSS (Max): 8.2

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2305 Red Hat OpenShift Logging Security and Bug update Release 5.4.1 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat OpenShift Logging Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-25636 CVE-2022-21698 CVE-2022-21496 CVE-2022-21476 CVE-2022-21443 CVE-2022-21434 CVE-2022-21426 CVE-2022-1271 CVE-2022-1154 CVE-2022-0778 CVE-2021-43797 CVE-2021-37137 CVE-2021-37136 CVE-2021-4028 CVE-2018-25032 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:2216 Comment: CVSS (Max): 8.2 CVE-2018-25032 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat OpenShift Logging Security and Bug update Release 5.4.1 Advisory ID: RHSA-2022:2216-01 Product: Logging Subsystem for Red Hat OpenShift Advisory URL: https://access.redhat.com/errata/RHSA-2022:2216 Issue date: 2022-05-11 CVE Names: CVE-2018-25032 CVE-2021-4028 CVE-2021-37136 CVE-2021-37137 CVE-2021-43797 CVE-2022-0778 CVE-2022-1154 CVE-2022-1271 CVE-2022-21426 CVE-2022-21434 CVE-2022-21443 CVE-2022-21476 CVE-2022-21496 CVE-2022-21698 CVE-2022-25636 ===================================================================== 1. Summary: Logging Subsystem 5.4.1 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Logging Subsystem 5.4.1 - Red Hat OpenShift Security Fix(es): * netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data (CVE-2021-37136) * netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way (CVE-2021-37137) * netty: control chars in header names may lead to HTTP request smuggling (CVE-2021-43797) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For OpenShift Container Platform 4.9 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update: https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html For Red Hat OpenShift Logging 5.4, see the following instructions to apply this update: https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2004133 - CVE-2021-37136 netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data 2004135 - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way 2031958 - CVE-2021-43797 netty: control chars in header names may lead to HTTP request smuggling 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter 5. JIRA issues fixed (https://issues.jboss.org/): LOG-2437 - EO shouldn't grant cluster-wide permission to system:serviceaccount:openshift-monitoring:prometheus-k8s when ES cluster is deployed. [openshift-logging 5.4] LOG-2442 - Log file metric exporter not working with /var/log/pods LOG-2448 - Audit and journald logs cannot be viewed from LokiStack, when logs are forwarded with Vector as collector. 6. References: https://access.redhat.com/security/cve/CVE-2018-25032 https://access.redhat.com/security/cve/CVE-2021-4028 https://access.redhat.com/security/cve/CVE-2021-37136 https://access.redhat.com/security/cve/CVE-2021-37137 https://access.redhat.com/security/cve/CVE-2021-43797 https://access.redhat.com/security/cve/CVE-2022-0778 https://access.redhat.com/security/cve/CVE-2022-1154 https://access.redhat.com/security/cve/CVE-2022-1271 https://access.redhat.com/security/cve/CVE-2022-21426 https://access.redhat.com/security/cve/CVE-2022-21434 https://access.redhat.com/security/cve/CVE-2022-21443 https://access.redhat.com/security/cve/CVE-2022-21476 https://access.redhat.com/security/cve/CVE-2022-21496 https://access.redhat.com/security/cve/CVE-2022-21698 https://access.redhat.com/security/cve/CVE-2022-25636 https://access.redhat.com/security/updates/classification/#moderate 7. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYnw2WdzjgjWX9erEAQjPCg//efYQE45tMWtgRGVGo0hKPbiqn/XluxH2 mV9guOJoNcN79wArIn9tGr1SUHMQ8csRyFAzcDOSLZHhqakXdYx+9lZx1xyqYmCm yoQ7/JOZRmmISnrUl8BY0k8/SVfFIcteWZM6H9ZPKHT59XwpLGdK4vJBi90gyFum Khc3Xf+AcA1/W4C3zaOznRw/ERhbVQwiCzdxPyCV2hrkxDQNx7fdW55qCYF158Wv x4AYebhKMtVQuOgLL+/S/lkGcoOj4CMTHKJASrDk58YH3c6u6ZO6SAfutB6fgg59 N5+lR1jv5M7yJPwwdOXyd/NcPKdDmX+dSmcxV9j6e923rC92UkdMcE5MpswOai/P Le/N9vnLAM9YU7Y7ed3q0mAKqyZ0IKDldtE5qApgXz3PylrkodfDivBF7ewMYPz5 WcM6ggu9cIJDNbyp4oADRO9iPU6NHzyldjtaXfFQ2uiBmIdPhCrBNFFng6jJSWRA wIfoCJgbUeeEZVle3fmYTNDU62/DIDXIUlVjJar7YVbnwiRn/b//S09Wj3sZ9G23 F69dYrUdZwqgOjLnDStu2xLszFSE9zA9UxoyIOSVikahdMfazMgQsR2GLap1Ekd7 UFXxtgF46vvY4Xy3OtEjqB/CBV8fiKsM9eXAyPws8X5ZSNs7u9jRqj4ZxionIMKl 9rwS/Y7RBGg= =tfqg - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxIz8kNZI30y1K9AQgdOA//fjB96v8k5TBGqXzETLWfAtE8IW+81a8w 2BTxR6zsf8NX1FQshcpb1Qy+lRZ8SL1IJCEyCUI23uwxeUyI2hb5VLS0dWUhXjDw 4S0akfxjcVIGH+uMfzwnFm24W24tXEfNTJH9XCqpxrcQpWcOcsY3i+GATr0CqR+c rFkt6R35zVEALR5tzygrIL9qva1hRcy5NjLm8tPA6aLlLBp1ZhA5M0XS/9d+6hfT cHpEclUJ4xHtqulH2JxLPY/lSLfdJTjHFpKibI8FG954/M/B5eoKEQ6uLhhxie/4 cBmoDP9bAS89Bxg/pubPzLnTH9rsZ6u2nHKU1MUBWaCXK0Tv5aXaZjFDZdXAzp82 UAAklEJGjr7Uzjjhqyd94LUaQYRLDZlx8PY8w5QY3cXyAWqpFmHiUfoMoVBu3V2t ynnmSgcVV+GmwT1XFHVUhyqVLOx+9gQSsLY07guwm1i5ixJ0q75ZvNiuQ5/tCTc/ oFCBfy8Tqo2mR66RyAYmS6Bb7dZ6jBsV2SobpJWdTER7B5/iJ5jWNIzRMY69owFu sloMhGn6+hF3ZJ4RQSA0dceKwNCYCfXH3Rf8/C3oErUo8r8IObs+ckWgVv9kLckU 5O1IdqUBZhcCTwIfHt9uOgp3MzCynkFo+mxTJbVsr1b6R9ZC91V7abQzQXpDCf8P JHW+YQd4fZY= =s4J2 -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2304 - [RedHat] zlib: CVSS (Max): 8.2

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2304 zlib security update 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: zlib Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2018-25032 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:2214 Comment: CVSS (Max): 8.2 CVE-2018-25032 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: zlib security update Advisory ID: RHSA-2022:2214-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:2214 Issue date: 2022-05-11 CVE Names: CVE-2018-25032 ===================================================================== 1. Summary: An update for zlib is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (v. 6 ELS) - i386, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6 ELS) - i386, s390x, x86_64 3. Description: The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Security Fix(es): * zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2067945 - CVE-2018-25032 zlib: A flaw found in zlib when compressing (not decompressing) certain inputs 6. Package List: Red Hat Enterprise Linux Server (v. 6 ELS): Source: zlib-1.2.3-31.el6_10.src.rpm i386: zlib-1.2.3-31.el6_10.i686.rpm zlib-debuginfo-1.2.3-31.el6_10.i686.rpm zlib-devel-1.2.3-31.el6_10.i686.rpm s390x: zlib-1.2.3-31.el6_10.s390.rpm zlib-1.2.3-31.el6_10.s390x.rpm zlib-debuginfo-1.2.3-31.el6_10.s390.rpm zlib-debuginfo-1.2.3-31.el6_10.s390x.rpm zlib-devel-1.2.3-31.el6_10.s390.rpm zlib-devel-1.2.3-31.el6_10.s390x.rpm x86_64: zlib-1.2.3-31.el6_10.i686.rpm zlib-1.2.3-31.el6_10.x86_64.rpm zlib-debuginfo-1.2.3-31.el6_10.i686.rpm zlib-debuginfo-1.2.3-31.el6_10.x86_64.rpm zlib-devel-1.2.3-31.el6_10.i686.rpm zlib-devel-1.2.3-31.el6_10.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6 ELS): i386: minizip-1.2.3-31.el6_10.i686.rpm minizip-devel-1.2.3-31.el6_10.i686.rpm zlib-debuginfo-1.2.3-31.el6_10.i686.rpm zlib-static-1.2.3-31.el6_10.i686.rpm s390x: minizip-1.2.3-31.el6_10.s390.rpm minizip-1.2.3-31.el6_10.s390x.rpm minizip-devel-1.2.3-31.el6_10.s390.rpm minizip-devel-1.2.3-31.el6_10.s390x.rpm zlib-debuginfo-1.2.3-31.el6_10.s390.rpm zlib-debuginfo-1.2.3-31.el6_10.s390x.rpm zlib-static-1.2.3-31.el6_10.s390x.rpm x86_64: minizip-1.2.3-31.el6_10.i686.rpm minizip-1.2.3-31.el6_10.x86_64.rpm minizip-devel-1.2.3-31.el6_10.i686.rpm minizip-devel-1.2.3-31.el6_10.x86_64.rpm zlib-debuginfo-1.2.3-31.el6_10.i686.rpm zlib-debuginfo-1.2.3-31.el6_10.x86_64.rpm zlib-static-1.2.3-31.el6_10.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-25032 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYnw2BtzjgjWX9erEAQjeZA//U4fM7CbjmjEFlSLiLXkxAg/vA4OddfmK LbxlKPr0/l6bPXg/5kp1fTlTitW3dwNBwbciGMEUoELht8nCqp/6jW39sKaOztAZ vw+IPoJ3BvnVV4768MnfMCApM/iPEPE+vP0U8fEtptNrIjQUvNX4mSX5ROyOv2HF hbFuz3d46IT52bwbVaN5bUaCruefvWPrTsuvQ82QjMykd0TL8P7UTnCJfi9QK9fY zO+J/3+sJ4HLoPchM613MHpRgUYIRRxIBy7N5CUdo1iKqibkye05LcAxGHKHEiZq 2OM2/UKVjIA1DOZ3Z4dYkQx86LM2IrpeELqw5vDAPk+2wexQOtcSNurs1W/No2GX y7DkniocnCTrePRQjXF4E2rnDkbEYvK1NkCI+whb28xh8mETBiIrNqUSK2YdxrEq jjICJAEwcjhu14SNuFWvB7767mx38xhRIT+AdM80KJ7g/EWVS1bUpsFKczaGR6F0 T6s2BeFulSdwP8eN20xjWtweQFzzdW4rmUXFhukFDCHhtdxxjMQaSpSVQbaCr0Vs D9ja84s9UcLSfcUBHKL2YlsZSJcxfq/8M6cncb/z0Iymsa+2dzwPX5wNCUxhHVNm E5NeH+upigtPr3i6T58SEuqe0aTGTsjt3232bWdI8Mqa9ugGcCSFex8s5IDUT2sh vOofk4lw2SM= =U7km - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxIxckNZI30y1K9AQjflA/+NQ6TEr4ZLjwpGs17LHMncGI0f9RWuDNi Ep5fmrEPs4lP+84b4juRL6Ree0FCIVdWHKp1wG04PMKbcReVY7Ma46ZB/yfYk1sN s9k886hUfE5aya8w7IMAptNf5CA07ZPVYIZLa4Z7Bj8pRW7X34jXLR/FBw1Nn2pF FN+6l/iNxTJ1Y+Ljento8ysPl4Xiv+IDNI4iIsL/Vd7exCEpRnfKOlMh6s6ARwsX HJl5DFRtXoH3LoWp8Um1lXd0UGQigbjcOjByrkoaFi/W4AQe3KLdmSxbHW8w7p43 /Q4Myc+n3NCqFMhAI0tJkI2YUboxVX2paKCXHaG+//MjSI5IP2vCP7OjovMdA3Op SUEv3TD17dlgihMtnvBLPUTzQ2qWaiFLjys3fdKmjwbKNm1cbTsApjy7kG0ZYv6u JqLiCwyH54yLsQLppi6cWZqX1F7oReUet+Jo0Ox6iPpMAqyiO8sncXQWcakjYBm2 hXlK32SnXZOXRpnnWN4vvsOKj1RIyq5s4DkgM01kh1o28QhhMdQMa+FoNLsdrITa 9ZY2h6h8e+cLc8UT8ayl8c9fj08p5jsBA0ZCIEePVPZT9KVyAmAwKw14DPQo04en 52d6pSmjiQ3XhTd/vcnB3d4rWelue38Q37F4U5ml35xgABS6n9ZHBkFYHenPd0v7 3hGry9NYnrM= =Zp7r -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2303 - [RedHat] zlib: CVSS (Max): 8.2

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2303 zlib security update 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: zlib Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2018-25032 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:2213 Comment: CVSS (Max): 8.2 CVE-2018-25032 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: zlib security update Advisory ID: RHSA-2022:2213-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:2213 Issue date: 2022-05-11 CVE Names: CVE-2018-25032 ===================================================================== 1. Summary: An update for zlib is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Security Fix(es): * zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2067945 - CVE-2018-25032 zlib: A flaw found in zlib when compressing (not decompressing) certain inputs 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: zlib-1.2.7-20.el7_9.src.rpm x86_64: zlib-1.2.7-20.el7_9.i686.rpm zlib-1.2.7-20.el7_9.x86_64.rpm zlib-debuginfo-1.2.7-20.el7_9.i686.rpm zlib-debuginfo-1.2.7-20.el7_9.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: minizip-1.2.7-20.el7_9.i686.rpm minizip-1.2.7-20.el7_9.x86_64.rpm minizip-devel-1.2.7-20.el7_9.i686.rpm minizip-devel-1.2.7-20.el7_9.x86_64.rpm zlib-debuginfo-1.2.7-20.el7_9.i686.rpm zlib-debuginfo-1.2.7-20.el7_9.x86_64.rpm zlib-devel-1.2.7-20.el7_9.i686.rpm zlib-devel-1.2.7-20.el7_9.x86_64.rpm zlib-static-1.2.7-20.el7_9.i686.rpm zlib-static-1.2.7-20.el7_9.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: zlib-1.2.7-20.el7_9.src.rpm x86_64: zlib-1.2.7-20.el7_9.i686.rpm zlib-1.2.7-20.el7_9.x86_64.rpm zlib-debuginfo-1.2.7-20.el7_9.i686.rpm zlib-debuginfo-1.2.7-20.el7_9.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: minizip-1.2.7-20.el7_9.i686.rpm minizip-1.2.7-20.el7_9.x86_64.rpm minizip-devel-1.2.7-20.el7_9.i686.rpm minizip-devel-1.2.7-20.el7_9.x86_64.rpm zlib-debuginfo-1.2.7-20.el7_9.i686.rpm zlib-debuginfo-1.2.7-20.el7_9.x86_64.rpm zlib-devel-1.2.7-20.el7_9.i686.rpm zlib-devel-1.2.7-20.el7_9.x86_64.rpm zlib-static-1.2.7-20.el7_9.i686.rpm zlib-static-1.2.7-20.el7_9.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: zlib-1.2.7-20.el7_9.src.rpm ppc64: zlib-1.2.7-20.el7_9.ppc.rpm zlib-1.2.7-20.el7_9.ppc64.rpm zlib-debuginfo-1.2.7-20.el7_9.ppc.rpm zlib-debuginfo-1.2.7-20.el7_9.ppc64.rpm zlib-devel-1.2.7-20.el7_9.ppc.rpm zlib-devel-1.2.7-20.el7_9.ppc64.rpm ppc64le: zlib-1.2.7-20.el7_9.ppc64le.rpm zlib-debuginfo-1.2.7-20.el7_9.ppc64le.rpm zlib-devel-1.2.7-20.el7_9.ppc64le.rpm s390x: zlib-1.2.7-20.el7_9.s390.rpm zlib-1.2.7-20.el7_9.s390x.rpm zlib-debuginfo-1.2.7-20.el7_9.s390.rpm zlib-debuginfo-1.2.7-20.el7_9.s390x.rpm zlib-devel-1.2.7-20.el7_9.s390.rpm zlib-devel-1.2.7-20.el7_9.s390x.rpm x86_64: zlib-1.2.7-20.el7_9.i686.rpm zlib-1.2.7-20.el7_9.x86_64.rpm zlib-debuginfo-1.2.7-20.el7_9.i686.rpm zlib-debuginfo-1.2.7-20.el7_9.x86_64.rpm zlib-devel-1.2.7-20.el7_9.i686.rpm zlib-devel-1.2.7-20.el7_9.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: minizip-1.2.7-20.el7_9.ppc.rpm minizip-1.2.7-20.el7_9.ppc64.rpm minizip-devel-1.2.7-20.el7_9.ppc.rpm minizip-devel-1.2.7-20.el7_9.ppc64.rpm zlib-debuginfo-1.2.7-20.el7_9.ppc.rpm zlib-debuginfo-1.2.7-20.el7_9.ppc64.rpm zlib-static-1.2.7-20.el7_9.ppc.rpm zlib-static-1.2.7-20.el7_9.ppc64.rpm ppc64le: minizip-1.2.7-20.el7_9.ppc64le.rpm minizip-devel-1.2.7-20.el7_9.ppc64le.rpm zlib-debuginfo-1.2.7-20.el7_9.ppc64le.rpm zlib-static-1.2.7-20.el7_9.ppc64le.rpm s390x: minizip-1.2.7-20.el7_9.s390.rpm minizip-1.2.7-20.el7_9.s390x.rpm minizip-devel-1.2.7-20.el7_9.s390.rpm minizip-devel-1.2.7-20.el7_9.s390x.rpm zlib-debuginfo-1.2.7-20.el7_9.s390.rpm zlib-debuginfo-1.2.7-20.el7_9.s390x.rpm zlib-static-1.2.7-20.el7_9.s390.rpm zlib-static-1.2.7-20.el7_9.s390x.rpm x86_64: minizip-1.2.7-20.el7_9.i686.rpm minizip-1.2.7-20.el7_9.x86_64.rpm minizip-devel-1.2.7-20.el7_9.i686.rpm minizip-devel-1.2.7-20.el7_9.x86_64.rpm zlib-debuginfo-1.2.7-20.el7_9.i686.rpm zlib-debuginfo-1.2.7-20.el7_9.x86_64.rpm zlib-static-1.2.7-20.el7_9.i686.rpm zlib-static-1.2.7-20.el7_9.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: zlib-1.2.7-20.el7_9.src.rpm x86_64: zlib-1.2.7-20.el7_9.i686.rpm zlib-1.2.7-20.el7_9.x86_64.rpm zlib-debuginfo-1.2.7-20.el7_9.i686.rpm zlib-debuginfo-1.2.7-20.el7_9.x86_64.rpm zlib-devel-1.2.7-20.el7_9.i686.rpm zlib-devel-1.2.7-20.el7_9.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: minizip-1.2.7-20.el7_9.i686.rpm minizip-1.2.7-20.el7_9.x86_64.rpm minizip-devel-1.2.7-20.el7_9.i686.rpm minizip-devel-1.2.7-20.el7_9.x86_64.rpm zlib-debuginfo-1.2.7-20.el7_9.i686.rpm zlib-debuginfo-1.2.7-20.el7_9.x86_64.rpm zlib-static-1.2.7-20.el7_9.i686.rpm zlib-static-1.2.7-20.el7_9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-25032 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYnw1+9zjgjWX9erEAQhePQ//UtM5hhHSzE0ZKC4Z9/u34cRNcqIc5nmT opYgZo/hPWp5kkh0R9/tAMWAEa7olBzfzsxulOkm2I65R6k/+fLKaXeQOcwMAkSH gyKBU2TG3+ziT1BrsXBDWAse9mqU+zX7t9rDUZ8u9g30qr/9xrDtrVb0b4Sypslf K5CEMHoskqCnHdl2j+vPOyOCwq8KxLMPBAYtY/X51JwLtT8thvmCQrPWANvWjoSq nDhdVsWpBtPNnsgBqg8Jv+9YhEHJTaa3wVPVorzgP2Bo4W8gmiiukSK9Sv3zcCTu lJnSolqBBU7NmGdQooPrUlUoqJUKXfFXgu+mjybTym8Fdoe0lnxLFSvoEeAr9Swo XlFeBrOR8F5SO16tYKCAtyhafmJn+8MisTPN0NmUD7VLAJ0FzhEk48dlLl5+EoAy AlxiuqgKh+O1zFRN80RSvYkPjWKU6KyK8QJaSKdroGcMjNkjhZ3cM6bpVP6V75F3 CcLZWlP5d18qgfL/SRZo8NG23h+Fzz6FWNSQQZse27NS3BZsM4PVsHF5oaRN3Vij AFwDmIhHL7pE8pZaWck7qevt3i/hwzwYWV5VYYRgkYQIvveE0WUM/kqm+wqlU50Y bbpALcI5h9b83JgteVQG0hf9h5avYzgGrfbj+FOEVPPN86K37ILDvT45VcSjf1vO 4nrrtbUzAhY= =Pgu3 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxIuskNZI30y1K9AQi3YQ/+OA4YMO97PknShm06tmeBwzJwKcA2DZ72 jeV1H+uoTE7++Y75FAPkasrSNNex3vQZ3NCeJqDOFsKWslQOb3X7l2d8De6NRDdK 7FRe3+4XelyD5M7SUohfadk/jtU/ZwHMZNtX+XttDrNLiHk4C/DGR++iLV3HZFbH RORBK8SEDU8FK3kEQnp8xBWVJsPGiFrBQKqfK0Zk6PszPRTRYW88xxp8LdOAWmr6 A4zTKwbKm+31d8imosKz4Vtz56TmCpeUnugl24DQJJDDPCetHbxw5E1nE9dA4WWG KgrRfSYHt4Jr2RCYXE3pbAum+RtRnBPvpqIEALuZW1scXo56jXGk/Bb8uvCaleBV 5qCEG9rsW8iq+n1taxqwncje7NZfVFsgPavE8oulAJ2CrHCoM0+jpsW6y6Viajbs hHDy2vkKWQo0j+aFz2OgQWKCJge8DYCJWxVaz9hHiW/lIUmWKzCRqUSOwQ4jcWQP fthtG4LBXPcj6/aPUpZP3QYi6bxdY3LFTGdzhqbX6uZmL4KaFs7dl1u4FniqKVXg ukiWB34v9gxJY6hbhepd4dPin/eOd9MPz8oFIo5bBh8Ril/AzHtXnq9zAvIR5SqR vhWPPBD3PMDkn70fjxwbF0YhiudvrIV4x/jWCoD+7ie6MDLbQtW+MXEwpNW+hzHL ytTe+ZjuyZk= =bpe0 -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2302 - [RedHat] kpatch-patch: CVSS (Max): 7.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2302 kpatch-patch security update 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kpatch-patch Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-0492 CVE-2021-4028 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:2211 Comment: CVSS (Max): 7.0 CVE-2022-0492 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kpatch-patch security update Advisory ID: RHSA-2022:2211-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:2211 Issue date: 2022-05-11 CVE Names: CVE-2021-4028 CVE-2022-0492 ===================================================================== 1. Summary: An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server E4S (v. 7.6) - ppc64le, x86_64 3. Description: This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Security Fix(es): * kernel: use-after-free in RDMA listen() (CVE-2021-4028) * kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2027201 - CVE-2021-4028 kernel: use-after-free in RDMA listen() 2051505 - CVE-2022-0492 kernel: cgroups v1 release_agent feature may allow privilege escalation 6. Package List: Red Hat Enterprise Linux Server E4S (v. 7.6): Source: kpatch-patch-3_10_0-957_72_1-1-7.el7.src.rpm kpatch-patch-3_10_0-957_76_1-1-7.el7.src.rpm kpatch-patch-3_10_0-957_78_2-1-6.el7.src.rpm kpatch-patch-3_10_0-957_80_1-1-5.el7.src.rpm kpatch-patch-3_10_0-957_84_1-1-4.el7.src.rpm kpatch-patch-3_10_0-957_86_1-1-3.el7.src.rpm kpatch-patch-3_10_0-957_88_1-1-2.el7.src.rpm kpatch-patch-3_10_0-957_92_1-1-1.el7.src.rpm ppc64le: kpatch-patch-3_10_0-957_72_1-1-7.el7.ppc64le.rpm kpatch-patch-3_10_0-957_72_1-debuginfo-1-7.el7.ppc64le.rpm kpatch-patch-3_10_0-957_76_1-1-7.el7.ppc64le.rpm kpatch-patch-3_10_0-957_76_1-debuginfo-1-7.el7.ppc64le.rpm kpatch-patch-3_10_0-957_78_2-1-6.el7.ppc64le.rpm kpatch-patch-3_10_0-957_78_2-debuginfo-1-6.el7.ppc64le.rpm kpatch-patch-3_10_0-957_80_1-1-5.el7.ppc64le.rpm kpatch-patch-3_10_0-957_80_1-debuginfo-1-5.el7.ppc64le.rpm kpatch-patch-3_10_0-957_84_1-1-4.el7.ppc64le.rpm kpatch-patch-3_10_0-957_84_1-debuginfo-1-4.el7.ppc64le.rpm kpatch-patch-3_10_0-957_86_1-1-3.el7.ppc64le.rpm kpatch-patch-3_10_0-957_86_1-debuginfo-1-3.el7.ppc64le.rpm kpatch-patch-3_10_0-957_88_1-1-2.el7.ppc64le.rpm kpatch-patch-3_10_0-957_88_1-debuginfo-1-2.el7.ppc64le.rpm kpatch-patch-3_10_0-957_92_1-1-1.el7.ppc64le.rpm kpatch-patch-3_10_0-957_92_1-debuginfo-1-1.el7.ppc64le.rpm x86_64: kpatch-patch-3_10_0-957_72_1-1-7.el7.x86_64.rpm kpatch-patch-3_10_0-957_72_1-debuginfo-1-7.el7.x86_64.rpm kpatch-patch-3_10_0-957_76_1-1-7.el7.x86_64.rpm kpatch-patch-3_10_0-957_76_1-debuginfo-1-7.el7.x86_64.rpm kpatch-patch-3_10_0-957_78_2-1-6.el7.x86_64.rpm kpatch-patch-3_10_0-957_78_2-debuginfo-1-6.el7.x86_64.rpm kpatch-patch-3_10_0-957_80_1-1-5.el7.x86_64.rpm kpatch-patch-3_10_0-957_80_1-debuginfo-1-5.el7.x86_64.rpm kpatch-patch-3_10_0-957_84_1-1-4.el7.x86_64.rpm kpatch-patch-3_10_0-957_84_1-debuginfo-1-4.el7.x86_64.rpm kpatch-patch-3_10_0-957_86_1-1-3.el7.x86_64.rpm kpatch-patch-3_10_0-957_86_1-debuginfo-1-3.el7.x86_64.rpm kpatch-patch-3_10_0-957_88_1-1-2.el7.x86_64.rpm kpatch-patch-3_10_0-957_88_1-debuginfo-1-2.el7.x86_64.rpm kpatch-patch-3_10_0-957_92_1-1-1.el7.x86_64.rpm kpatch-patch-3_10_0-957_92_1-debuginfo-1-1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-4028 https://access.redhat.com/security/cve/CVE-2022-0492 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYnw2M9zjgjWX9erEAQjYjA//SE4rvZJRkzPhnauUj8Hick1RWJfl7asq 2uJKto5Ajn/49nTD17WavFc1X0fM8r4DJNE7cokrayKP9stZpSic9zOmC2E+mlXw A/R95gyXvqCCQpBq1zkzt67+W3uKQ2tZTCY0NCYRQTogqMVT786FRvrzQ+DpNE91 GfgW9dermO3Lw7inFl5YdQAiLT3ei8OYl9Yc6L5bY8Sx4O5jx8r5keCofQdxp32p hvK9MiZH6vmIbhm8Mn5JYmLqYq08NKaqOVV7RBadLDmaMDrPmBn+W/YrxAAS8JXO xBzvwdke6EviWVPaEO8OtVzZeiN3XhJ4E3TiKOKYA2prqJOBqXro66GsWR1VwkLv HCVvfQVAs1z7RHEtl3HCPLU7TcwWhp6ycLyPX4jDk2BVQy1KqF05vC84iKzy3DpZ dgl5gld1OgtDvR0I5NyaTC7zarC8h7thTMGoAEN9Aw6oydUY0zIDXRWYBQJy7CWM VqcrWMXglMMgPgo30QfstJRIdPkWHCnMuU/ADhaAxIMSph+buhKYjWEfNfp3+o0X 83PtbRl0w+YzEKgAeyhjROBDaGG/JsHu+R0B7hVVcTn7zDZedu6/BTk0Kl2ZZc3E DPDdMvJnPqrdHYfdPVxSKIlfucFXNK3HEW2As1k9QN6h0qid3mwRQC9eN74IoyAB srsIno6UdA0= =4D/s - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxIr8kNZI30y1K9AQib8A//WQ51+LZkxDJpCe7QwWi3aSucDmISGdF4 j6A8UcESqZ9q6VN0iiNOz0afRAGjfZCmE2GZUc3/ZMzWJ5G+sHtgxX5eIp4XuOKe S5dbk1Sf9hdD248MKmzQSagDk8Tyn49I1triNcu5jHaACfeXWrzEXmPF2AvAtN5u pcaV8j74TB90CRnjdDA8VjQPkR39IKC20NoE9qrHs/NfrSFBA1xep2WKdVxmUmu3 VIvDYafTqIkuW1eDOi9b+uE5f7QbQf5sdn+pXPQUroxMHusHVkAVaSQLjgwxlaY4 3lq8PrPOItVpucSRY+rfNUroSltYC0NOi8lCdvcrr0z3mJdAzxbp+jvyNdEUnBya w/qpRT88A3p0DDVFzzkBzrEF7wOgok8PK822D9AOM4vjJzi0QZkoMa5qxtZmNfVx H1sxFFxZgLTLg6vDDAITCK3R1651Xg6RUCPrqhwW/XMR3/KyqkkPHYcc/tX/io98 ungzVtu2AgQTm9PvxhUX5ehnNhN6nulU2/953133uAp0tp5E1R91SQW38aOhSTtD vIPLW5+DV23DLjk4iXncMIAuW6BQJX477UkGdXXvqHiF1FqmWpfz7czKQkaVi+Hm XQwu9nt98+Ibb91BSKdFkH7SU8zdvxe5l+rM10v7bA+MkqHbGsIn6FNVx9giT3sS OQS7g4ijm18= =TYFd -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2301 - [RedHat] redhat-ds:11: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2301 redhat-ds:11 security and bug fix update 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: redhat-ds:11 Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-0918 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:2210 Comment: CVSS (Max): 7.5 CVE-2022-0918 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: redhat-ds:11 security and bug fix update Advisory ID: RHSA-2022:2210-01 Product: Red Hat Directory Server Advisory URL: https://access.redhat.com/errata/RHSA-2022:2210 Issue date: 2022-05-11 CVE Names: CVE-2022-0918 ===================================================================== 1. Summary: Red Hat Directory Server 11.5 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Directory Server 11.5 for RHEL 8 - noarch, x86_64 3. Description: Red Hat Directory Server is an LDAPv3-compliant directory server. The suite of packages includes the Lightweight Directory Access Protocol (LDAP) server, as well as command-line utilities and Web UI packages for server administration. Security Fix(es): * 389-ds-base: sending crafted message could result in DoS (CVE-2022-0918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1751006 - Server Configuration Settings does not check newly updated non existing paths 2046341 - dsconf dump-changelog issues. 2055815 - CVE-2022-0918 389-ds-base: sending crafted message could result in DoS 6. Package List: Red Hat Directory Server 11.5 for RHEL 8: Source: 389-ds-base-1.4.3.29-3.module+el8dsrv+14615+a86efbbf.src.rpm noarch: cockpit-389-ds-1.4.3.29-3.module+el8dsrv+14615+a86efbbf.noarch.rpm python3-lib389-1.4.3.29-3.module+el8dsrv+14615+a86efbbf.noarch.rpm x86_64: 389-ds-base-1.4.3.29-3.module+el8dsrv+14615+a86efbbf.x86_64.rpm 389-ds-base-debuginfo-1.4.3.29-3.module+el8dsrv+14615+a86efbbf.x86_64.rpm 389-ds-base-debugsource-1.4.3.29-3.module+el8dsrv+14615+a86efbbf.x86_64.rpm 389-ds-base-devel-1.4.3.29-3.module+el8dsrv+14615+a86efbbf.x86_64.rpm 389-ds-base-legacy-tools-1.4.3.29-3.module+el8dsrv+14615+a86efbbf.x86_64.rpm 389-ds-base-legacy-tools-debuginfo-1.4.3.29-3.module+el8dsrv+14615+a86efbbf.x86_64.rpm 389-ds-base-libs-1.4.3.29-3.module+el8dsrv+14615+a86efbbf.x86_64.rpm 389-ds-base-libs-debuginfo-1.4.3.29-3.module+el8dsrv+14615+a86efbbf.x86_64.rpm 389-ds-base-snmp-1.4.3.29-3.module+el8dsrv+14615+a86efbbf.x86_64.rpm 389-ds-base-snmp-debuginfo-1.4.3.29-3.module+el8dsrv+14615+a86efbbf.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-0918 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_directory_server/11/html/release_notes/index 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYnw15dzjgjWX9erEAQg/UxAAgUMfU2UdRnUcuIihxR29O51H62uw1qoK KOwzSqQ4iwqZaje5iIa+q2xPUKbwufK3T8roUVY/pfAH2V6KQ4coBiIGcbaobiWh JS+70vs3Dm5tu1LEjNJYcAz69ArKlZwY/wzw10Fz8Z0SEM/guBbjxGTu/nRFEVwB VPH4BqkSiZpceMsCc5C7kjTd1qoYBlneM2NL8hknmRvU8zdAqhDUfToxUI+dgRvP wvadjHA6YadWstl47yzl/aoIGHObdUtuqBnb4lSaYGGo3joQ425F2Ctqdl6meZfj UW7yoytWw0MgnnzVfNdr/INYtYGVyXtygtKUyFpTGTd6l4Y/ETCOFno0e1NV54Oh xsjEQfJZyfDgeGz1oOFhkFY1ETclkkI4PpCqS1cqqOJj7x8kJzLoqspWgF/Nr7xm jAepVhBtuh0Oc5ZncjpXQjXfRqBnAKyN8oCWJdCIwMQDBPg3rcuYd9Q8OssNdLx7 YoH+AsWvoybNoEelDuZ0xNEWa4BO090ktRR7JqTk6bgrNrEWuM1W/od/LOH68RDt HPC+IUk/1+arasDepMDDO3W62EfzeTZ8zSwjBOYD3ZDBnknIW0zExZco5AnH4tik pK/nl9zxOWJix00CmH8UAfppzARA3q4cExQOOVWFESOO3aF+fTex8YXNpMV5H4Pr CmT1Tj45D60= =SiFx - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxIpckNZI30y1K9AQgxXxAAiUJ+AEJrD4IOmWDw0ZcDI/OOwRMZLmPa pr4Ikzjvx3FSl8UMQ3WKzjcRZZfV9s8bbwBUZehvOsyCVR+vuVxgx7L5YV8W/Acm z4eQR/REAoLZp8gzZ1LYpiu9QguPLP7VFp4jQewUEfSON/YG09TkuM39VI44Anky V7HLmHgCQGHwmIMEqbLr/GjA1pt55p15skk49qzNlMGLmQ5WDk2UDBjG2FPBBeOC ZI7KwZLLBDwzN0TUYesI6X6vUU70kHsRwD4gIoySKEy13cWCKBKuz5lJmfm3mDgQ H1PtO99qHyO089JlFoTGqgndemWHMye40OG86fJozLTUKrmSxrnrmryPT/orBI9M 9ZbHlmBtEN0IrqjrBS3g1II1kTLyNaT9GhpZ6AUglaQ7NnSHh8FNqa51mpSp1zEk wnN7SQQoxyXbc6UJLaokWzTHSuyTFZcIIVfMWaKB5luZ4kq8robDbOXQmHilw82j pH7tkPORnINVKJjN4gKwdH4EJBHG3gJdVLEPBydaxPdGwQtBl5PKErazTGe5poxX WJeh2d/fg4RmwX0UbwpdaRGs6AxuNPgsASKYjk4e6jucHUEwPfGQ7TLm2TRDWyLS ST0hX5wgAIivzSZL/te4kSP/Ud8Zy4pBhKllCHIBmmZ6/b8oOfDNID60oWMXY/Ny APFWzJu6po8= =Bf6A -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2300 - [RedHat] .NET Core 3.1: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2300 .NET Core 3.1 security, bug fix, and enhancement update 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: .NET Core 3.1 Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-29145 CVE-2022-29117 CVE-2022-23267 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:2202 Comment: CVSS (Max): 7.5 CVE-2022-29145 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: .NET Core 3.1 security, bug fix, and enhancement update Advisory ID: RHSA-2022:2202-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:2202 Issue date: 2022-05-11 CVE Names: CVE-2022-23267 CVE-2022-29117 CVE-2022-29145 ===================================================================== 1. Summary: An update for .NET Core 3.1 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder (v. 8) - x86_64 Red Hat Enterprise Linux AppStream (v. 8) - x86_64 3. Description: .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 3.1.419 and .NET Core Runtime 3.1.25. Security Fix(es): * dotnet: excess memory allocation via HttpClient causes DoS (CVE-2022-23267) * dotnet: malicious content causes high CPU and memory usage (CVE-2022-29117) * dotnet: parsing HTML causes Denial of Service (CVE-2022-29145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2083647 - CVE-2022-29117 dotnet: malicious content causes high CPU and memory usage 2083649 - CVE-2022-29145 dotnet: parsing HTML causes Denial of Service 2083650 - CVE-2022-23267 dotnet: excess memory allocation via HttpClient causes DoS 6. Package List: Red Hat Enterprise Linux AppStream (v. 8): Source: dotnet3.1-3.1.419-1.el8_6.src.rpm x86_64: aspnetcore-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm aspnetcore-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm dotnet-apphost-pack-3.1-3.1.25-1.el8_6.x86_64.rpm dotnet-apphost-pack-3.1-debuginfo-3.1.25-1.el8_6.x86_64.rpm dotnet-hostfxr-3.1-3.1.25-1.el8_6.x86_64.rpm dotnet-hostfxr-3.1-debuginfo-3.1.25-1.el8_6.x86_64.rpm dotnet-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm dotnet-runtime-3.1-debuginfo-3.1.25-1.el8_6.x86_64.rpm dotnet-sdk-3.1-3.1.419-1.el8_6.x86_64.rpm dotnet-sdk-3.1-debuginfo-3.1.419-1.el8_6.x86_64.rpm dotnet-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm dotnet-templates-3.1-3.1.419-1.el8_6.x86_64.rpm dotnet3.1-debuginfo-3.1.419-1.el8_6.x86_64.rpm dotnet3.1-debugsource-3.1.419-1.el8_6.x86_64.rpm Red Hat CodeReady Linux Builder (v. 8): x86_64: dotnet-apphost-pack-3.1-debuginfo-3.1.25-1.el8_6.x86_64.rpm dotnet-hostfxr-3.1-debuginfo-3.1.25-1.el8_6.x86_64.rpm dotnet-runtime-3.1-debuginfo-3.1.25-1.el8_6.x86_64.rpm dotnet-sdk-3.1-debuginfo-3.1.419-1.el8_6.x86_64.rpm dotnet-sdk-3.1-source-built-artifacts-3.1.419-1.el8_6.x86_64.rpm dotnet3.1-debuginfo-3.1.419-1.el8_6.x86_64.rpm dotnet3.1-debugsource-3.1.419-1.el8_6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-23267 https://access.redhat.com/security/cve/CVE-2022-29117 https://access.redhat.com/security/cve/CVE-2022-29145 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYnw2TNzjgjWX9erEAQiM9A/+JBPm6xW7iFYN+VkWRX4UhDBN9aW8nfqT 9JxtUdAgOVNAhxeZz+UYevvYaN7Ee93iEnuy1qkLnyq1BEpIwJhsB5WVFYCKMR/5 Ev1bL+L+UaJJho9yqk9WPsvC2NT56ix0qdVg7ijmfK200/ZDTD316F73nzCAlB42 fKs0k3iAG7ph8kSp2Z1lC42P3xmEyOCkYFPdHcz5ZgHyTw8gga0Y0bcc0IfOqodC ceETRU47uvtPVJkbKYFc8rF2hmpYCLDOB07LJSxGCZML2/Cds9GRnV3EcrLv/Pi5 CKyL/lD5ScqsEV+/sdyL44aJcV4JRCBKQ/PzdJJHhMccKJBK+eTk7MMme3ugLsBj +qCsI918V/TY1JA3f0IclQPpNlFvsAojOxhvn/4MFcf5X9dH5u+HedmYLzfW7H9x tOMGkOg8+nZWjQT5fnT+pgOGMndBVsi4agBQy7bGnnVEMDfSj6FwI9yt65QI0BAn jrZpU2WgDg9IhpI7lNlgcpgYn5Rw1vc820vNwMobHAUYM6GKw3RQgFfSINysz5/6 ca2otjnaOdfdp3dU3OYg1GvnLVlRvE3Y71191gtAZKU2vmr8lpeYx31iRp3u+lvE xo8ROnOq7MKa6Rv+YxLX8hSPdTd5hje5qWcsYyLliNw7qweDtCixPI4S15thpjMS UwquNOdkn08= =OLmk - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxIj8kNZI30y1K9AQgcxg/9GmGXQOvReXo9Qa65HMVROf3qLI5TamFY 534Du3DkiBKHcSJIbZnHE0JKNxdEAbmaJhRJXyQEAX4RXbSvFO5zUShWKEvAfbdV C+UxDd7GjXcU8HHS+GbbRVGdBgsR2GK/3WK9MyzKrS3G6dm0QWqqkh4T89EBkur4 pS8/KB64K4nsZazXOckqwsH3IuRI8qXGrqAM8GPya5jx8dyjewyB8fJMUyOwPdK5 nQ4P96v4nRsJbbyov3rNp8aKBCr/Y6ZbGRnbFmXv6m67S6Vy9lOrraQ/ecRI9T1N KtGcF0xazrUmv+N5VaKHBcJnQ7SnYg3qMSQYrz55qKgmawnhuj3GZDql5DR+2VXM n6YabukXPl/P8KuZTlYCaNv3eZMhG9cRF+EGURhLhOy3NR0GiWUJTqbIHx8KBgK9 UuieuFpJ2fJaBQxCRfKorZy7mS3xZ93jueL9Gq0Ae9qbme5QmNTYdZXEw52CQ+Kk sORIuTuQM/XL1ASkvTy9MU4a2q2eg/OLlrCYysjDctPRWWlrz7tvYLEU4JP2ok8C Wj2JmM0AAJ5To1KNdtsmgB0qWgK+gRkrM7OtQ1I7rton9N/kzW6IfOUeAPV91rh1 rWj9n9/khlcjeArztFT/8ntvl1HQ/w6T8v05T/iMFN5AjOg56Ll2YEFOP7gM0gfH MMSHrMNPXOM= =/J2v -----END PGP SIGNATURE-----
2022. május 12.

ESB-2022.2299 - [RedHat] rsync: CVSS (Max): 8.2

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2299 rsync security update 12 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: rsync Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2018-25032 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:2201 Comment: CVSS (Max): 8.2 CVE-2018-25032 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: rsync security update Advisory ID: RHSA-2022:2201-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:2201 Issue date: 2022-05-11 CVE Names: CVE-2018-25032 ===================================================================== 1. Summary: An update for rsync is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2067945 - CVE-2018-25032 zlib: A flaw found in zlib when compressing (not decompressing) certain inputs 6. Package List: Red Hat Enterprise Linux BaseOS (v. 8): Source: rsync-3.1.3-14.el8_6.2.src.rpm aarch64: rsync-3.1.3-14.el8_6.2.aarch64.rpm rsync-debuginfo-3.1.3-14.el8_6.2.aarch64.rpm rsync-debugsource-3.1.3-14.el8_6.2.aarch64.rpm noarch: rsync-daemon-3.1.3-14.el8_6.2.noarch.rpm ppc64le: rsync-3.1.3-14.el8_6.2.ppc64le.rpm rsync-debuginfo-3.1.3-14.el8_6.2.ppc64le.rpm rsync-debugsource-3.1.3-14.el8_6.2.ppc64le.rpm s390x: rsync-3.1.3-14.el8_6.2.s390x.rpm rsync-debuginfo-3.1.3-14.el8_6.2.s390x.rpm rsync-debugsource-3.1.3-14.el8_6.2.s390x.rpm x86_64: rsync-3.1.3-14.el8_6.2.x86_64.rpm rsync-debuginfo-3.1.3-14.el8_6.2.x86_64.rpm rsync-debugsource-3.1.3-14.el8_6.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-25032 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYnw2ANzjgjWX9erEAQiUew//d2IkXt3PJxVJqwsd+jOQJ8kh9Z691F8h SMEZ8dhA0J1EX7GP0gnrdySCcZ+Oxa6uMzE8yWns1SPuURzEUQUp9c/2qvHu6fQv LbkZixqOV7z0X00hhypKZgLFNAmDLhT9WsauXo8UUKVdwVsZL1QHj8pgdRHGHgn4 rADof1x7YAH/yjgZvmXHAbk2VrGjbvX43xNgIeCVb/GyJQs3AgyheUGkSaw7pHIF 4DyaHm6UWQpBJlFunRNKlGWBGE29YtCikwsRN29vzSx1FayP/4z8N2Bud10siGdR +5pt5gCI8DTclKN25zDNUH0iJFlAqlp5DGI3G938CfMGhltp7NbocOncWLOqxVgz eTV53muACYL8Xw7wjxhZFcHpHYmQFkbhy58Cko9mS8kDqCsl1SAoLJDx+a7NBAZk AVzmJUiGsClqhiNpC+4CfXtZ5yv5o5yWVykgNvbYX8NWLK1pMNcb8Gdp0NZ3wLhU RRoUBMUhVmquOlRzqY8u0GAo4Al9yPXwr5q5o011+/qW55a0fL6C+BxtHh/ON76N pIKkXaYqM1Z6wgHXRHkkuXJ9vsoN9GEKEHYZo1V7xCnWr0dzb39dZxmc1zuzN3+s YCQLSNOOYvF+u8HWnvix0Ljc1reoRSn+hYc1+23RPahI7YZPP2U81NjMH/s9N8dB j889CttfYw8= =ugku - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYnxIgMkNZI30y1K9AQjh+A/9Hct0VDxbX4KSPclH4HbGQvXtucXD3yyz HUl3cU4N6o/kvXlXLcIg4X1XcW2qVx3mLcQLwS+okfcZjwoQKmaaR4VM6MjKdrrQ S0NcDGV2tBbG9+csvJagltpoPJcvvDX931AcitHTBwMRlwOz7PZlXnJXwln3UD+K t5q2+UX6eM0zgCjGwedKiklbFJ1ztJRiiebYW8C0bRKVaRaGzbDrnjJ7kWesGn+v SxrkgO3xKqHTgA2LAJR7X/iMMHJ0+ylBuTwRDweeLhYHSUSZ8FU87OGFp3nGVSep EKaasfaVl5mFFF/oICS9V3WVNneEobIklWD7knaOKrl3xpjJzu0SZCJ/vdoOrANx z62p3eVV8+t4NqhkLU9HxLNquAHsqky7c6gklFRTLesbeJfzyEqndOFvEGM+Y5XZ pt6ZkQ1b5w/44ytkvPChebPJPyYVqwltNr3T682AVvHfjofpFhoQRh5uIWqdQUus Q92LDsNA6MFc5QdoPhtHK1eMCWizISFYTQsPfyLZVVMNuz8Q83DLo+3FQyOfTBDs 1Zn6b8JtXwpJyt2YxRudftsNzmYhIMuRG59OQHeNbhGVsYkFgDL2GG7EqJMajzBW DMiltNPgPgcc3bSdoOUnuCYjlPddhlCmVqRLHPVlVOq9rWYp2Oahxc7aCtFaHB+a 3u1pW+TfuUA= =y+K/ -----END PGP SIGNATURE-----