Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

ESB-2023.5568 - [Ubuntu] libwebp: CVSS (Max): 8.8

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5568
                     USN-6369-2: libwebp vulnerability
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libwebp
Publisher:         Ubuntu
Operating System:  Ubuntu
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-4863  

Original Bulletin: 
   https://ubuntu.com/security/notices/USN-6369-2

Comment: CVSS (Max):  8.8 CVE-2023-4863 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
         CVSS Source: NIST
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
         
         The following are listed in the CISA Known Exploited Vulnerabilities (KEV) Catalog:
         CISA KEV CVE(s): CVE-2023-4863
         CISA KEV URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-6369-2: libwebp vulnerability

28 September 2023

libwebp could be made to crash or run programs if it opened a specially crafted
file.

Releases

  o Ubuntu 18.04 ESM

Packages

  o libwebp - Lossy compression of digital photographic images.

Details

USN-6369-1 fixed a vulnerability in libwebp. This update provides the
corresponding update for Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that libwebp incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a
specially crafted image file, a remote attacker could use this issue to
cause libwebp to crash, resulting in a denial of service, or possibly
execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 18.04

  o libwebp6 - 0.6.1-2ubuntu0.18.04.2+esm1
    Available with Ubuntu Pro
  o libwebpdemux2 - 0.6.1-2ubuntu0.18.04.2+esm1
    Available with Ubuntu Pro
  o libwebpmux3 - 0.6.1-2ubuntu0.18.04.2+esm1
    Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References

  o CVE-2023-4863

Related notices

  o USN-6367-1 : firefox-locale-is, firefox-locale-fr, firefox-locale-br,
    firefox-locale-ar, firefox-locale-az, firefox-locale-ja, firefox-locale-sw,
    firefox-locale-uk, firefox-locale-fa, firefox-dev, firefox-locale-hr,
    firefox-locale-be, firefox-locale-sl, firefox, firefox-locale-xh,
    firefox-locale-da, firefox-locale-sr, firefox-locale-cy,
    firefox-locale-zh-hans, firefox-locale-ca, firefox-locale-eu,
    firefox-locale-or, firefox-locale-ml, firefox-locale-mn, firefox-locale-ga,
    firefox-locale-kab, firefox-locale-mr, firefox-locale-lg,
    firefox-locale-szl, firefox-locale-de, firefox-locale-eo,
    firefox-locale-kk, firefox-locale-tr, firefox-locale-si, firefox-locale-ru,
    firefox-locale-gd, firefox-locale-hy, firefox-locale-gu,
    firefox-locale-ast, firefox-locale-kn, firefox-locale-bn,
    firefox-locale-my, firefox-mozsymbols, firefox-locale-nb,
    firefox-locale-pa, firefox-locale-lv, firefox-locale-ne, firefox-locale-sq,
    firefox-locale-hsb, firefox-locale-hu, firefox-locale-nl,
    firefox-locale-sk, firefox-geckodriver, firefox-locale-cak,
    firefox-locale-as, firefox-locale-csb, firefox-locale-ku,
    firefox-locale-bs, firefox-locale-bg, firefox-locale-lt, firefox-locale-oc,
    firefox-locale-ro, firefox-locale-th, firefox-locale-pt, firefox-locale-af,
    firefox-locale-nn, firefox-locale-he, firefox-locale-ur, firefox-locale-id,
    firefox-locale-pl, firefox-locale-el, firefox-locale-sv, firefox-locale-tg,
    firefox-locale-en, firefox-locale-gn, firefox-locale-ia, firefox-locale-ms,
    firefox-locale-cs, firefox-locale-vi, firefox-locale-mai,
    firefox-locale-ta, firefox-locale-ka, firefox-locale-fi, firefox-locale-fy,
    firefox-locale-mk, firefox-locale-uz, firefox-locale-zh-hant,
    firefox-locale-et, firefox-locale-an, firefox-locale-km, firefox-locale-it,
    firefox-locale-te, firefox-locale-ko, firefox-locale-es, firefox-locale-gl,
    firefox-locale-zu, firefox-locale-nso, firefox-locale-hi
  o USN-6368-1 : thunderbird-locale-dsb, thunderbird-locale-pt-pt,
    thunderbird-locale-si, thunderbird-locale-ca, thunderbird-locale-ko,
    thunderbird-locale-gd, xul-ext-calendar-timezones,
    thunderbird-locale-sv-se, thunderbird-locale-en-gb,
    thunderbird-gnome-support, thunderbird-locale-fy-nl,
    thunderbird-locale-pa-in, thunderbird-locale-pt, thunderbird-locale-fi,
    thunderbird-locale-ast, thunderbird-locale-ms, thunderbird-locale-sv,
    thunderbird-locale-zh-hant, thunderbird-locale-cs, thunderbird-locale-ka,
    thunderbird-locale-en, thunderbird-locale-el, thunderbird,
    thunderbird-locale-uz, thunderbird-locale-es-ar, thunderbird-locale-es-es,
    thunderbird-mozsymbols, thunderbird-locale-lt, thunderbird-locale-zh-hans,
    thunderbird-locale-ga-ie, thunderbird-locale-de, thunderbird-locale-rm,
    thunderbird-locale-br, thunderbird-locale-ta, thunderbird-locale-bn,
    thunderbird-locale-ja, thunderbird-locale-fa, thunderbird-locale-nb,
    thunderbird-locale-ru, thunderbird-locale-id, thunderbird-locale-fy,
    thunderbird-locale-hsb, thunderbird-locale-hu, thunderbird-locale-zh-cn,
    thunderbird-locale-da, thunderbird-locale-cak, thunderbird-locale-uk,
    thunderbird-locale-be, thunderbird-locale-nl, thunderbird-locale-th,
    thunderbird-locale-lv, thunderbird-locale-pt-br, thunderbird-dev,
    thunderbird-locale-es, thunderbird-locale-sq, thunderbird-locale-mk,
    thunderbird-locale-is, xul-ext-gdata-provider, thunderbird-locale-cy,
    thunderbird-locale-tr, thunderbird-locale-eu, thunderbird-locale-ga,
    thunderbird-locale-pl, thunderbird-locale-sl, thunderbird-locale-sk,
    thunderbird-locale-ta-lk, thunderbird-locale-bn-bd, thunderbird-locale-it,
    thunderbird-locale-ar, thunderbird-locale-kab, thunderbird-locale-af,
    thunderbird-locale-hy, thunderbird-locale-fr, thunderbird-locale-pa,
    thunderbird-locale-sr, thunderbird-locale-et, thunderbird-locale-hr,
    thunderbird-locale-kk, thunderbird-locale-nn-no, thunderbird-locale-nn,
    thunderbird-locale-bg, thunderbird-locale-he, thunderbird-locale-ro,
    thunderbird-locale-en-us, thunderbird-locale-vi, thunderbird-locale-gl,
    thunderbird-locale-zh-tw, thunderbird-locale-nb-no, xul-ext-lightning
  o USN-6369-1 : libwebp7, libwebp6, libwebp-dev, libwebpdemux2, webp, libwebp,
    libwebpmux3

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=1IsX
-----END PGP SIGNATURE-----

ESB-2023.5567 - [RedHat] Red Hat OpenShift Data Foundation: CVSS (Max): 8.1

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5567
   Red Hat OpenShift Data Foundation 4.13.3 security and bug fix update
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat OpenShift Data Foundation
Publisher:         Red Hat
Operating System:  Red Hat
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-34969 CVE-2023-30630 CVE-2023-26115
                   CVE-2023-24540 CVE-2023-3899 CVE-2023-2603
                   CVE-2023-2602  

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2023:5376

Comment: CVSS (Max):  8.1 CVE-2023-24540 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat OpenShift Data Foundation 4.13.3 security and bug fix update
Advisory ID:       RHSA-2023:5376-01
Product:           Red Hat OpenShift Data Foundation
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:5376
Issue date:        2023-09-27
CVE Names:         CVE-2023-2602 CVE-2023-2603 CVE-2023-3899 
                   CVE-2023-24540 CVE-2023-26115 CVE-2023-30630 
                   CVE-2023-34969 
=====================================================================

1. Summary:

Updated images that fix several bugs are now available for Red Hat
OpenShift Data Foundation 4.13.3 on Red Hat Enterprise Linux 8 from Red Hat
Container Registry.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Data Foundation is software-defined storage integrated
with and optimized for the Red Hat OpenShift Data Foundation. Red Hat
OpenShift Data Foundation is a highly scalable, production-grade persistent
storage for stateful applications running in the Red Hat OpenShift
Container Platform. In addition to persistent storage, Red Hat OpenShift
Data Foundation provisions a multi-cloud data management service with an
S3-compatible API.

Security Fix(es):

* golang: html/template: improper handling of JavaScript whitespace
(CVE-2023-24540)

* word-wrap: ReDoS (CVE-2023-26115)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* Previously, during the reclaimspace operation, I/O and performance was
impacted when the `rbd sparsify` command was executed on the RADOS block
device (RBD) persistent volume claim (PVC) while it was attached to a pod.
With this fix, the execution of the `rbd sparsify` command is skipped when
the RBD PVC is found to be attached to a pod during the operation. As a
result, any negative impact of running the reclaim space operation on a RBD
PVC attached to a pod is mitigated. (BZ#2225436)

* Previously, the container storage interface (CSI) CephFS and RADOS block
device (RBD) pods were using older `cephcsi` image after the upgrade as the
CSI CephFS and RBD holder pods were not getting updated. With this fix, the
daemonset object for CSI CephFS and RBD holder are upgraded and steps to
upgrade the corresponding pods are documented. As a result, after
upgrading, the CSI holder pods use the latest `cephcsi` image. (BZ#2222600)

All users of Red Hat OpenShift Data Foundation are advised to upgrade to
these updated images, which provide these bug fixes.

3. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2196027 - CVE-2023-24540 golang: html/template: improper handling of JavaScript whitespace
2216827 - CVE-2023-26115 word-wrap: ReDoS
2225436 - Failed to restart VMI in cnv - Failed to terminate process Device or resource busy
2227161 - Rook ceph exporter pod remains stuck in terminating state when node is offline
2232414 - [4.13 clone][RDR] [MDR] ramen operator pods in CrashLoopBackOff state due to client-go bug
2232555 - [RDR] token-exchange-agent pod in CrashLoopBackOff state
2233028 - Avoid pods entering into CrashLoopBackOff due to older k8s.io/client-go packages
2233071 - Avoid pods entering into CrashLoopBackOff due to older k8s.io/client-go packages
2233505 - [odf-console] The "Provider details"  on namespacestore page is not updated
2234658 - update k8s.io/client-go to v0.26.4 for ocp 4.14
2234948 - [4.13 backport] Update client-go library to avoid crash on OCP 4.14
2237862 - Include at ODF 4.13 container images the RHEL CVE fix on "subscription-manager"

5. References:

https://access.redhat.com/security/cve/CVE-2023-2602
https://access.redhat.com/security/cve/CVE-2023-2603
https://access.redhat.com/security/cve/CVE-2023-3899
https://access.redhat.com/security/cve/CVE-2023-24540
https://access.redhat.com/security/cve/CVE-2023-26115
https://access.redhat.com/security/cve/CVE-2023-30630
https://access.redhat.com/security/cve/CVE-2023-34969
https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=vML5
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/

iQIVAwUBZRUdJ8kNZI30y1K9AQi7pA/8DPU3zgpW/PnfiDexnSrixyyKqoY+A+7v
WhJM/8lbgg1YCpNzibdHux+D/2eXRC5LGzxLQfhxvLV7GRudVXnANneEbBx20N42
09eXgOBNwmfIXHLCKa+TCmqOpW9hGb5VWu2hPp+NIhsmZBg/34pnjnTjPhrRdcsz
UHT8OkBj3dHDISKlGOYi59Bc9v2RmsGBmpktWm5e5RE05UCx2MH2ctjkAF5sPFAG
j6YdaF7BtFR3MsfpMakxP9/mA6qQXCJCwMhgJjtFe+gykn5EqslCUbII+JzVNa9i
7FIXzHdTlhb9yEWgd0hb0M2pLw9S1eBmHol/faBkvBMvNEqQO8SbubQ9c93/ellf
c67lX1Qw7/Yfl7U/UuSAGzrQiCZC+IGeO3oheHgT0+lTT+nsFWOHQgWb/oI8pR5O
9SBkS2rn9wqSeS+n6GL5LpdFmFwiMsCsiUCv9FBZxA3krh1E21HSGROlKXkk+2M4
XhUZYLQugfadjl5vqDuKQ1C7vfmdldXKxKCpkgApXLZ6wvy/2hUN6U04BKRmatek
Wzp4hkEpiWFBgwe7La5eqjdVhIRxIrpbhg/f7Prv87mBzIywpnU3max3B+cFnpXd
jbyRZ3SmHujDhOT7WMb0U3/YGX/7GnZzkEqiLsXBt2eCLiQQMULzLjgSCDMCz8Mf
KogmnMaA4l8=
=TT1Q
-----END PGP SIGNATURE-----

ESB-2023.5566 - [RedHat] Network Observability 1.4.0 for OpenShift: CVSS (Max): 7.8

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5566
                 Network Observability 1.4.0 for OpenShift
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Network Observability 1.4.0 for OpenShift
Publisher:         Red Hat
Operating System:  Red Hat
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-29469 CVE-2023-28484 CVE-2023-28322
                   CVE-2023-28321 CVE-2023-26115 CVE-2023-2603
                   CVE-2023-2602 CVE-2022-25883 

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2023:5379

Comment: CVSS (Max):  7.8 CVE-2023-2603 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Network Observability 1.4.0 for OpenShift
Advisory ID:       RHSA-2023:5379-01
Product:           Network Observability
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:5379
Issue date:        2023-09-28
CVE Names:         CVE-2022-25883 CVE-2023-2602 CVE-2023-2603 
                   CVE-2023-26115 CVE-2023-28321 CVE-2023-28322 
                   CVE-2023-28484 CVE-2023-29469 
=====================================================================

1. Summary:

Network Observability is an OpenShift operator that deploys a monitoring
pipeline to collect and enrich network flows that are produced by the
Network Observability eBPF agent.

The operator provides dashboards, metrics, and keeps flows accessible in a
queryable log store, Grafana Loki. When a FlowCollector is deployed, new
dashboards are available in the Console.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Network Observability 1.4.0

Security Fix(es):

* word-wrap: Regular Expression Denial of Service (CVE-2023-26115)

* nodejs-semver: Regular expression denial of service (CVE-2022-25883)

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2216475 - CVE-2022-25883 nodejs-semver: Regular expression denial of service
2216827 - CVE-2023-26115 word-wrap: ReDoS

5. JIRA issues fixed (https://issues.redhat.com/):

NETOBSERV-1009 - Export Netflows without Loki
NETOBSERV-1034 - Remove 1.0.x channel
NETOBSERV-1107 - Improve ebpf agent memory usage
NETOBSERV-1131 - Metrics do not ignore duplicates
NETOBSERV-1137 - UI Enhancements 1.4
NETOBSERV-1182 - add cluster name to flp configuration
NETOBSERV-1196 - Extend platform coverage for Network Observability
NETOBSERV-1224 - Flowcollector does not report status != Ready in OCP Console
NETOBSERV-1242 - Console plugin build infos
NETOBSERV-1283 - Not able to monitor Multus/SRIOV traffic on Network Observability Operator
NETOBSERV-139 - Flow dashboards enhancements (flow-based metrics)
NETOBSERV-962 - Add IPFIX exporter
NETOBSERV-975 - Flows dropped due to Loki stream limit during large traffic spikes

6. References:

https://access.redhat.com/security/cve/CVE-2022-25883
https://access.redhat.com/security/cve/CVE-2023-2602
https://access.redhat.com/security/cve/CVE-2023-2603
https://access.redhat.com/security/cve/CVE-2023-26115
https://access.redhat.com/security/cve/CVE-2023-28321
https://access.redhat.com/security/cve/CVE-2023-28322
https://access.redhat.com/security/cve/CVE-2023-28484
https://access.redhat.com/security/cve/CVE-2023-29469
https://access.redhat.com/security/updates/classification/#important

7. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=mX3+
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/

iQIVAwUBZRUdEskNZI30y1K9AQjonxAAnEl2MFXZcjsgdXviUBtqFzgYzuQHTo1l
fFP93Dqia4pBBL82zB5FTibTC6VyUeJ6tqNFp8YbAW7lWa2cgcseatJgzphHE1xN
45aETZ9SRNv7lz3wJL4NEzsWs1ytphSNYk6ZafJQTVbzl7t3Wc2HBQtyy8if1tC8
wsq9jKMrqXJpaFkV8xn5j/cCFiKk28l1eAP8DZOAzwAzzXyIRf/QyvDz206MCd29
Xvp5P4LihVXwLZ2IdlHJfwzP7NVeVRI3W8MYoA6WVeh9BpCnjxV6Ck7siEoqJoM1
iJr9+oYw1OcwCkIYEwU816MPLdGrm1t+9eb6QAzrlcTafEfLLdDPAsLX5D3dI80H
L7OfeYh6EHFio+MVOzOFuwDko8trZHbMawu0ogwksgX9FosCquqCfuz/6nsKb7G5
tb/Cpv8oROXmV3Jb9tZVQHaiH/u/jdgrvUvDPGhGhk6+0g5CCCjZTiDJEtE2Q/nn
8MReBjC8P7GFDxzZU4oQSFVrwvTzaDOFAweWkw3IF5YkvnvfhgeMltv/LckoR4m2
iMQ+CW35C00Q+TIYG7yRD6lH6jAuV/qteRroBcuNIha6HACGh98BmCU/hhQnv+wI
VK2EkQYHBQXULRD8WhcyzfvoGgxBWwtgONgZ2jUbu/eDrp2SlCHusFgF4sFxQgGa
tfGFk5/aLmk=
=TVZU
-----END PGP SIGNATURE-----

ESB-2023.5565 - [SUSE] Linux Kernel (Live Patch 31 for SLE 15 SP2): CVSS (Max): 7.8

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5565
    Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP2)
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Linux Kernel (Live Patch 31 for SLE 15 SP2)
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-4273 CVE-2023-3812 CVE-2023-3776
                   CVE-2023-3609 CVE-2023-1829 

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2023/suse-su-20233788-1

Comment: CVSS (Max):  7.8 CVE-2023-4273 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP2)

Announcement ID:  SUSE-SU-2023:3788-1
     Rating:      important
                    o #1210619
                    o #1213587
   References:      o #1213706
                    o #1214123
                    o #1215119

                    o CVE-2023-1829
                    o CVE-2023-3609
Cross-References:   o CVE-2023-3776
                    o CVE-2023-3812
                    o CVE-2023-4273

                    o CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-3609 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-3609 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-3776 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
  CVSS scores:      o CVE-2023-3776 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-3812 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-3812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-4273 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-4273 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/
                      S:U/C:H/I:H/A:N

                    o SUSE Linux Enterprise High Performance Computing 15 SP2
    Affected        o SUSE Linux Enterprise Live Patching 15-SP2
    Products:       o SUSE Linux Enterprise Server 15 SP2
                    o SUSE Linux Enterprise Server for SAP Applications 15 SP2

An update that solves five vulnerabilities can now be installed.

Description:

This update for the Linux Kernel 5.3.18-150200_24_134 fixes several issues.

The following security issues were fixed:

  o CVE-2023-3776: Fixed improper refcount update in cls_fw leads to
    use-after-free (bsc#1215119).
  o CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
    filter (tcindex) (bsc#1210619).
  o CVE-2023-4273: Fixed a flaw in the exFAT driver of the Linux kernel that
    alloawed a local privileged attacker to overflow the kernel stack (bsc#
    1214123).
  o CVE-2023-3609: Fixed reference counter leak leading to overflow in net/
    sched (bsc#1213587).
  o CVE-2023-3812: Fixed an out-of-bounds memory access flaw in the TUN/TAP
    device driver functionality that could allow a local user to crash or
    potentially escalate their privileges on the system (bsc#1213706).

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Live Patching 15-SP2
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2023-3788=1

Package List:

  o SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64)
       kernel-livepatch-5_3_18-150200_24_134-default-debuginfo-12-150200.2.2
       kernel-livepatch-5_3_18-150200_24_134-default-12-150200.2.2
       kernel-livepatch-SLE15-SP2_Update_31-debugsource-12-150200.2.2

References:

  o https://www.suse.com/security/cve/CVE-2023-1829.html
  o https://www.suse.com/security/cve/CVE-2023-3609.html
  o https://www.suse.com/security/cve/CVE-2023-3776.html
  o https://www.suse.com/security/cve/CVE-2023-3812.html
  o https://www.suse.com/security/cve/CVE-2023-4273.html
  o https://bugzilla.suse.com/show_bug.cgiid=1210619
  o https://bugzilla.suse.com/show_bug.cgiid=1213587
  o https://bugzilla.suse.com/show_bug.cgiid=1213706
  o https://bugzilla.suse.com/show_bug.cgiid=1214123
  o https://bugzilla.suse.com/show_bug.cgiid=1215119

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=q5Zh
-----END PGP SIGNATURE-----

ESB-2023.5564 - [SUSE] postfix: CVSS (Max): 5.5

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5564
                        Security update for postfix
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           postfix
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-32182  

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2023/suse-su-20233791-1

Comment: CVSS (Max):  5.5 CVE-2023-32182 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

- --------------------------BEGIN INCLUDED TEXT--------------------

Security update for postfix

Announcement ID:  SUSE-SU-2023:3791-1
     Rating:      moderate
                    o #1211196
   References:      o #1215372

Cross-References:   o CVE-2023-32182

                    o CVE-2023-32182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:H/A:N
  CVSS scores:      o CVE-2023-32182 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/
                      S:U/C:L/I:L/A:L

    Affected        o openSUSE Leap 15.4
    Products:

An update that solves one vulnerability and has one security fix can now be
installed.

Description:

This update for postfix fixes the following issues:

Security fixes:

  o CVE-2023-32182: Fixed config_postfix SUSE specific script using potentially
    bad /tmp file (bsc#1211196).

Other fixes:

  o postfix: config.postfix causes too tight permission on main.cf (bsc#
    1215372).

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o openSUSE Leap 15.4
    zypper in -t patch openSUSE-SLE-15.4-2023-3791=1

Package List:

  o openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
       postfix-lmdb-debuginfo-3.4.7-150200.3.12.2
       postfix-lmdb-3.4.7-150200.3.12.2

References:

  o https://www.suse.com/security/cve/CVE-2023-32182.html
  o https://bugzilla.suse.com/show_bug.cgiid=1211196
  o https://bugzilla.suse.com/show_bug.cgiid=1215372

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/

iQIVAwUBZRUZG8kNZI30y1K9AQg0NA//VU6lEnrrlZ4iYuFeIAHLfiGg8ZBWA9/9
B4yCkRIBtcy5mzwKI9Bq2pS019o5unTMoPQEMaGheL/ZPuFz7b732suTjK5+ANb5
79LbvQ4VcWTkqMGv8gevPeZmyY4W9tuN1W1fUO0QIThcCjCYmk/t2fCCwgozymdl
HF69ZX9EYw4nU/dlmGxdf9/9EuCUnle1xk9SVNrr+rZ6JlTw/3rcp44+sh766Yj1
M/wa+0cy5+UBRBVRqYyCrOYcviCt7rP++nXGx1VvyI/Ta6BY1g+ArvnqOcMmYiGM
CC7YfeVBXicsqPAEAfFhzMjK/GcHpIefyvVuoW+tM4LYIkMEb66ET0mx7QsjU47l
vDpAFpDqXoVuwMVuNsGgdnBUGaqLWaAxeFkMSp4rYXqYBlVwkHEwCqBuFSFoihNT
jeiRsCKjc11a2nlfPu0LoRpqgZ8FTlE/VBtEoaSoYTOHxvEionsqN9ccs1MzdnIU
SACig4o6MttcnLXVr4t1Qpywoxz9IteTyts7HjmpL4mN3u3JvCcXbufuzN6TzZMO
n6rRLwDGvYfMmhx6Zi7oop0pameUrO+nAFXhzcLCj5vp3wpvl7oqsAZ8Vy+/6zVv
ujBstieNwDcu9epT1V67dPSVNDqO7DGzLTRYKcg/+RRUYBNfDv9R5ACYxRZS18QF
ayrlPnvReps=
=u8xp
-----END PGP SIGNATURE-----

ESB-2023.5563 - [SUSE] bind: CVSS (Max): 7.5

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5563
                         Security update for bind
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           bind
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-3341  

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2023/suse-su-20233796-1

Comment: CVSS (Max):  7.5 CVE-2023-3341 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

Security update for bind

Announcement ID:  SUSE-SU-2023:3796-1
     Rating:      important
   References:      o #1215472

Cross-References:   o CVE-2023-3341

                    o CVE-2023-3341 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/
                      S:U/C:N/I:N/A:H
  CVSS scores:      o CVE-2023-3341 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/
                      S:U/C:N/I:N/A:H

                    o SUSE Linux Enterprise High Performance Computing 12 SP5
    Affected        o SUSE Linux Enterprise Server 12 SP5
    Products:       o SUSE Linux Enterprise Server for SAP Applications 12 SP5
                    o SUSE Linux Enterprise Software Development Kit 12 SP5

An update that solves one vulnerability can now be installed.

Description:

This update for bind fixes the following issues:

  o CVE-2023-3341: Fixed stack exhaustion flaw in control channel code may
    cause named to terminate unexpectedly (bsc#1215472).

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Software Development Kit 12 SP5
    zypper in -t patch SUSE-SLE-SDK-12-SP5-2023-3796=1
  o SUSE Linux Enterprise High Performance Computing 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3796=1
  o SUSE Linux Enterprise Server 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3796=1
  o SUSE Linux Enterprise Server for SAP Applications 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3796=1

Package List:

  o SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le
    s390x x86_64)
       bind-debuginfo-9.11.22-3.49.1
       bind-devel-9.11.22-3.49.1
       bind-debugsource-9.11.22-3.49.1
  o SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
       bind-9.11.22-3.49.1
       libirs161-debuginfo-9.11.22-3.49.1
       bind-debugsource-9.11.22-3.49.1
       libirs161-9.11.22-3.49.1
       libisccc161-debuginfo-9.11.22-3.49.1
       libbind9-161-debuginfo-9.11.22-3.49.1
       bind-chrootenv-9.11.22-3.49.1
       libisccfg163-9.11.22-3.49.1
       libdns1110-9.11.22-3.49.1
       libisc1107-9.11.22-3.49.1
       libisccfg163-debuginfo-9.11.22-3.49.1
       bind-utils-debuginfo-9.11.22-3.49.1
       liblwres161-9.11.22-3.49.1
       liblwres161-debuginfo-9.11.22-3.49.1
       bind-utils-9.11.22-3.49.1
       libdns1110-debuginfo-9.11.22-3.49.1
       libisc1107-debuginfo-9.11.22-3.49.1
       libisccc161-9.11.22-3.49.1
       bind-debuginfo-9.11.22-3.49.1
       libbind9-161-9.11.22-3.49.1
  o SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch)
       bind-doc-9.11.22-3.49.1
       python-bind-9.11.22-3.49.1
  o SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64)
       libisc1107-32bit-9.11.22-3.49.1
       libisc1107-debuginfo-32bit-9.11.22-3.49.1
  o SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
       bind-9.11.22-3.49.1
       libirs161-debuginfo-9.11.22-3.49.1
       bind-debugsource-9.11.22-3.49.1
       libirs161-9.11.22-3.49.1
       libisccc161-debuginfo-9.11.22-3.49.1
       libbind9-161-debuginfo-9.11.22-3.49.1
       bind-chrootenv-9.11.22-3.49.1
       libisccfg163-9.11.22-3.49.1
       libdns1110-9.11.22-3.49.1
       libisc1107-9.11.22-3.49.1
       libisccfg163-debuginfo-9.11.22-3.49.1
       bind-utils-debuginfo-9.11.22-3.49.1
       liblwres161-9.11.22-3.49.1
       liblwres161-debuginfo-9.11.22-3.49.1
       bind-utils-9.11.22-3.49.1
       libdns1110-debuginfo-9.11.22-3.49.1
       libisc1107-debuginfo-9.11.22-3.49.1
       libisccc161-9.11.22-3.49.1
       bind-debuginfo-9.11.22-3.49.1
       libbind9-161-9.11.22-3.49.1
  o SUSE Linux Enterprise Server 12 SP5 (noarch)
       bind-doc-9.11.22-3.49.1
       python-bind-9.11.22-3.49.1
  o SUSE Linux Enterprise Server 12 SP5 (s390x x86_64)
       libisc1107-32bit-9.11.22-3.49.1
       libisc1107-debuginfo-32bit-9.11.22-3.49.1
  o SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
       bind-9.11.22-3.49.1
       libirs161-debuginfo-9.11.22-3.49.1
       bind-debugsource-9.11.22-3.49.1
       libirs161-9.11.22-3.49.1
       libisccc161-debuginfo-9.11.22-3.49.1
       libbind9-161-debuginfo-9.11.22-3.49.1
       bind-chrootenv-9.11.22-3.49.1
       libisccfg163-9.11.22-3.49.1
       libdns1110-9.11.22-3.49.1
       libisc1107-9.11.22-3.49.1
       libisccfg163-debuginfo-9.11.22-3.49.1
       bind-utils-debuginfo-9.11.22-3.49.1
       liblwres161-9.11.22-3.49.1
       liblwres161-debuginfo-9.11.22-3.49.1
       bind-utils-9.11.22-3.49.1
       libdns1110-debuginfo-9.11.22-3.49.1
       libisc1107-debuginfo-9.11.22-3.49.1
       libisccc161-9.11.22-3.49.1
       bind-debuginfo-9.11.22-3.49.1
       libbind9-161-9.11.22-3.49.1
  o SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch)
       bind-doc-9.11.22-3.49.1
       python-bind-9.11.22-3.49.1
  o SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64)
       libisc1107-32bit-9.11.22-3.49.1
       libisc1107-debuginfo-32bit-9.11.22-3.49.1

References:

  o https://www.suse.com/security/cve/CVE-2023-3341.html
  o https://bugzilla.suse.com/show_bug.cgiid=1215472

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=xvBU
-----END PGP SIGNATURE-----

ESB-2023.5562 - [SUSE] open-vm-tools: CVSS (Max): 7.5

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5562
                     Security update for open-vm-tools
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           open-vm-tools
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-20900  

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2023/suse-su-20233795-1

Comment: CVSS (Max):  7.5 CVE-2023-20900 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

Security update for open-vm-tools

Announcement ID:  SUSE-SU-2023:3795-1
     Rating:      important
                    o #1205927
   References:      o #1214850
                    o PED-1344

Cross-References:   o CVE-2023-20900

                    o CVE-2023-20900 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N
                      /S:U/C:H/I:H/A:H
  CVSS scores:      o CVE-2023-20900 ( NVD ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/
                      S:U/C:H/I:H/A:H

    Affected        o SUSE Linux Enterprise High Performance Computing 12 SP5
    Products:       o SUSE Linux Enterprise Server 12 SP5
                    o SUSE Linux Enterprise Server for SAP Applications 12 SP5

An update that solves one vulnerability, contains one feature and has one
security fix can now be installed.

Description:

This update for open-vm-tools fixes the following issues:

Update to 12.3.0 (build 22234872) (bsc#1214850)

  o There are no new features in the open-vm-tools 12.3.0 release. This is
    primarily a maintenance release that addresses a few critical problems,
    including:
  o This release integrates CVE-2023-20900 without the need for a patch. For
    more information on this vulnerability and its impact on VMware products,
    see https://www.vmware.com/security/advisories/VMSA-2023-0019.html.
  o A tools.conf configuration setting is available to temporaily direct Linux
    quiesced snaphots to restore pre open-vm-tools 12.2.0 behavior of ignoring
    file systems already frozen.
  o Building of the VMware Guest Authentication Service (VGAuth) using
    "xml-security-c" and "xerces-c" is being deprecated.
  o A number of Coverity reported issues have been addressed.
  o A number of GitHub issues and pull requests have been handled. Please see
    the Resolves Issues section of the Release Notes.
  o For issues resolved in this release, see the Resolved Issues section of the
    Release Notes.
  o For complete details, see: https://github.com/vmware/open-vm-tools/releases
    /tag/stable-12.3.0
  o Release Notes are available at https://github.com/vmware/open-vm-tools/blob
    /stable-12.3.0/ReleaseNotes.md
  o The granular changes that have gone into the 12.3.0 release are in the
    ChangeLog at https://github.com/vmware/open-vm-tools/blob/stable-12.3.0/
    open-vm-tools/ChangeLog
  o Fix (bsc#1205927) - hv_vmbus module is loaded unnecessarily in VMware
    guests
  o jsc#PED-1344 - reinable building containerinfo plugin for SLES 15 SP4.

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Server for SAP Applications 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3795=1
  o SUSE Linux Enterprise High Performance Computing 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3795=1
  o SUSE Linux Enterprise Server 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3795=1

Package List:

  o SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64)
       libvmtools0-12.3.0-4.59.1
       open-vm-tools-debugsource-12.3.0-4.59.1
       open-vm-tools-desktop-debuginfo-12.3.0-4.59.1
       open-vm-tools-desktop-12.3.0-4.59.1
       open-vm-tools-salt-minion-12.3.0-4.59.1
       open-vm-tools-12.3.0-4.59.1
       open-vm-tools-sdmp-12.3.0-4.59.1
       libvmtools0-debuginfo-12.3.0-4.59.1
       open-vm-tools-sdmp-debuginfo-12.3.0-4.59.1
       open-vm-tools-debuginfo-12.3.0-4.59.1
  o SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64)
       libvmtools0-12.3.0-4.59.1
       open-vm-tools-debugsource-12.3.0-4.59.1
       open-vm-tools-desktop-debuginfo-12.3.0-4.59.1
       open-vm-tools-desktop-12.3.0-4.59.1
       open-vm-tools-salt-minion-12.3.0-4.59.1
       open-vm-tools-12.3.0-4.59.1
       open-vm-tools-sdmp-12.3.0-4.59.1
       libvmtools0-debuginfo-12.3.0-4.59.1
       open-vm-tools-sdmp-debuginfo-12.3.0-4.59.1
       open-vm-tools-debuginfo-12.3.0-4.59.1
  o SUSE Linux Enterprise Server 12 SP5 (x86_64)
       libvmtools0-12.3.0-4.59.1
       open-vm-tools-debugsource-12.3.0-4.59.1
       open-vm-tools-desktop-debuginfo-12.3.0-4.59.1
       open-vm-tools-desktop-12.3.0-4.59.1
       open-vm-tools-salt-minion-12.3.0-4.59.1
       open-vm-tools-12.3.0-4.59.1
       open-vm-tools-sdmp-12.3.0-4.59.1
       libvmtools0-debuginfo-12.3.0-4.59.1
       open-vm-tools-sdmp-debuginfo-12.3.0-4.59.1
       open-vm-tools-debuginfo-12.3.0-4.59.1

References:

  o https://www.suse.com/security/cve/CVE-2023-20900.html
  o https://bugzilla.suse.com/show_bug.cgiid=1205927
  o https://bugzilla.suse.com/show_bug.cgiid=1214850
  o https://jira.suse.com/browse/PED-1344

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/

iQIVAwUBZRUY5MkNZI30y1K9AQh7GQ//YG327RtPRVV36yTSssBGzDOqsd7D1aYz
BJkgZ/HiMFyh6eyugNHuH2Y8Th/PV6rFn+Fj5GwzgQndnBPTSKIr/4F/TTWkWvNc
bByJMBCFhTy7AaGG3k+E0iWEVTQiQsJnT2IRD6yKEo8vx33YSYaHqFhG1oU6kj5h
CdLevMQfBnDf2V2R20NczagdIqUJ6GHExHOTWKbdKbd/tXW6BJD4RCDAnkvc9E7G
ShVVwi9U3Q7tqEPsC+gBQ6mLLs41NiovzwKxemqpqOtZ7lKf9FHbphq49sRllO0W
7ceGPeEBKXoTS+zQXSMwd3e3WrPCJaMNpy8kxfN5tfiLdeA/lqMBPiRqyCHHc4xZ
jolmF/5TYJ6jUyBpcC8gb0aRGHPYbhZque31ayjfx1ug3Ri85Qv+NFwcDnK7O+5Q
ZS+bcnYmJg3/jd1b0nZ8Bt4zgdB8eZ2jDGTPXDQjo1JZ18numgOx2h6z6OLzBfUp
4rY4c7r50adt+euW33AeJPuw3/zKDKcmgTdAOJbu6VMZGm+9ig1bVolJv7CmuHWj
rQ8pJgl62bUZ/lv4aS2b3zt5wvHdDNkN2vVj5o3F3Hil7zenfdvaDH3TZac3ACpL
AwwKnbpw/WR4TAfZh3d9Dc4+sBUzseIAKxkujD/LpaRuiQ+VGsWNYg1CyDpVLAjh
OMMxtU6Xa44=
=76t/
-----END PGP SIGNATURE-----

ESB-2023.5561 - [SUSE] libwebp: CVSS (Max): 8.8

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5561
                        Security update for libwebp
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libwebp
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-4863  

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2023/suse-su-20233794-1

Comment: CVSS (Max):  8.8 CVE-2023-4863 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
         
         The following are listed in the CISA Known Exploited Vulnerabilities (KEV) Catalog:
         CISA KEV CVE(s): CVE-2023-4863
         CISA KEV URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

- --------------------------BEGIN INCLUDED TEXT--------------------

Security update for libwebp

Announcement ID:  SUSE-SU-2023:3794-1
     Rating:      critical
   References:      o #1215231

Cross-References:   o CVE-2023-4863

                    o CVE-2023-4863 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:H/I:H/A:H
  CVSS scores:      o CVE-2023-4863 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:H/I:H/A:H

                    o HPE Helion OpenStack 8
                    o SUSE Linux Enterprise High Performance Computing 12 SP3
                    o SUSE Linux Enterprise High Performance Computing 12 SP5
                    o SUSE Linux Enterprise Server 12 SP3
                    o SUSE Linux Enterprise Server 12 SP4
    Affected        o SUSE Linux Enterprise Server 12 SP5
    Products:       o SUSE Linux Enterprise Server for SAP Applications 12 SP5
                    o SUSE Linux Enterprise Software Development Kit 12 SP5
                    o SUSE OpenStack Cloud 8
                    o SUSE OpenStack Cloud 9
                    o SUSE OpenStack Cloud Crowbar 8
                    o SUSE OpenStack Cloud Crowbar 9

An update that solves one vulnerability can now be installed.

Description:

This update for libwebp fixes the following issues:

  o CVE-2023-4863: Fixed a heap buffer overflow (bsc#1215231).

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o HPE Helion OpenStack 8
    zypper in -t patch HPE-Helion-OpenStack-8-2023-3794=1
  o SUSE OpenStack Cloud 8
    zypper in -t patch SUSE-OpenStack-Cloud-8-2023-3794=1
  o SUSE OpenStack Cloud 9
    zypper in -t patch SUSE-OpenStack-Cloud-9-2023-3794=1
  o SUSE OpenStack Cloud Crowbar 8
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2023-3794=1
  o SUSE OpenStack Cloud Crowbar 9
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2023-3794=1
  o SUSE Linux Enterprise Software Development Kit 12 SP5
    zypper in -t patch SUSE-SLE-SDK-12-SP5-2023-3794=1
  o SUSE Linux Enterprise High Performance Computing 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3794=1
  o SUSE Linux Enterprise Server 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3794=1
  o SUSE Linux Enterprise Server for SAP Applications 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3794=1

Package List:

  o HPE Helion OpenStack 8 (x86_64)
       libwebp-debugsource-0.4.3-4.15.1
       libwebpmux1-debuginfo-0.4.3-4.15.1
       libwebpmux1-0.4.3-4.15.1
  o SUSE OpenStack Cloud 8 (x86_64)
       libwebp-debugsource-0.4.3-4.15.1
       libwebpmux1-debuginfo-0.4.3-4.15.1
       libwebpmux1-0.4.3-4.15.1
  o SUSE OpenStack Cloud 9 (x86_64)
       libwebp-debugsource-0.4.3-4.15.1
       libwebpmux1-debuginfo-0.4.3-4.15.1
       libwebpmux1-0.4.3-4.15.1
  o SUSE OpenStack Cloud Crowbar 8 (x86_64)
       libwebp-debugsource-0.4.3-4.15.1
       libwebpmux1-debuginfo-0.4.3-4.15.1
       libwebpmux1-0.4.3-4.15.1
  o SUSE OpenStack Cloud Crowbar 9 (x86_64)
       libwebp-debugsource-0.4.3-4.15.1
       libwebpmux1-debuginfo-0.4.3-4.15.1
       libwebpmux1-0.4.3-4.15.1
  o SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le
    s390x x86_64)
       libwebpdecoder1-debuginfo-0.4.3-4.15.1
       libwebp-devel-0.4.3-4.15.1
       libwebpmux1-debuginfo-0.4.3-4.15.1
       libwebp-debugsource-0.4.3-4.15.1
       libwebpmux1-0.4.3-4.15.1
       libwebpdecoder1-0.4.3-4.15.1
  o SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
       libwebpdemux1-0.4.3-4.15.1
       libwebp5-0.4.3-4.15.1
       libwebp-debugsource-0.4.3-4.15.1
       libwebp5-debuginfo-0.4.3-4.15.1
       libwebpdemux1-debuginfo-0.4.3-4.15.1
  o SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64)
       libwebp5-debuginfo-32bit-0.4.3-4.15.1
       libwebp5-32bit-0.4.3-4.15.1
  o SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
       libwebpdemux1-0.4.3-4.15.1
       libwebp5-0.4.3-4.15.1
       libwebp-debugsource-0.4.3-4.15.1
       libwebp5-debuginfo-0.4.3-4.15.1
       libwebpdemux1-debuginfo-0.4.3-4.15.1
  o SUSE Linux Enterprise Server 12 SP5 (s390x x86_64)
       libwebp5-debuginfo-32bit-0.4.3-4.15.1
       libwebp5-32bit-0.4.3-4.15.1
  o SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
       libwebpdemux1-0.4.3-4.15.1
       libwebp5-0.4.3-4.15.1
       libwebp-debugsource-0.4.3-4.15.1
       libwebp5-debuginfo-0.4.3-4.15.1
       libwebpdemux1-debuginfo-0.4.3-4.15.1
  o SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64)
       libwebp5-debuginfo-32bit-0.4.3-4.15.1
       libwebp5-32bit-0.4.3-4.15.1

References:

  o https://www.suse.com/security/cve/CVE-2023-4863.html
  o https://bugzilla.suse.com/show_bug.cgiid=1215231

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=8bGB
-----END PGP SIGNATURE-----

ESB-2023.5560 - [SUSE] quagga: CVSS (Max): 7.5

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5560
                        Security update for quagga
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           quagga
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-41358 CVE-2023-38802 

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2023/suse-su-20233793-1

Comment: CVSS (Max):  7.5 CVE-2023-41358 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

Security update for quagga

Announcement ID:  SUSE-SU-2023:3793-1
     Rating:      important
                    o #1213284
   References:      o #1214735

                    o CVE-2023-38802
Cross-References:   o CVE-2023-41358

                    o CVE-2023-38802 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2023-38802 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/
                      S:U/C:N/I:N/A:H
  CVSS scores:      o CVE-2023-41358 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2023-41358 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/
                      S:U/C:N/I:N/A:H

                    o SUSE Linux Enterprise High Performance Computing 12 SP5
    Affected        o SUSE Linux Enterprise Server 12 SP5
    Products:       o SUSE Linux Enterprise Server for SAP Applications 12 SP5
                    o SUSE Linux Enterprise Software Development Kit 12 SP5

An update that solves two vulnerabilities can now be installed.

Description:

This update for quagga fixes the following issues:

  o CVE-2023-38802: Fixed bad length handling in BGP attribute handling (bsc#
    1213284).
  o CVE-2023-41358: Fixed possible crash when processing NLRIs if the attribute
    length is zero (bsc#1214735).

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Software Development Kit 12 SP5
    zypper in -t patch SUSE-SLE-SDK-12-SP5-2023-3793=1
  o SUSE Linux Enterprise High Performance Computing 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3793=1
  o SUSE Linux Enterprise Server 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3793=1
  o SUSE Linux Enterprise Server for SAP Applications 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3793=1

Package List:

  o SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le
    s390x x86_64)
       quagga-debugsource-1.1.1-17.10.1
       quagga-devel-1.1.1-17.10.1
       quagga-debuginfo-1.1.1-17.10.1
  o SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
       quagga-debugsource-1.1.1-17.10.1
       libospf0-debuginfo-1.1.1-17.10.1
       quagga-debuginfo-1.1.1-17.10.1
       libzebra1-1.1.1-17.10.1
       libquagga_pb0-1.1.1-17.10.1
       libospfapiclient0-1.1.1-17.10.1
       libzebra1-debuginfo-1.1.1-17.10.1
       quagga-1.1.1-17.10.1
       libospf0-1.1.1-17.10.1
       libospfapiclient0-debuginfo-1.1.1-17.10.1
       libquagga_pb0-debuginfo-1.1.1-17.10.1
  o SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
       quagga-debugsource-1.1.1-17.10.1
       libospf0-debuginfo-1.1.1-17.10.1
       quagga-debuginfo-1.1.1-17.10.1
       libzebra1-1.1.1-17.10.1
       libquagga_pb0-1.1.1-17.10.1
       libospfapiclient0-1.1.1-17.10.1
       libzebra1-debuginfo-1.1.1-17.10.1
       quagga-1.1.1-17.10.1
       libospf0-1.1.1-17.10.1
       libospfapiclient0-debuginfo-1.1.1-17.10.1
       libquagga_pb0-debuginfo-1.1.1-17.10.1
  o SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
       quagga-debugsource-1.1.1-17.10.1
       libospf0-debuginfo-1.1.1-17.10.1
       quagga-debuginfo-1.1.1-17.10.1
       libzebra1-1.1.1-17.10.1
       libquagga_pb0-1.1.1-17.10.1
       libospfapiclient0-1.1.1-17.10.1
       libzebra1-debuginfo-1.1.1-17.10.1
       quagga-1.1.1-17.10.1
       libospf0-1.1.1-17.10.1
       libospfapiclient0-debuginfo-1.1.1-17.10.1
       libquagga_pb0-debuginfo-1.1.1-17.10.1

References:

  o https://www.suse.com/security/cve/CVE-2023-38802.html
  o https://www.suse.com/security/cve/CVE-2023-41358.html
  o https://bugzilla.suse.com/show_bug.cgiid=1213284
  o https://bugzilla.suse.com/show_bug.cgiid=1214735

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/

iQIVAwUBZRUYsskNZI30y1K9AQjLpA/8D3rnY4dbf6c3e+H39ZSjDwaqDmnhE8mQ
1ORck84/2sQf8x14zqDCF/6phJmmjoRYZ2hpFdXBnjLEoTvoKlZOythiOlMdMuBt
UWnhAJMxWZWu1vPJPfxvizpWn1tM998iqTf6uleDvBf3464GUAvuGbR5T+ojz0P7
kb/6VvRijXqhPqTQQ4zlLYRghL3cvqQ244M2Zfp+40SGOoTRCEnvDmE7vkOTvemf
nmTZ32hLKygGy0teTEUzDJEaWxzilVYlSDJqvBZyEgWBYiI/5PDNKtW4BtuG5Q4e
EHBV9c8eBAqNy525iOZZHJ206EL4SxKeFPkR2w0J70oyFUSK+M4/oy586m/pCBk1
FPXRU36F2p5p/G9Ejbokl4bMQbn7KMpiGrpejGk7tYlv9e92l3+V7j6+Dzu1/sJ3
IhlfimoSwi8556znI5BZbXzWUFg1w2+fs6qZG3M23rQYjwSaWJpKyBfSNtfnzCqD
vn1rR1yZ8atxulE5wQ9xZO7fRiY338kMs5CiSvcInysVYzNOvMmLJFM6wc6xZOxt
tXdVxtNcCKAGTxI6PixRmY+K+4oF9yMJGuh3fZWi6h8ooxTntAGAF00Wf+7+X2YC
poHAF5ONXlUiv4EIQas0xBbVCuTUYV+ZCZqROt1SUrUjoTtGn899yws2jd7IKhdh
2uTUdHNAZxA=
=PRzk
-----END PGP SIGNATURE-----

ESB-2023.5559 - [SUSE] ImageMagick: CVSS (Max): 5.5

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5559
                      Security update for ImageMagick
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           ImageMagick
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-21679  

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2023/suse-su-20233792-1

Comment: CVSS (Max):  5.5 CVE-2020-21679 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)
         CVSS Source: NIST
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

Security update for ImageMagick

Announcement ID:  SUSE-SU-2023:3792-1
     Rating:      moderate
   References:      o #1214578

Cross-References:   o CVE-2020-21679

                    o CVE-2020-21679 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/
  CVSS scores:        S:U/C:N/I:N/A:H

    Affected        o openSUSE Leap 15.4
    Products:

An update that solves one vulnerability can now be installed.

Description:

This update for ImageMagick fixes the following issues:

  o CVE-2020-21679: Fixed a buffer overflow in WritePCXImage function in pcx.c
    which may allow a remote attackers to cause a denial of service. (bsc#
    1214578)

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o openSUSE Leap 15.4
    zypper in -t patch openSUSE-SLE-15.4-2023-3792=1

Package List:

  o openSUSE Leap 15.4 (x86_64)
       libMagick++-7_Q16HDRI4-32bit-debuginfo-7.0.7.34-150200.10.54.1
       libMagick++-7_Q16HDRI4-32bit-7.0.7.34-150200.10.54.1
       libMagickWand-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-150200.10.54.1
       libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-150200.10.54.1
       libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-150200.10.54.1
       libMagickCore-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-150200.10.54.1
  o openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
       libMagickCore-7_Q16HDRI6-7.0.7.34-150200.10.54.1
       libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.54.1
       libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150200.10.54.1
       libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150200.10.54.1
       libMagickWand-7_Q16HDRI6-7.0.7.34-150200.10.54.1
       libMagick++-7_Q16HDRI4-7.0.7.34-150200.10.54.1

References:

  o https://www.suse.com/security/cve/CVE-2020-21679.html
  o https://bugzilla.suse.com/show_bug.cgiid=1214578

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/

iQIVAwUBZRUYkckNZI30y1K9AQj8bA//RgcSzGsax2SSx645gdNuqoaVdjrc5WuF
wgDaSdwlRA0/H7u9wS6A0iCH7L/twQqbWw5girzjIyozxhEP5LWn58cQxHdXFOAF
svXHu/Rg9/iSQN6giLbWuLs9le2RxTBtGrxpDaRBmdSDieK9YB0+/EC5WSxpkPgu
RfvBnBp9IDXShuiMQpudyQl63zT/vZDMG8DvIpvhxBM6MXBThUhVlAzTg8PtlRQe
b3pUuqrhUauyRdLp2EjRPduEEtZv9GEp/Skah288Y63Cy2rrgRUChtY8HUInCQn+
bA1q0S+IThc2fzF8THrFhwt/dYZtuS0lhcA1848m02X7xxz2UbpZMlAXVUamCIY5
eZSG2wyvekMURfD9ap1oJcVxZVvo5Y+ZqRVz7O+YcLGfqgI6SbYy0J79m0SCWGat
oeGKtqDj7YNIJITgKn9lOjGcfGpNdN6RxDl+uz7yPNgzUueSrEvU2BaeCaJamNAD
x9jwjTEHoMnhvO0CDZHt/ESTGbFeFl7cye9ML5BAHfwU3ncD3it3d6atMvQcQ6U+
lYwVloscmQJxeOgLD6z1r+kXVSXN/9Z15aWoiNzPI0PPKZq9/dStatJcanSL5Ml6
7M0+bLZxTm29C7WdIEiOBwLodG0eO/Ucvs7+QKyWhP9LTMeUwQQTUDcgF396Y8YD
5G73IbnRxKI=
=WkEf
-----END PGP SIGNATURE-----

ESB-2023.5558 - [SUSE] gstreamer-plugins-bad: CVSS (Max): 7.8

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5558
                 Security update for gstreamer-plugins-bad
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           gstreamer-plugins-bad
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-37329  

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2023/suse-su-20233802-1

Comment: CVSS (Max):  7.8 CVE-2023-37329 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

Security update for gstreamer-plugins-bad

Announcement ID:  SUSE-SU-2023:3802-1
     Rating:      important
   References:      o #1213126

Cross-References:   o CVE-2023-37329

                    o CVE-2023-37329 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R
  CVSS scores:        /S:U/C:H/I:H/A:H

                    o SUSE CaaS Platform 4.0
                    o SUSE Linux Enterprise High Performance Computing 15 SP1
    Affected        o SUSE Linux Enterprise High Performance Computing 15 SP1
    Products:         LTSS 15-SP1
                    o SUSE Linux Enterprise Server 15 SP1
                    o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
                    o SUSE Linux Enterprise Server for SAP Applications 15 SP1

An update that solves one vulnerability can now be installed.

Description:

This update for gstreamer-plugins-bad fixes the following issues:

  o CVE-2023-37329: Fixed a heap overwrite in PGS subtitle overlay decoder (bsc
    #1213126).

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Server for SAP Applications 15 SP1
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3802=1
  o SUSE CaaS Platform 4.0
    To install this update, use the SUSE CaaS Platform 'skuba' tool. It will
    inform you if it detects new updates and let you then trigger updating of
    the complete cluster in a controlled way.
  o SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3802=1
  o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3802=1

Package List:

  o SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64)
       gstreamer-plugins-bad-debugsource-1.12.5-150000.3.9.1
       libgstbadaudio-1_0-0-1.12.5-150000.3.9.1
       libgstbadvideo-1_0-0-1.12.5-150000.3.9.1
       libgstgl-1_0-0-1.12.5-150000.3.9.1
       gstreamer-plugins-bad-1.12.5-150000.3.9.1
       libgstwayland-1_0-0-1.12.5-150000.3.9.1
       libgstcodecparsers-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstbasecamerabinsrc-1_0-0-1.12.5-150000.3.9.1
       libgstwayland-1_0-0-debuginfo-1.12.5-150000.3.9.1
       gstreamer-plugins-bad-debuginfo-1.12.5-150000.3.9.1
       libgstcodecparsers-1_0-0-1.12.5-150000.3.9.1
       libgstbadvideo-1_0-0-debuginfo-1.12.5-150000.3.9.1
       gstreamer-plugins-bad-devel-1.12.5-150000.3.9.1
       libgstmpegts-1_0-0-debuginfo-1.12.5-150000.3.9.1
       typelib-1_0-GstGL-1_0-1.12.5-150000.3.9.1
       libgstadaptivedemux-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstplayer-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstinsertbin-1_0-0-1.12.5-150000.3.9.1
       libgstmpegts-1_0-0-1.12.5-150000.3.9.1
       libgstbadallocators-1_0-0-1.12.5-150000.3.9.1
       libgstphotography-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstplayer-1_0-0-1.12.5-150000.3.9.1
       typelib-1_0-GstBadAllocators-1_0-1.12.5-150000.3.9.1
       typelib-1_0-GstInsertBin-1_0-1.12.5-150000.3.9.1
       typelib-1_0-GstMpegts-1_0-1.12.5-150000.3.9.1
       libgstgl-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgsturidownloader-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstadaptivedemux-1_0-0-1.12.5-150000.3.9.1
       libgstphotography-1_0-0-1.12.5-150000.3.9.1
       libgstbadbase-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstinsertbin-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgsturidownloader-1_0-0-1.12.5-150000.3.9.1
       typelib-1_0-GstPlayer-1_0-1.12.5-150000.3.9.1
       libgstbadbase-1_0-0-1.12.5-150000.3.9.1
       libgstbadaudio-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstbadallocators-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstbasecamerabinsrc-1_0-0-debuginfo-1.12.5-150000.3.9.1
  o SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch)
       gstreamer-plugins-bad-lang-1.12.5-150000.3.9.1
  o SUSE CaaS Platform 4.0 (x86_64)
       gstreamer-plugins-bad-debugsource-1.12.5-150000.3.9.1
       libgstbadaudio-1_0-0-1.12.5-150000.3.9.1
       libgstbadvideo-1_0-0-1.12.5-150000.3.9.1
       libgstgl-1_0-0-1.12.5-150000.3.9.1
       gstreamer-plugins-bad-1.12.5-150000.3.9.1
       libgstwayland-1_0-0-1.12.5-150000.3.9.1
       libgstcodecparsers-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstbasecamerabinsrc-1_0-0-1.12.5-150000.3.9.1
       libgstwayland-1_0-0-debuginfo-1.12.5-150000.3.9.1
       gstreamer-plugins-bad-debuginfo-1.12.5-150000.3.9.1
       libgstcodecparsers-1_0-0-1.12.5-150000.3.9.1
       libgstbadvideo-1_0-0-debuginfo-1.12.5-150000.3.9.1
       gstreamer-plugins-bad-devel-1.12.5-150000.3.9.1
       libgstmpegts-1_0-0-debuginfo-1.12.5-150000.3.9.1
       typelib-1_0-GstGL-1_0-1.12.5-150000.3.9.1
       libgstadaptivedemux-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstplayer-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstinsertbin-1_0-0-1.12.5-150000.3.9.1
       libgstmpegts-1_0-0-1.12.5-150000.3.9.1
       libgstbadallocators-1_0-0-1.12.5-150000.3.9.1
       libgstphotography-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstplayer-1_0-0-1.12.5-150000.3.9.1
       typelib-1_0-GstBadAllocators-1_0-1.12.5-150000.3.9.1
       typelib-1_0-GstInsertBin-1_0-1.12.5-150000.3.9.1
       typelib-1_0-GstMpegts-1_0-1.12.5-150000.3.9.1
       libgstgl-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgsturidownloader-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstadaptivedemux-1_0-0-1.12.5-150000.3.9.1
       libgstphotography-1_0-0-1.12.5-150000.3.9.1
       libgstbadbase-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstinsertbin-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgsturidownloader-1_0-0-1.12.5-150000.3.9.1
       typelib-1_0-GstPlayer-1_0-1.12.5-150000.3.9.1
       libgstbadbase-1_0-0-1.12.5-150000.3.9.1
       libgstbadaudio-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstbadallocators-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstbasecamerabinsrc-1_0-0-debuginfo-1.12.5-150000.3.9.1
  o SUSE CaaS Platform 4.0 (noarch)
       gstreamer-plugins-bad-lang-1.12.5-150000.3.9.1
  o SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
    (aarch64 x86_64)
       gstreamer-plugins-bad-debugsource-1.12.5-150000.3.9.1
       libgstbadaudio-1_0-0-1.12.5-150000.3.9.1
       libgstbadvideo-1_0-0-1.12.5-150000.3.9.1
       libgstgl-1_0-0-1.12.5-150000.3.9.1
       gstreamer-plugins-bad-1.12.5-150000.3.9.1
       libgstwayland-1_0-0-1.12.5-150000.3.9.1
       libgstcodecparsers-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstbasecamerabinsrc-1_0-0-1.12.5-150000.3.9.1
       libgstwayland-1_0-0-debuginfo-1.12.5-150000.3.9.1
       gstreamer-plugins-bad-debuginfo-1.12.5-150000.3.9.1
       libgstcodecparsers-1_0-0-1.12.5-150000.3.9.1
       libgstbadvideo-1_0-0-debuginfo-1.12.5-150000.3.9.1
       gstreamer-plugins-bad-devel-1.12.5-150000.3.9.1
       libgstmpegts-1_0-0-debuginfo-1.12.5-150000.3.9.1
       typelib-1_0-GstGL-1_0-1.12.5-150000.3.9.1
       libgstadaptivedemux-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstplayer-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstinsertbin-1_0-0-1.12.5-150000.3.9.1
       libgstmpegts-1_0-0-1.12.5-150000.3.9.1
       libgstbadallocators-1_0-0-1.12.5-150000.3.9.1
       libgstphotography-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstplayer-1_0-0-1.12.5-150000.3.9.1
       typelib-1_0-GstBadAllocators-1_0-1.12.5-150000.3.9.1
       typelib-1_0-GstInsertBin-1_0-1.12.5-150000.3.9.1
       typelib-1_0-GstMpegts-1_0-1.12.5-150000.3.9.1
       libgstgl-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgsturidownloader-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstadaptivedemux-1_0-0-1.12.5-150000.3.9.1
       libgstphotography-1_0-0-1.12.5-150000.3.9.1
       libgstbadbase-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstinsertbin-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgsturidownloader-1_0-0-1.12.5-150000.3.9.1
       typelib-1_0-GstPlayer-1_0-1.12.5-150000.3.9.1
       libgstbadbase-1_0-0-1.12.5-150000.3.9.1
       libgstbadaudio-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstbadallocators-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstbasecamerabinsrc-1_0-0-debuginfo-1.12.5-150000.3.9.1
  o SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
    (noarch)
       gstreamer-plugins-bad-lang-1.12.5-150000.3.9.1
  o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x
    x86_64)
       gstreamer-plugins-bad-debugsource-1.12.5-150000.3.9.1
       libgstbadaudio-1_0-0-1.12.5-150000.3.9.1
       libgstbadvideo-1_0-0-1.12.5-150000.3.9.1
       libgstgl-1_0-0-1.12.5-150000.3.9.1
       gstreamer-plugins-bad-1.12.5-150000.3.9.1
       libgstwayland-1_0-0-1.12.5-150000.3.9.1
       libgstcodecparsers-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstbasecamerabinsrc-1_0-0-1.12.5-150000.3.9.1
       libgstwayland-1_0-0-debuginfo-1.12.5-150000.3.9.1
       gstreamer-plugins-bad-debuginfo-1.12.5-150000.3.9.1
       libgstcodecparsers-1_0-0-1.12.5-150000.3.9.1
       libgstbadvideo-1_0-0-debuginfo-1.12.5-150000.3.9.1
       gstreamer-plugins-bad-devel-1.12.5-150000.3.9.1
       libgstmpegts-1_0-0-debuginfo-1.12.5-150000.3.9.1
       typelib-1_0-GstGL-1_0-1.12.5-150000.3.9.1
       libgstadaptivedemux-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstplayer-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstinsertbin-1_0-0-1.12.5-150000.3.9.1
       libgstmpegts-1_0-0-1.12.5-150000.3.9.1
       libgstbadallocators-1_0-0-1.12.5-150000.3.9.1
       libgstphotography-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstplayer-1_0-0-1.12.5-150000.3.9.1
       typelib-1_0-GstBadAllocators-1_0-1.12.5-150000.3.9.1
       typelib-1_0-GstInsertBin-1_0-1.12.5-150000.3.9.1
       typelib-1_0-GstMpegts-1_0-1.12.5-150000.3.9.1
       libgstgl-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgsturidownloader-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstadaptivedemux-1_0-0-1.12.5-150000.3.9.1
       libgstphotography-1_0-0-1.12.5-150000.3.9.1
       libgstbadbase-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstinsertbin-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgsturidownloader-1_0-0-1.12.5-150000.3.9.1
       typelib-1_0-GstPlayer-1_0-1.12.5-150000.3.9.1
       libgstbadbase-1_0-0-1.12.5-150000.3.9.1
       libgstbadaudio-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstbadallocators-1_0-0-debuginfo-1.12.5-150000.3.9.1
       libgstbasecamerabinsrc-1_0-0-debuginfo-1.12.5-150000.3.9.1
  o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch)
       gstreamer-plugins-bad-lang-1.12.5-150000.3.9.1

References:

  o https://www.suse.com/security/cve/CVE-2023-37329.html
  o https://bugzilla.suse.com/show_bug.cgiid=1213126

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=YO02
-----END PGP SIGNATURE-----

ESB-2023.5557 - [SUSE] gstreamer-plugins-base: CVSS (Max): 7.8

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5557
                Security update for gstreamer-plugins-base
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           gstreamer-plugins-base
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-37328 CVE-2023-37327 CVE-2021-3522

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2023/suse-su-20233801-1

Comment: CVSS (Max):  7.8 CVE-2023-37328 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

Security update for gstreamer-plugins-base

Announcement ID:  SUSE-SU-2023:3801-1
     Rating:      important
                    o #1185448
   References:      o #1213128
                    o #1213131

                    o CVE-2021-3522
Cross-References:   o CVE-2023-37327
                    o CVE-2023-37328

                    o CVE-2021-3522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/
                      S:U/C:N/I:N/A:H
                    o CVE-2021-3522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/
                      S:U/C:N/I:N/A:H
  CVSS scores:      o CVE-2023-37327 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R
                      /S:U/C:H/I:H/A:H
                    o CVE-2023-37328 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R
                      /S:U/C:H/I:H/A:H

                    o openSUSE Leap 15.4
                    o SUSE CaaS Platform 4.0
                    o SUSE Linux Enterprise High Performance Computing 15 SP1
    Affected        o SUSE Linux Enterprise High Performance Computing 15 SP1
    Products:         LTSS 15-SP1
                    o SUSE Linux Enterprise Server 15 SP1
                    o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
                    o SUSE Linux Enterprise Server for SAP Applications 15 SP1

An update that solves three vulnerabilities can now be installed.

Description:

This update for gstreamer-plugins-base fixes the following issues:

  o CVE-2023-37327: Fixed FLAC file parsing integer overflow (bsc#1213128).
  o CVE-2023-37328: Fixed PGS file parsing heap-based buffer overflow (bsc#
    1213131).
  o CVE-2021-3522: Fixed frame size check and potential invalid reads (bsc#
    1185448).

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o openSUSE Leap 15.4
    zypper in -t patch openSUSE-SLE-15.4-2023-3801=1
  o SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3801=1
  o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3801=1
  o SUSE Linux Enterprise Server for SAP Applications 15 SP1
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3801=1
  o SUSE CaaS Platform 4.0
    To install this update, use the SUSE CaaS Platform 'skuba' tool. It will
    inform you if it detects new updates and let you then trigger updating of
    the complete cluster in a controlled way.

Package List:

  o openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
       typelib-1_0-GstFft-1_0-1.12.5-150000.3.6.1
  o SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
    (aarch64 x86_64)
       typelib-1_0-GstSdp-1_0-1.12.5-150000.3.6.1
       typelib-1_0-GstAllocators-1_0-1.12.5-150000.3.6.1
       libgstapp-1_0-0-1.12.5-150000.3.6.1
       libgstsdp-1_0-0-debuginfo-1.12.5-150000.3.6.1
       gstreamer-plugins-base-debuginfo-1.12.5-150000.3.6.1
       typelib-1_0-GstAudio-1_0-1.12.5-150000.3.6.1
       libgsttag-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstallocators-1_0-0-1.12.5-150000.3.6.1
       typelib-1_0-GstVideo-1_0-1.12.5-150000.3.6.1
       libgstfft-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstallocators-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstaudio-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstaudio-1_0-0-1.12.5-150000.3.6.1
       typelib-1_0-GstRtp-1_0-1.12.5-150000.3.6.1
       gstreamer-plugins-base-devel-1.12.5-150000.3.6.1
       libgstrtp-1_0-0-debuginfo-1.12.5-150000.3.6.1
       typelib-1_0-GstPbutils-1_0-1.12.5-150000.3.6.1
       typelib-1_0-GstTag-1_0-1.12.5-150000.3.6.1
       gstreamer-plugins-base-1.12.5-150000.3.6.1
       libgsttag-1_0-0-1.12.5-150000.3.6.1
       libgstriff-1_0-0-debuginfo-1.12.5-150000.3.6.1
       typelib-1_0-GstRtsp-1_0-1.12.5-150000.3.6.1
       libgstpbutils-1_0-0-1.12.5-150000.3.6.1
       libgstvideo-1_0-0-debuginfo-1.12.5-150000.3.6.1
       gstreamer-plugins-base-debugsource-1.12.5-150000.3.6.1
       libgstsdp-1_0-0-1.12.5-150000.3.6.1
       libgstriff-1_0-0-1.12.5-150000.3.6.1
       libgstpbutils-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstrtsp-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstapp-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstfft-1_0-0-1.12.5-150000.3.6.1
       typelib-1_0-GstFft-1_0-1.12.5-150000.3.6.1
       libgstrtsp-1_0-0-1.12.5-150000.3.6.1
       libgstrtp-1_0-0-1.12.5-150000.3.6.1
       typelib-1_0-GstApp-1_0-1.12.5-150000.3.6.1
       libgstvideo-1_0-0-1.12.5-150000.3.6.1
  o SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
    (noarch)
       gstreamer-plugins-base-lang-1.12.5-150000.3.6.1
  o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x
    x86_64)
       typelib-1_0-GstSdp-1_0-1.12.5-150000.3.6.1
       typelib-1_0-GstAllocators-1_0-1.12.5-150000.3.6.1
       libgstapp-1_0-0-1.12.5-150000.3.6.1
       libgstsdp-1_0-0-debuginfo-1.12.5-150000.3.6.1
       gstreamer-plugins-base-debuginfo-1.12.5-150000.3.6.1
       typelib-1_0-GstAudio-1_0-1.12.5-150000.3.6.1
       libgsttag-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstallocators-1_0-0-1.12.5-150000.3.6.1
       typelib-1_0-GstVideo-1_0-1.12.5-150000.3.6.1
       libgstfft-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstallocators-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstaudio-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstaudio-1_0-0-1.12.5-150000.3.6.1
       typelib-1_0-GstRtp-1_0-1.12.5-150000.3.6.1
       gstreamer-plugins-base-devel-1.12.5-150000.3.6.1
       libgstrtp-1_0-0-debuginfo-1.12.5-150000.3.6.1
       typelib-1_0-GstPbutils-1_0-1.12.5-150000.3.6.1
       typelib-1_0-GstTag-1_0-1.12.5-150000.3.6.1
       gstreamer-plugins-base-1.12.5-150000.3.6.1
       libgsttag-1_0-0-1.12.5-150000.3.6.1
       libgstriff-1_0-0-debuginfo-1.12.5-150000.3.6.1
       typelib-1_0-GstRtsp-1_0-1.12.5-150000.3.6.1
       libgstpbutils-1_0-0-1.12.5-150000.3.6.1
       libgstvideo-1_0-0-debuginfo-1.12.5-150000.3.6.1
       gstreamer-plugins-base-debugsource-1.12.5-150000.3.6.1
       libgstsdp-1_0-0-1.12.5-150000.3.6.1
       libgstriff-1_0-0-1.12.5-150000.3.6.1
       libgstpbutils-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstrtsp-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstapp-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstfft-1_0-0-1.12.5-150000.3.6.1
       typelib-1_0-GstFft-1_0-1.12.5-150000.3.6.1
       libgstrtsp-1_0-0-1.12.5-150000.3.6.1
       libgstrtp-1_0-0-1.12.5-150000.3.6.1
       typelib-1_0-GstApp-1_0-1.12.5-150000.3.6.1
       libgstvideo-1_0-0-1.12.5-150000.3.6.1
  o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch)
       gstreamer-plugins-base-lang-1.12.5-150000.3.6.1
  o SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64)
       typelib-1_0-GstSdp-1_0-1.12.5-150000.3.6.1
       typelib-1_0-GstAllocators-1_0-1.12.5-150000.3.6.1
       libgstapp-1_0-0-1.12.5-150000.3.6.1
       libgstsdp-1_0-0-debuginfo-1.12.5-150000.3.6.1
       gstreamer-plugins-base-debuginfo-1.12.5-150000.3.6.1
       typelib-1_0-GstAudio-1_0-1.12.5-150000.3.6.1
       libgsttag-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstallocators-1_0-0-1.12.5-150000.3.6.1
       typelib-1_0-GstVideo-1_0-1.12.5-150000.3.6.1
       libgstfft-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstallocators-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstaudio-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstaudio-1_0-0-1.12.5-150000.3.6.1
       typelib-1_0-GstRtp-1_0-1.12.5-150000.3.6.1
       gstreamer-plugins-base-devel-1.12.5-150000.3.6.1
       libgstrtp-1_0-0-debuginfo-1.12.5-150000.3.6.1
       typelib-1_0-GstPbutils-1_0-1.12.5-150000.3.6.1
       typelib-1_0-GstTag-1_0-1.12.5-150000.3.6.1
       gstreamer-plugins-base-1.12.5-150000.3.6.1
       libgsttag-1_0-0-1.12.5-150000.3.6.1
       libgstriff-1_0-0-debuginfo-1.12.5-150000.3.6.1
       typelib-1_0-GstRtsp-1_0-1.12.5-150000.3.6.1
       libgstpbutils-1_0-0-1.12.5-150000.3.6.1
       libgstvideo-1_0-0-debuginfo-1.12.5-150000.3.6.1
       gstreamer-plugins-base-debugsource-1.12.5-150000.3.6.1
       libgstsdp-1_0-0-1.12.5-150000.3.6.1
       libgstriff-1_0-0-1.12.5-150000.3.6.1
       libgstpbutils-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstrtsp-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstapp-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstfft-1_0-0-1.12.5-150000.3.6.1
       typelib-1_0-GstFft-1_0-1.12.5-150000.3.6.1
       libgstrtsp-1_0-0-1.12.5-150000.3.6.1
       libgstrtp-1_0-0-1.12.5-150000.3.6.1
       typelib-1_0-GstApp-1_0-1.12.5-150000.3.6.1
       libgstvideo-1_0-0-1.12.5-150000.3.6.1
  o SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch)
       gstreamer-plugins-base-lang-1.12.5-150000.3.6.1
  o SUSE CaaS Platform 4.0 (x86_64)
       typelib-1_0-GstSdp-1_0-1.12.5-150000.3.6.1
       typelib-1_0-GstAllocators-1_0-1.12.5-150000.3.6.1
       libgstapp-1_0-0-1.12.5-150000.3.6.1
       libgstsdp-1_0-0-debuginfo-1.12.5-150000.3.6.1
       gstreamer-plugins-base-debuginfo-1.12.5-150000.3.6.1
       typelib-1_0-GstAudio-1_0-1.12.5-150000.3.6.1
       libgsttag-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstallocators-1_0-0-1.12.5-150000.3.6.1
       typelib-1_0-GstVideo-1_0-1.12.5-150000.3.6.1
       libgstfft-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstallocators-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstaudio-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstaudio-1_0-0-1.12.5-150000.3.6.1
       typelib-1_0-GstRtp-1_0-1.12.5-150000.3.6.1
       gstreamer-plugins-base-devel-1.12.5-150000.3.6.1
       libgstrtp-1_0-0-debuginfo-1.12.5-150000.3.6.1
       typelib-1_0-GstPbutils-1_0-1.12.5-150000.3.6.1
       typelib-1_0-GstTag-1_0-1.12.5-150000.3.6.1
       gstreamer-plugins-base-1.12.5-150000.3.6.1
       libgsttag-1_0-0-1.12.5-150000.3.6.1
       libgstriff-1_0-0-debuginfo-1.12.5-150000.3.6.1
       typelib-1_0-GstRtsp-1_0-1.12.5-150000.3.6.1
       libgstpbutils-1_0-0-1.12.5-150000.3.6.1
       libgstvideo-1_0-0-debuginfo-1.12.5-150000.3.6.1
       gstreamer-plugins-base-debugsource-1.12.5-150000.3.6.1
       libgstsdp-1_0-0-1.12.5-150000.3.6.1
       libgstriff-1_0-0-1.12.5-150000.3.6.1
       libgstpbutils-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstrtsp-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstapp-1_0-0-debuginfo-1.12.5-150000.3.6.1
       libgstfft-1_0-0-1.12.5-150000.3.6.1
       typelib-1_0-GstFft-1_0-1.12.5-150000.3.6.1
       libgstrtsp-1_0-0-1.12.5-150000.3.6.1
       libgstrtp-1_0-0-1.12.5-150000.3.6.1
       typelib-1_0-GstApp-1_0-1.12.5-150000.3.6.1
       libgstvideo-1_0-0-1.12.5-150000.3.6.1
  o SUSE CaaS Platform 4.0 (noarch)
       gstreamer-plugins-base-lang-1.12.5-150000.3.6.1

References:

  o https://www.suse.com/security/cve/CVE-2021-3522.html
  o https://www.suse.com/security/cve/CVE-2023-37327.html
  o https://www.suse.com/security/cve/CVE-2023-37328.html
  o https://bugzilla.suse.com/show_bug.cgiid=1185448
  o https://bugzilla.suse.com/show_bug.cgiid=1213128
  o https://bugzilla.suse.com/show_bug.cgiid=1213131

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=4GH6
-----END PGP SIGNATURE-----

ESB-2023.5556 - [SUSE] qemu: CVSS (Max): 8.2*

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5556
                         Security update for qemu
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           qemu
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-3354 CVE-2023-3180 CVE-2023-2861
                   CVE-2023-0330 CVE-2022-26354 CVE-2022-1050
                   CVE-2021-3929 CVE-2021-3750 CVE-2020-13754
                   CVE-2019-13754  

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2023/suse-su-20233800-1

Comment: CVSS (Max):  8.2* CVE-2023-3180 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
         * Not all CVSS available when published

- --------------------------BEGIN INCLUDED TEXT--------------------

Security update for qemu

Announcement ID:  SUSE-SU-2023:3800-1
     Rating:      important
                    o #1172382
                    o #1190011
                    o #1193880
                    o #1197653
                    o #1198712
   References:      o #1207205
                    o #1212850
                    o #1212968
                    o #1213925
                    o #1215311

                    o CVE-2019-13754
                    o CVE-2021-3750
                    o CVE-2021-3929
                    o CVE-2022-1050
Cross-References:   o CVE-2022-26354
                    o CVE-2023-0330
                    o CVE-2023-2861
                    o CVE-2023-3180
                    o CVE-2023-3354

                    o CVE-2019-13754 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/
                      S:U/C:N/I:L/A:N
                    o CVE-2021-3750 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/
                      S:C/C:H/I:H/A:H
                    o CVE-2021-3750 ( NVD ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/
                      S:C/C:H/I:H/A:H
                    o CVE-2021-3929 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/
                      S:C/C:H/I:H/A:H
                    o CVE-2021-3929 ( NVD ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/
                      S:C/C:H/I:H/A:H
                    o CVE-2022-1050 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/
                      S:C/C:H/I:H/A:H
                    o CVE-2022-1050 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:C/C:H/I:H/A:H
                    o CVE-2022-26354 ( SUSE ): 3.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N
                      /S:C/C:N/I:N/A:L
  CVSS scores:      o CVE-2022-26354 ( NVD ): 3.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/
                      S:C/C:N/I:N/A:L
                    o CVE-2023-0330 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/
                      S:C/C:N/I:N/A:H
                    o CVE-2023-0330 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/
                      S:C/C:N/I:N/A:H
                    o CVE-2023-2861 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/
                      S:C/C:H/I:H/A:H
                    o CVE-2023-3180 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/
                      S:C/C:H/I:H/A:H
                    o CVE-2023-3180 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/
                      S:C/C:N/I:N/A:H
                    o CVE-2023-3354 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/
                      S:U/C:N/I:N/A:H
                    o CVE-2023-3354 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/
                      S:U/C:N/I:N/A:H

                    o SUSE CaaS Platform 4.0
                    o SUSE Linux Enterprise High Performance Computing 15 SP1
    Affected        o SUSE Linux Enterprise High Performance Computing 15 SP1
    Products:         LTSS 15-SP1
                    o SUSE Linux Enterprise Server 15 SP1
                    o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
                    o SUSE Linux Enterprise Server for SAP Applications 15 SP1

An update that solves nine vulnerabilities and has one security fix can now be
installed.

Description:

This update for qemu fixes the following issues:

  o CVE-2022-26354: Fixed a memory leak due to a missing virtqueue detach on
    error. (bsc#1198712)
  o CVE-2021-3929: Fixed an use-after-free in nvme DMA reentrancy issue. (bsc#
    1193880)
  o CVE-2023-0330: Fixed a stack overflow due to a DMA reentrancy issue. (bsc#
    1207205)
  o CVE-2020-13754: Fixed a DoS due to an OOB access during mmio operations.
    (bsc#1172382)
  o CVE-2023-3354: Fixed a remote unauthenticated DoS due to an improper I/O
    watch removal in VNC TLS handshake. (bsc#1212850)
  o CVE-2023-3180: Fixed a heap buffer overflow in virtio_crypto_sym_op_helper
    (). (bsc#1213925)
  o CVE-2023-2861: Fixed improper access control on special files in 9pfs (bsc#
    1212968).
  o CVE-2022-1050: Fixed use-after-free issue in pvrdma_exec_cmd() (bsc#
    1197653).
  o CVE-2021-3750: Fixed DMA reentrancy issue leads to use-after-free in
    hcd-ehci (bsc#1190011).

The following non-security bug was fixed:

  o Prepare for binutils update to 2.41 update (bsc#1215311).

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE CaaS Platform 4.0
    To install this update, use the SUSE CaaS Platform 'skuba' tool. It will
    inform you if it detects new updates and let you then trigger updating of
    the complete cluster in a controlled way.
  o SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3800=1
  o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3800=1
  o SUSE Linux Enterprise Server for SAP Applications 15 SP1
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3800=1

Package List:

  o SUSE CaaS Platform 4.0 (x86_64)
       qemu-block-ssh-3.1.1.1-150100.80.51.5
       qemu-block-iscsi-debuginfo-3.1.1.1-150100.80.51.5
       qemu-ui-curses-3.1.1.1-150100.80.51.5
       qemu-ui-gtk-3.1.1.1-150100.80.51.5
       qemu-block-rbd-3.1.1.1-150100.80.51.5
       qemu-tools-3.1.1.1-150100.80.51.5
       qemu-audio-pa-3.1.1.1-150100.80.51.5
       qemu-debugsource-3.1.1.1-150100.80.51.5
       qemu-block-curl-3.1.1.1-150100.80.51.5
       qemu-audio-alsa-debuginfo-3.1.1.1-150100.80.51.5
       qemu-audio-oss-debuginfo-3.1.1.1-150100.80.51.5
       qemu-guest-agent-3.1.1.1-150100.80.51.5
       qemu-guest-agent-debuginfo-3.1.1.1-150100.80.51.5
       qemu-tools-debuginfo-3.1.1.1-150100.80.51.5
       qemu-audio-oss-3.1.1.1-150100.80.51.5
       qemu-x86-3.1.1.1-150100.80.51.5
       qemu-audio-pa-debuginfo-3.1.1.1-150100.80.51.5
       qemu-ui-curses-debuginfo-3.1.1.1-150100.80.51.5
       qemu-ui-gtk-debuginfo-3.1.1.1-150100.80.51.5
       qemu-block-iscsi-3.1.1.1-150100.80.51.5
       qemu-3.1.1.1-150100.80.51.5
       qemu-block-ssh-debuginfo-3.1.1.1-150100.80.51.5
       qemu-kvm-3.1.1.1-150100.80.51.5
       qemu-x86-debuginfo-3.1.1.1-150100.80.51.5
       qemu-block-rbd-debuginfo-3.1.1.1-150100.80.51.5
       qemu-lang-3.1.1.1-150100.80.51.5
       qemu-audio-alsa-3.1.1.1-150100.80.51.5
       qemu-block-curl-debuginfo-3.1.1.1-150100.80.51.5
       qemu-debuginfo-3.1.1.1-150100.80.51.5
  o SUSE CaaS Platform 4.0 (noarch)
       qemu-vgabios-1.12.0_0_ga698c89-150100.80.51.5
       qemu-sgabios-8-150100.80.51.5
       qemu-seabios-1.12.0_0_ga698c89-150100.80.51.5
       qemu-ipxe-1.0.0+-150100.80.51.5
  o SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
    (aarch64 x86_64)
       qemu-3.1.1.1-150100.80.51.5
       qemu-guest-agent-3.1.1.1-150100.80.51.5
       qemu-tools-3.1.1.1-150100.80.51.5
       qemu-block-ssh-debuginfo-3.1.1.1-150100.80.51.5
       qemu-block-ssh-3.1.1.1-150100.80.51.5
       qemu-debugsource-3.1.1.1-150100.80.51.5
       qemu-guest-agent-debuginfo-3.1.1.1-150100.80.51.5
       qemu-tools-debuginfo-3.1.1.1-150100.80.51.5
       qemu-block-iscsi-debuginfo-3.1.1.1-150100.80.51.5
       qemu-block-rbd-debuginfo-3.1.1.1-150100.80.51.5
       qemu-lang-3.1.1.1-150100.80.51.5
       qemu-block-curl-debuginfo-3.1.1.1-150100.80.51.5
       qemu-block-curl-3.1.1.1-150100.80.51.5
       qemu-block-rbd-3.1.1.1-150100.80.51.5
       qemu-block-iscsi-3.1.1.1-150100.80.51.5
       qemu-debuginfo-3.1.1.1-150100.80.51.5
  o SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
    (aarch64)
       qemu-arm-3.1.1.1-150100.80.51.5
       qemu-arm-debuginfo-3.1.1.1-150100.80.51.5
  o SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
    (noarch)
       qemu-seabios-1.12.0_0_ga698c89-150100.80.51.5
       qemu-sgabios-8-150100.80.51.5
       qemu-vgabios-1.12.0_0_ga698c89-150100.80.51.5
       qemu-ipxe-1.0.0+-150100.80.51.5
  o SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
    (x86_64)
       qemu-audio-pa-3.1.1.1-150100.80.51.5
       qemu-kvm-3.1.1.1-150100.80.51.5
       qemu-audio-oss-3.1.1.1-150100.80.51.5
       qemu-x86-3.1.1.1-150100.80.51.5
       qemu-x86-debuginfo-3.1.1.1-150100.80.51.5
       qemu-audio-alsa-3.1.1.1-150100.80.51.5
       qemu-audio-pa-debuginfo-3.1.1.1-150100.80.51.5
       qemu-ui-curses-3.1.1.1-150100.80.51.5
       qemu-audio-alsa-debuginfo-3.1.1.1-150100.80.51.5
       qemu-ui-curses-debuginfo-3.1.1.1-150100.80.51.5
       qemu-audio-oss-debuginfo-3.1.1.1-150100.80.51.5
       qemu-ui-gtk-3.1.1.1-150100.80.51.5
       qemu-ui-gtk-debuginfo-3.1.1.1-150100.80.51.5
  o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x
    x86_64)
       qemu-3.1.1.1-150100.80.51.5
       qemu-guest-agent-3.1.1.1-150100.80.51.5
       qemu-tools-3.1.1.1-150100.80.51.5
       qemu-block-ssh-debuginfo-3.1.1.1-150100.80.51.5
       qemu-block-ssh-3.1.1.1-150100.80.51.5
       qemu-debugsource-3.1.1.1-150100.80.51.5
       qemu-guest-agent-debuginfo-3.1.1.1-150100.80.51.5
       qemu-tools-debuginfo-3.1.1.1-150100.80.51.5
       qemu-block-iscsi-debuginfo-3.1.1.1-150100.80.51.5
       qemu-block-rbd-debuginfo-3.1.1.1-150100.80.51.5
       qemu-lang-3.1.1.1-150100.80.51.5
       qemu-block-curl-debuginfo-3.1.1.1-150100.80.51.5
       qemu-block-curl-3.1.1.1-150100.80.51.5
       qemu-block-rbd-3.1.1.1-150100.80.51.5
       qemu-block-iscsi-3.1.1.1-150100.80.51.5
       qemu-debuginfo-3.1.1.1-150100.80.51.5
  o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64)
       qemu-arm-3.1.1.1-150100.80.51.5
       qemu-arm-debuginfo-3.1.1.1-150100.80.51.5
  o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch)
       qemu-seabios-1.12.0_0_ga698c89-150100.80.51.5
       qemu-sgabios-8-150100.80.51.5
       qemu-vgabios-1.12.0_0_ga698c89-150100.80.51.5
       qemu-ipxe-1.0.0+-150100.80.51.5
  o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (ppc64le)
       qemu-ppc-3.1.1.1-150100.80.51.5
       qemu-ppc-debuginfo-3.1.1.1-150100.80.51.5
  o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (s390x x86_64)
       qemu-kvm-3.1.1.1-150100.80.51.5
  o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (s390x)
       qemu-s390-3.1.1.1-150100.80.51.5
       qemu-s390-debuginfo-3.1.1.1-150100.80.51.5
  o SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (x86_64)
       qemu-audio-pa-3.1.1.1-150100.80.51.5
       qemu-audio-oss-3.1.1.1-150100.80.51.5
       qemu-x86-3.1.1.1-150100.80.51.5
       qemu-x86-debuginfo-3.1.1.1-150100.80.51.5
       qemu-audio-alsa-3.1.1.1-150100.80.51.5
       qemu-audio-pa-debuginfo-3.1.1.1-150100.80.51.5
       qemu-ui-curses-3.1.1.1-150100.80.51.5
       qemu-audio-alsa-debuginfo-3.1.1.1-150100.80.51.5
       qemu-ui-curses-debuginfo-3.1.1.1-150100.80.51.5
       qemu-audio-oss-debuginfo-3.1.1.1-150100.80.51.5
       qemu-ui-gtk-3.1.1.1-150100.80.51.5
       qemu-ui-gtk-debuginfo-3.1.1.1-150100.80.51.5
  o SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64)
       qemu-3.1.1.1-150100.80.51.5
       qemu-guest-agent-3.1.1.1-150100.80.51.5
       qemu-tools-3.1.1.1-150100.80.51.5
       qemu-block-ssh-debuginfo-3.1.1.1-150100.80.51.5
       qemu-block-ssh-3.1.1.1-150100.80.51.5
       qemu-debugsource-3.1.1.1-150100.80.51.5
       qemu-guest-agent-debuginfo-3.1.1.1-150100.80.51.5
       qemu-tools-debuginfo-3.1.1.1-150100.80.51.5
       qemu-block-iscsi-debuginfo-3.1.1.1-150100.80.51.5
       qemu-block-rbd-debuginfo-3.1.1.1-150100.80.51.5
       qemu-lang-3.1.1.1-150100.80.51.5
       qemu-block-curl-debuginfo-3.1.1.1-150100.80.51.5
       qemu-block-curl-3.1.1.1-150100.80.51.5
       qemu-block-rbd-3.1.1.1-150100.80.51.5
       qemu-block-iscsi-3.1.1.1-150100.80.51.5
       qemu-debuginfo-3.1.1.1-150100.80.51.5
  o SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch)
       qemu-seabios-1.12.0_0_ga698c89-150100.80.51.5
       qemu-sgabios-8-150100.80.51.5
       qemu-vgabios-1.12.0_0_ga698c89-150100.80.51.5
       qemu-ipxe-1.0.0+-150100.80.51.5
  o SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le)
       qemu-ppc-3.1.1.1-150100.80.51.5
       qemu-ppc-debuginfo-3.1.1.1-150100.80.51.5
  o SUSE Linux Enterprise Server for SAP Applications 15 SP1 (x86_64)
       qemu-audio-pa-3.1.1.1-150100.80.51.5
       qemu-kvm-3.1.1.1-150100.80.51.5
       qemu-audio-oss-3.1.1.1-150100.80.51.5
       qemu-x86-3.1.1.1-150100.80.51.5
       qemu-x86-debuginfo-3.1.1.1-150100.80.51.5
       qemu-audio-alsa-3.1.1.1-150100.80.51.5
       qemu-audio-pa-debuginfo-3.1.1.1-150100.80.51.5
       qemu-ui-curses-3.1.1.1-150100.80.51.5
       qemu-audio-alsa-debuginfo-3.1.1.1-150100.80.51.5
       qemu-ui-curses-debuginfo-3.1.1.1-150100.80.51.5
       qemu-audio-oss-debuginfo-3.1.1.1-150100.80.51.5
       qemu-ui-gtk-3.1.1.1-150100.80.51.5
       qemu-ui-gtk-debuginfo-3.1.1.1-150100.80.51.5

References:

  o https://www.suse.com/security/cve/CVE-2019-13754.html
  o https://www.suse.com/security/cve/CVE-2021-3750.html
  o https://www.suse.com/security/cve/CVE-2021-3929.html
  o https://www.suse.com/security/cve/CVE-2022-1050.html
  o https://www.suse.com/security/cve/CVE-2022-26354.html
  o https://www.suse.com/security/cve/CVE-2023-0330.html
  o https://www.suse.com/security/cve/CVE-2023-2861.html
  o https://www.suse.com/security/cve/CVE-2023-3180.html
  o https://www.suse.com/security/cve/CVE-2023-3354.html
  o https://bugzilla.suse.com/show_bug.cgiid=1172382
  o https://bugzilla.suse.com/show_bug.cgiid=1190011
  o https://bugzilla.suse.com/show_bug.cgiid=1193880
  o https://bugzilla.suse.com/show_bug.cgiid=1197653
  o https://bugzilla.suse.com/show_bug.cgiid=1198712
  o https://bugzilla.suse.com/show_bug.cgiid=1207205
  o https://bugzilla.suse.com/show_bug.cgiid=1212850
  o https://bugzilla.suse.com/show_bug.cgiid=1212968
  o https://bugzilla.suse.com/show_bug.cgiid=1213925
  o https://bugzilla.suse.com/show_bug.cgiid=1215311

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=0ym6
-----END PGP SIGNATURE-----

ESB-2023.5555 - [SUSE] libpng15: CVSS (Max): 4.0

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5555
                       Security update for libpng15
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libpng15
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-12652  

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2023/suse-su-20233799-1

Comment: CVSS (Max):  4.0 CVE-2017-12652 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

- --------------------------BEGIN INCLUDED TEXT--------------------

Security update for libpng15

Announcement ID:  SUSE-SU-2023:3799-1
     Rating:      moderate
   References:      o #1141493

Cross-References:   o CVE-2017-12652

                    o CVE-2017-12652 ( SUSE ): 4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N
                      /S:U/C:N/I:N/A:L
                    o CVE-2017-12652 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/
  CVSS scores:        S:U/C:H/I:H/A:H
                    o CVE-2017-12652 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/
                      S:U/C:H/I:H/A:H

    Affected        o SUSE Linux Enterprise High Performance Computing 12 SP5
    Products:       o SUSE Linux Enterprise Server 12 SP5
                    o SUSE Linux Enterprise Server for SAP Applications 12 SP5

An update that solves one vulnerability can now be installed.

Description:

This update for libpng15 fixes the following issues:

Security issue fixed:

  o CVE-2017-12652: Fixed an Input Validation Error related to the length of
    chunks (bsc#1141493).

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise High Performance Computing 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3799=1
  o SUSE Linux Enterprise Server 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3799=1
  o SUSE Linux Enterprise Server for SAP Applications 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3799=1

Package List:

  o SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
       libpng15-15-1.5.22-10.4.1
       libpng15-15-debuginfo-1.5.22-10.4.1
       libpng15-debugsource-1.5.22-10.4.1
  o SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
       libpng15-15-1.5.22-10.4.1
       libpng15-15-debuginfo-1.5.22-10.4.1
       libpng15-debugsource-1.5.22-10.4.1
  o SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
       libpng15-15-1.5.22-10.4.1
       libpng15-15-debuginfo-1.5.22-10.4.1
       libpng15-debugsource-1.5.22-10.4.1

References:

  o https://www.suse.com/security/cve/CVE-2017-12652.html
  o https://bugzilla.suse.com/show_bug.cgiid=1141493

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=jGIE
-----END PGP SIGNATURE-----

ESB-2023.5554 - [Ubuntu] ReadyMedia: CVSS (Max): 9.8

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5554
                  USN-6398-1: ReadyMedia vulnerabilities
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           ReadyMedia
Publisher:         Ubuntu
Operating System:  Ubuntu
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-33476 CVE-2022-26505 

Original Bulletin: 
   https://ubuntu.com/security/notices/USN-6398-1

Comment: CVSS (Max):  9.8 CVE-2023-33476 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: NIST
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-6398-1: ReadyMedia vulnerabilities

27 September 2023

Several security issues were fixed in ReadyMedia.

Releases

  o Ubuntu 23.04
  o Ubuntu 22.04 LTS
  o Ubuntu 20.04 LTS
  o Ubuntu 18.04 ESM
  o Ubuntu 16.04 ESM

Packages

  o minidlna - lightweight DLNA/UPnP-AV server targeted at embedded systems

Details

It was discovered that ReadyMedia was vulnerable to DNS rebinding attacks.
A remote attacker could possibly use this issue to trick the local DLNA
server to leak information. This issue only affected Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. ( CVE-2022-26505 )

It was discovered that ReadyMedia incorrectly handled certain HTTP requests
using chunked transport encoding. A remote attacker could possibly use this
issue to cause buffer overflows, resulting in out-of-bounds reads and writes.
( CVE-2023-33476 )

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 23.04

  o minidlna - 1.3.0+dfsg-2.2ubuntu0.1

Ubuntu 22.04

  o minidlna - 1.3.0+dfsg-2.1ubuntu0.1

Ubuntu 20.04

  o minidlna - 1.2.1+dfsg-1ubuntu0.20.04.2

Ubuntu 18.04

  o minidlna - 1.2.1+dfsg-1ubuntu0.18.04.1+esm1
    Available with Ubuntu Pro

Ubuntu 16.04

  o minidlna - 1.1.5+dfsg-2ubuntu0.1+esm1
    Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References

  o CVE-2022-26505
  o CVE-2023-33476

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=2Xm4
-----END PGP SIGNATURE-----

ESB-2023.5553 - [Ubuntu] Puma: CVSS (Max): 9.8

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5553
                      USN-6399-1: Puma vulnerability
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Puma
Publisher:         Ubuntu
Operating System:  Ubuntu
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-40175  

Original Bulletin: 
   https://ubuntu.com/security/notices/USN-6399-1

Comment: CVSS (Max):  9.8 CVE-2023-40175 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: NIST
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-6399-1: Puma vulnerability

27 September 2023

Puma could allow HTTP Request Smuggling attacks.

Releases

  o Ubuntu 23.04

Packages

  o puma - threaded HTTP 1.1 server for Ruby/Rack applications

Details

It was discovered that Puma incorrectly handled parsing certain headers. A
remote attacker could possibly use this issue to perform an HTTP request
Smuggling attack.

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 23.04

  o puma - 5.6.5-3ubuntu1.1

In general, a standard system update will make all the necessary changes.

References

  o CVE-2023-40175

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/

iQIVAwUBZRUXLckNZI30y1K9AQizFA//Rkvajx3l2KG9G2AZSTmiC2ki0b5z6uLB
9YjDaHb2bRreDkZYDD8uDXqZe+UIG5KIge53Wa6G42u9iL2N0gONwn+Fk4FT7dcs
El9RsMLIo5LJtC35+z/MOyIQu/w5ibkyo+0iTlY6a14Ud6kL2FzfIYZqg3S71hNx
KrXoZF8einwRzTh9OmR28X089H02ZFcFmzMqsgz1fIBZC4yWRMMZpxrjceuvpWEx
Irj1GHp7GTCRyeJNevkyXh3CAuEXU/66zuHMmAr1UUUiqdHUZImme6OS9efUYyY6
H2DtM/KXdplnr4E5Fa9jlKutHSJZR2ldvH2LjH6u260PXRi34hvN8FPNQ9ilFbsA
vHM/2R+E0t+Kl85qj3lB6I7su6kbl4U50+WZ1aQbRbfS/k7Vb5NnkfrlTFnMl2rs
uFKVOkxtTlQ2y3jr6MC6ml+Z+SE+ERfOSx/90v01VMYNjTq3lV2cQAV43uE5YD9k
9bMb9Q+DxXRCxgV89YPlCdZ5G82Rmd6iLRC0EElU0hLoKCRtdFZrJ4ewfhdg3q7P
aiDAuorDAiGmnQvic+II3c3psN+gef7u1lgsQZxaFn2NmrnzI4zyvVO3nGIBcVJX
4HsBn5+WTxa8PH2QHAoccpS1U6hK/PJbkhg5MPvTdFypHcrnWViiEJxJs4hqlbeT
fBztgE5u3lE=
=41/E
-----END PGP SIGNATURE-----

ESB-2023.5552 - [Ubuntu] Python: CVSS (Max): 8.1

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5552
                     USN-6400-1: Python vulnerability
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Python
Publisher:         Ubuntu
Operating System:  Ubuntu
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-48566  

Original Bulletin: 
   https://ubuntu.com/security/notices/USN-6400-1

Comment: CVSS (Max):  8.1 CVE-2022-48566 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: NIST
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-6400-1: Python vulnerability

27 September 2023

Python could be made to expose sensitive information.

Releases

  o Ubuntu 18.04 ESM
  o Ubuntu 16.04 ESM

Packages

  o python2.7 - An interactive high-level object-oriented language
  o python3.5 - An interactive high-level object-oriented language

Details

It was discovered that Python did not properly provide constant-time
processing for a crypto operation. An attacker could possibly use this
issue to perform a timing attack and recover sensitive information.

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 18.04

  o libpython2.7 - 2.7.17-1~18.04ubuntu1.13+esm2
    Available with Ubuntu Pro
  o libpython2.7-minimal - 2.7.17-1~18.04ubuntu1.13+esm2
    Available with Ubuntu Pro
  o libpython2.7-stdlib - 2.7.17-1~18.04ubuntu1.13+esm2
    Available with Ubuntu Pro

Ubuntu 16.04

  o libpython2.7 - 2.7.12-1ubuntu0~16.04.18+esm7
    Available with Ubuntu Pro
  o libpython2.7-minimal - 2.7.12-1ubuntu0~16.04.18+esm7
    Available with Ubuntu Pro
  o libpython2.7-stdlib - 2.7.12-1ubuntu0~16.04.18+esm7
    Available with Ubuntu Pro
  o libpython3.5 - 3.5.2-2ubuntu0~16.04.13+esm11
    Available with Ubuntu Pro
  o libpython3.5-minimal - 3.5.2-2ubuntu0~16.04.13+esm11
    Available with Ubuntu Pro
  o libpython3.5-stdlib - 3.5.2-2ubuntu0~16.04.13+esm11
    Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References

  o CVE-2022-48566

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=/IwU
-----END PGP SIGNATURE-----

ESB-2023.5551 - [Cisco] Cisco Catalyst 9100 Access Points: CVSS (Max): 5.8

28 September 2023 at 02:00
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5551
     Cisco Catalyst 9100 Access Points Denial of Service Vulnerability
                             28 September 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Catalyst 9100 Access Points
Publisher:         Cisco Systems
Operating System:  Cisco
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-20176  

Original Bulletin: 
   https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-click-ap-dos-wdcXkvnQ

Comment: CVSS (Max):  5.8 CVE-2023-20176 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L)
         CVSS Source: Cisco Systems
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco Catalyst 9100 Access Points Denial of Service Vulnerability

Priority:        Medium
Advisory ID:     cisco-sa-click-ap-dos-wdcXkvnQ
First Published: 2023 September 27 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCwb56120
CVE Names:       CVE-2023-20176

Summary

  o A vulnerability in the networking component of Cisco access point (AP)
    software could allow an unauthenticated, remote attacker to cause a
    temporary disruption of service.

    This vulnerability is due to overuse of AP resources. An attacker could
    exploit this vulnerability by connecting to an AP on an affected device as
    a wireless client and sending a high rate of traffic over an extended
    period of time. A successful exploit could allow the attacker to cause the
    Datagram TLS (DTLS) session to tear down and reset, causing a denial of
    service (DoS) condition.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-click-ap-dos-wdcXkvnQ

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected the following Cisco
    products if they were running a vulnerable release of Cisco Catalyst 9800
    Wireless Controller Software:

       Catalyst 9124 APs
       Catalyst 9130 APs
       Catalyst 9136 APs
       Catalyst 9164 APs
       Catalyst 9166 APs

    For information about which Cisco software releases were vulnerable at the
    time of publication, see the Fixed Software section of this advisory. See
    the Details section in the bug ID(s) at the top of this advisory for the
    most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect any Cisco AP
    series that is not listed in the Vulnerable Products section of this
    advisory.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, the release information in the following table
    was accurate. See the Details section in the bug ID(s) at the top of this
    advisory for the most complete and current information.

    The left column lists Cisco software releases, and the right column
    indicates whether a release was affected by the vulnerability described in
    this advisory and which release included the fix for this vulnerability.

    The process to upgrade an AP requires administrators to upgrade the
    wireless controller to which the AP is registered. Customers are advised to
    upgrade to an appropriate fixed software release as indicated in the
    following table.

    Cisco Catalyst 9800 Wireless Controller Software   First Fixed Release
    Release
    16.12 and earlier                                  Migrate to a fixed
                                                       release.
    17.6                                               17.6.6
    17.7                                               Migrate to a fixed
                                                       release.
    17.8                                               Migrate to a fixed
                                                       release.
    17.9                                               Not vulnerable.

    The Cisco Product Security Incident Response Team (PSIRT) validates only
    the affected and fixed release information that is documented in this
    advisory.

Exploitation and Public Announcements

  o The Cisco PSIRT is not aware of any public announcements or malicious use
    of the vulnerability that is described in this advisory.

Source

  o This vulnerability was found during the resolution of a Cisco TAC support
    case.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

Related to This Advisory

  o 

URL

  o https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-click-ap-dos-wdcXkvnQ

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2023-SEP-27  |
    +----------+---------------------------+----------+--------+--------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/

iQIVAwUBZRUWIskNZI30y1K9AQh/XA//dz5InpSqa5o1SWj7LeRj0FCnoaTSsffu
ZwMSBTPkyPeZcCQ9xxdeIw3j1L2ff/VxDMS62nQLQKdjRtWvpctvJodvwU7BX3Zy
fsJkxNdF5pP29MSN98gJmp704TsSOmtxVYKT5XYvGfLCPF2VEYJHiKE+9ujW0scG
3h0+ZBbr+D79RDjX4b/NKr0Xn3ONmx1ZgeJyexSBb+pkxXGRB4UMmbvTwCciGnh/
ZOqDElMtIePPoy84WErQxholPYhmbs22qx7lDBkHrRpeo3gyDRfGYstUmZDQk4TQ
xvcqL5fLeMniOsIFnxCsScd4HVuBweV24IYcxugTf7Tbbon13ctFspL98zfAKd7x
/Ejyt22I4Q0c/hVtDaB3VwX2Dqd3SbnzXrBMCSRRHRkXuP2MqVNActpHgeI5KUAC
t3/Y9L9vYcZfD63qA4GtPsjW3PYHkJFmwHjx1hBkDia4OmUPNu2JubsnvksgudSq
QmhCBlfmxKaZ7zmYrQ7aj138OM7rOC/tD+JfGNM3t+mQqI6fdBnpMUhFVTSXqOTG
UZql6haH3xudFzzciUHtXPL9im3kUTDmy01dX8OuEQgFUksjVYBMLEagc0Z0fDhU
4nta9l4805MwnpoR0BAGRt14/YW8Spy+/xWFjRLkE6Ey1BRBVF+3WM4DLVT1dhF9
MEzctkBWZFQ=
=PZN5
-----END PGP SIGNATURE-----