Malware Devil

Tuesday, October 6, 2020

How Netflix Makes Security Decisions: A Peek Inside the Process

A senior information security risk engineer explains how Netflix’s risk management program helps businesses leaders make key decisions.

It’s difficult for risk managers to help decision-makers after a risky choice has been made. Unfortunately for many organizations, that’s how traditional risk management programs work — and by the time an assessment has been done, the risky decision has already done its damage.

“We all accept certain amounts of risk in order to engage in business, but at what point is risk too much?” asks Tony Martin-Vegue, senior information security risk engineer at Netflix, who discussed the topic at this week’s FAIR Conference.

In most companies, a risk management program covers any aspect of a business that takes on risk. Business leaders make a decision and implement it; the risk team then comes in, tests it, and reports issues. The first time a risk manager gets involved is when these problems are put on the risk register, at which point it’s too late to help the enterprise decision-makers, he says.

Risk analysis is forecasting, Martin-Vegue explains. Analysts should want to be closer to the CEO, CFO, CIO, and other executives before major decisions are made so they can help make the optimal choice. Netflix has long used quantitative models, including the FAIR model, to make decisions because it puts threats into context and helps explain risk to business execs.

Most companies use the traditional paradigm of rating decisions as high/medium/low or red/yellow/green, he says. While this works for comparing three or four similar items or prioritizing projects, it does little when a security analyst is faced with three red alerts costing $10 million, $15 million, and $20 million each. Which one should they remediate first?

“You don’t know,” Martin-Vegue says. “You can’t make that type of value-at-risk comparison.”

Quantitative risk, instead of saying an alert is “high” or “red,” will indicate how much exposure the business has. If you know one risk has $200 million in exposure, and you can buy that risk down to $20 million with a $10 million investment, it provides a distinct course of action. If a pen tester has two red alerts, and quantitative analysts reveals one has $10 million of exposure and the other has $50,000 of exposure, it’s obvious which should be remediated first, he notes.

“Now you can start to make comparisons using dollars [and] financial people will recognize this as a cost-benefit analysis,” he explains. “We’re moving out of information security and speaking to the CFO, the CEO, the CIO: ‘This is how much your investment can get you. This is how much risk you can buy down.'”

This resonates with executives who are accustomed to speaking in terms of dollars and cents. It’s easier to make a security focused-decision when they understand what an investment will get them, as opposed to making a choice based on a high-, medium-, or low-severity alert.

“It’s no wonder there’s always friction between the business and information security people,” says Martin-Vegue. “We’re making it hard for them.” By framing the risk conversation around exposure, investments, and buying down risk, “people immediately get it, especially on the business side.”

Making Big Decisions, from Executives to Practitioners
There are three different levels of risk abstraction that can be used to frame a security risk assessment, says Martin-Vegue, noting he loosely uses the National Institute of Standards and Technology (NIST) risk management framework. These include strategic, tactical, and operational decisions.

Tier one supports strategic decision making; this typically involves major investment decisions made about five years ahead of time. A few examples: How should executives frame a company strategy? Should they transition to the cloud? Should the business put its services in Amazon Web Services or do the hosting themselves? Should they do code development in-house or outsource it?

These are all nontrivial decisions, he says, and they’re typically made without a risk analyst who could explain the cost-benefit analysis and ROI analysis of major enterprise strategies.

Tier two supports tactical decision-making for midlevel managers who are considering their initiatives, budget, and head-count planning a year or two ahead of time. Those managers are asking questions such as “Do we employ server virtualization?” “What vendors should we use?” “Can we do a risk analysis on the vendor before we move to the vendor?”

Most organizations hear about a vendor security issue after they’ve already signed a contract, Martin-Vegue says. This should be on the risk register before the vendor partnership begins.

Tier three supports operational decision-making, which is for individual contributors and their teams. This may include security architects, pen testers, or developers on the business side who design customer-facing web apps. If a coder wants a security control and has a choice between password-only or passwords and multifactor authentication (MFA), which should they choose?

What may seem like an easy investment choice to security practitioners is tougher for business executives. Today’s organizations have tight purse strings, and implementing MFA is expensive. Quantitative risk requires security pros to use data to make a case and prove why an investment is worth it.

Operational decision-makers are faced with several choices that can be evaluated with quantitative risk analysis: How do we configure endpoint protection? How do we configure antivirus software? Should we use full disk encryption? How do we configure data loss prevention tools?

Quantitative Risk Modeling: Getting Started
For organizations that want to adopt the FAIR model or other quantitative risk models, Martin-Vegue advises starting slow. Risk analysts don’t need to rip out their current model and implement FAIR in a major overhaul. Start with a couple of decisions. Find someone in the organization trying to make a difficult, data-driven choice and help using the quantitative model.

His other tip is a word of caution: “There’s a big myth that we have to bust about quantitative risk — there’s a perception people have that you need to have perfect historical quantitative data in order to an assessment, and you don’t.” Martin-Vegue says risk professionals can use the subjective judgment of people within the organization to do a credible assessment.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post How Netflix Makes Security Decisions: A Peek Inside the Process appeared first on Malware Devil.



https://malwaredevil.com/2020/10/06/how-netflix-makes-security-decisions-a-peek-inside-the-process/?utm_source=rss&utm_medium=rss&utm_campaign=how-netflix-makes-security-decisions-a-peek-inside-the-process

UEM: Es tiempo de asegurar los navegadores de su empresa.

Al hablar de gestión unificada de endpoints (UEM – Unfied Endpoint Management), es usual que los administradores de TI piensen en computadoras, switches e incluso dispositivos móviles. Pero, ¿qué pasa con los navegadores? También son endpoints esenciales que necesitan …

The post UEM: Es tiempo de asegurar los navegadores de su empresa. appeared first on ManageEngine Blog.

The post UEM: Es tiempo de asegurar los navegadores de su empresa. appeared first on Security Boulevard.

Read More

The post UEM: Es tiempo de asegurar los navegadores de su empresa. appeared first on Malware Devil.



https://malwaredevil.com/2020/10/06/uem-es-tiempo-de-asegurar-los-navegadores-de-su-empresa/?utm_source=rss&utm_medium=rss&utm_campaign=uem-es-tiempo-de-asegurar-los-navegadores-de-su-empresa

New Research Finds Bugs in Every Anti-Malware Product Tested

Products from every vendor had issues that allowed attackers to elevate privileges on a system — if they already were on it.

A majority of security tools that organizations use to defend against malware attacks are themselves vulnerable to exploits that allow attackers to escalate privileges on a compromised system, a new CyberArk study has found.

CyberArk tested products from multiple major security vendors, including Kaspersky, Symantec, Trend Micro, McAfee, and Check Point Software Technologies, and says it found vulnerabilities in every single one.

The bugs CyberArk reported to the vendors, which have since patched them, include three in Kaspersky’s malware detection and removal products; two in McAfee’s portfolio; one each in products from Symantec, Fortinet, and CheckPoint; and five in products from Trend Micro. CyberArk also uncovered vulnerabilities in products from Microsoft, Avast, and Avira, among others.

With all of the vulnerabilities, an attacker would already need to have local access on a system in order to exploit them. Security researchers often don’t consider such bugs to be as critical as those that allow unauthenticated remote execution.

Eran Shimony, the researcher at CyberArk who discovered the flaws, says the vulnerabilities identified in the company’s research share the same root cause: incorrect use of system resources when an app is running in a privileged context. According to Shimony, all of the security products that CyberArk tested were vulnerable to DLL hijacking — a technique where attackers essentially load a malicious file into a privileged process.

“By doing that we were able to run code inside the DLLMain function, which is then executed immediately after loading the DLL, allowing for a code execution inside a privileged application,” he explains.

The second vulnerability involved a method to trick privileged applications into targeting a different file while doing a read, write, or delete operation, Shimony says.

“This allows us to alter the content of protected files, like those being used by the operating system,” he says.

The security researcher says two mistakes were apparent in every single product CyberArk tested. The first was the failure by the vendors to prevent the security apps — which almost always run in a privileged context on a system — to load DLLs from unsafe locations without verifying whether they were digitally signed.

“If the vendors change the way the application tries to load DLLs, either by using absolute paths or by enforcing digital signatures, the issue would not exist,” he says.

The second problem Shimony says he discovered was the sharing of resources between low- and high-privileged apps.

“If a low-privileged application accesses a resource — like a log file that a service accesses to perform write operations — then the service must execute the write operation in the context of the low-privileged application,” he says. Otherwise, a malicious user could exploit the issue to escalate privileges on the system.

Vendor Response
Two of the impacted vendors Dark Reading contacted say they addressed the issues CyberArk uncovered in their products.

A spokesman from Kaspersky on Tuesday described the vulnerabilities that CyberArk discovered as enabling local attacks — or exploits that are possible only after an attacker already has authenticated access to a system. Some of them also can be exploited only during the product installation stage, the company said.

Of the three vulnerabilities in its products, one (CVE-2020-25045) enables privilege escalation, another (CVE-2020-25044) lets an attacker delete the content of any file on the compromised system, and the third (CVE-2020-25043) would let an attacker delete entire files on any vulnerable system. The list of impacted Kaspersky products include versions of its VPN Secure Connection product prior to 5.0, Kaspersky Virus Removal Tool prior to 15.0.23.0, and Kaspersky Security Center prior to 12.

“We recommend that our users check the application version they are currently running and install the latest updates,” the Kaspersky spokesman said in a statement.

Jon Clay, director of global threat communications at Trend Micro, says his company patched the flaws back in December 2019.

“These vulnerabilities were given a medium severity rating,” Clay says, noting that access to the machine would be needed in order to drop the malicious DLL payload and escalate privileges. “Due to the need for direct access to a victim machine, these would not be easy to exploit.”

The bugs Shimony discovered were easily patchable and in some cases only required “a small touch-up in the code,” he adds.

“The best measure organizations can take is [to ensure they] have the latest updates installed and make sure every privileged program is fully patched,” Shimony says. “Attackers could use these techniques to escalate privileges, so it’s critical to ensure that all privileged accounts are properly secured.”

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post New Research Finds Bugs in Every Anti-Malware Product Tested appeared first on Malware Devil.



https://malwaredevil.com/2020/10/06/new-research-finds-bugs-in-every-anti-malware-product-tested/?utm_source=rss&utm_medium=rss&utm_campaign=new-research-finds-bugs-in-every-anti-malware-product-tested

Microsoft Domain Controller “ZeroLogon” and RCE Vulnerabilities Test

The post Microsoft Domain Controller “ZeroLogon” and RCE Vulnerabilities Test appeared first on Digital Defense, Inc..

The post Microsoft Domain Controller “ZeroLogon” and RCE Vulnerabilities Test appeared first on Security Boulevard.

Read More

The post Microsoft Domain Controller “ZeroLogon” and RCE Vulnerabilities Test appeared first on Malware Devil.



https://malwaredevil.com/2020/10/06/microsoft-domain-controller-zerologon-and-rce-vulnerabilities-test/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-domain-controller-zerologon-and-rce-vulnerabilities-test

Ransomware Attacks – SCW #46

How Security & Compliance fails and what to do about it.
Visit https://www.securityweekly.com/scw for all the latest episodes!
Show Notes: https://wiki.securityweekly.com/scw46

The post Ransomware Attacks – SCW #46 appeared first on Malware Devil.



https://malwaredevil.com/2020/10/06/ransomware-attacks-scw-46/?utm_source=rss&utm_medium=rss&utm_campaign=ransomware-attacks-scw-46

SCW’s First Anniversary/Recap – SCW #46

We’re going to look back on our favorite episodes of the first year, reflect on how we are doing, solicit feedback from listeners, look ahead to the future/coming year – what to expect.
Visit https://www.securityweekly.com/scw for all the latest episodes!
Show Notes: https://wiki.securityweekly.com/scw46

The post SCW’s First Anniversary/Recap – SCW #46 appeared first on Malware Devil.



https://malwaredevil.com/2020/10/06/scws-first-anniversary-recap-scw-46/?utm_source=rss&utm_medium=rss&utm_campaign=scws-first-anniversary-recap-scw-46

Targeting Trickbot, Static Kitten, & ‘Raccine’ Ransomware – SWN #71

This week, Dr. Doug talks John McAfee in trouble again, Tenda routers, Egregor, Someone is going after Trickbot, the OFAC may come after you for paying ransoms, Maxwell’s Demon, the second law of thermodynamics, and Jason Wood joins for Expert Commentary on Ransomware Victims That Pay Up Could Incur Steep Fines from Uncle Sam!
Visit https://www.securityweekly.com/swn for all the latest episodes!
Show Notes: https://securityweekly.com/swn71

The post Targeting Trickbot, Static Kitten, & ‘Raccine’ Ransomware – SWN #71 appeared first on Malware Devil.



https://malwaredevil.com/2020/10/06/targeting-trickbot-static-kitten-raccine-ransomware-swn-71/?utm_source=rss&utm_medium=rss&utm_campaign=targeting-trickbot-static-kitten-raccine-ransomware-swn-71

Grindr’s Bug Bounty Pledge Doesn’t Translate to Security

At SAS@Home, Luta Security CEO Katie Moussouris stressed that bug bounty programs aren’t a ‘silver bullet’ for security teams.
Read More

The post Grindr’s Bug Bounty Pledge Doesn’t Translate to Security appeared first on Malware Devil.



https://malwaredevil.com/2020/10/06/grindrs-bug-bounty-pledge-doesnt-translate-to-security/?utm_source=rss&utm_medium=rss&utm_campaign=grindrs-bug-bounty-pledge-doesnt-translate-to-security

Male Chastity Device Comes with Massive Security Flaws

Smart sex toy vulnerable to hacks, researchers say — which could expose users’ most sensitive bits (of data) to cybercriminals.
Read More

The post Male Chastity Device Comes with Massive Security Flaws appeared first on Malware Devil.



https://malwaredevil.com/2020/10/06/male-chastity-device-comes-with-massive-security-flaws/?utm_source=rss&utm_medium=rss&utm_campaign=male-chastity-device-comes-with-massive-security-flaws

Eliminate Blind Spots: Protect the Full Application Stack

If you lock your front door but leave a basement window open, that’s where the burglars will go. Similarly, placing a shiny new padlock on a front gate but forgetting to lock it doesn’t provide much of a deterrent. Protecting web applications in today’s cyber security environment poses a comparable challenge with multiple areas to […]

The post Eliminate Blind Spots: Protect the Full Application Stack appeared first on Virsec Systems.

The post Eliminate Blind Spots: Protect the Full Application Stack appeared first on Security Boulevard.

Read More

The post Eliminate Blind Spots: Protect the Full Application Stack appeared first on Malware Devil.



https://malwaredevil.com/2020/10/06/eliminate-blind-spots-protect-the-full-application-stack/?utm_source=rss&utm_medium=rss&utm_campaign=eliminate-blind-spots-protect-the-full-application-stack

Google Brings Password Protection to iOS, Android in Chrome 86

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon

Current Issue

imageSpecial Report: Computing’s New NormalThis special report examines how IT security organizations have adapted to the “new normal” of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
image

Flash Poll

How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world — and enterprise computing — on end. Here’s a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2020-4528
PUBLISHED: 2020-10-06

IBM MQ Appliance (IBM DataPower Gateway 10.0.0.0 and 2018.4.1.0 through 2018.4.1.12) could allow a local user, under special conditions, to obtain highly sensitive information from log files. IBM X-Force ID: 182658.

CVE-2019-4725
PUBLISHED: 2020-10-06

IBM Security Access Manager Appliance 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 172131.

CVE-2020-26582
PUBLISHED: 2020-10-06

D-Link DAP-1360U before 3.0.1 devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the IP JSON value for ping (aka res_config_action=3&res_config_id=18).

CVE-2020-25742
PUBLISHED: 2020-10-06

pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.

CVE-2020-25743
PUBLISHED: 2020-10-06

hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.

The post Google Brings Password Protection to iOS, Android in Chrome 86 appeared first on Malware Devil.



https://malwaredevil.com/2020/10/06/google-brings-password-protection-to-ios-android-in-chrome-86/?utm_source=rss&utm_medium=rss&utm_campaign=google-brings-password-protection-to-ios-android-in-chrome-86

Managed MDM Solution Brings Key Benefits to Enterprise Environments

A managed MDM solution brings the benefits of hiring another engineer on your staff. Learn how to implement one — and try JumpCloud Free.

The post Managed MDM Solution Brings Key Benefits to Enterprise Environments appeared first on JumpCloud.

The post Managed MDM Solution Brings Key Benefits to Enterprise Environments appeared first on Security Boulevard.

Read More

The post Managed MDM Solution Brings Key Benefits to Enterprise Environments appeared first on Malware Devil.



https://malwaredevil.com/2020/10/06/managed-mdm-solution-brings-key-benefits-to-enterprise-environments/?utm_source=rss&utm_medium=rss&utm_campaign=managed-mdm-solution-brings-key-benefits-to-enterprise-environments

ESB-2020.3452 – [Appliance] IBM Security Access Manager: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3452
Security Bulletin: Multiple Security Vulnerabilities fixed in IBM WebSphere
             Liberty as shipped in IBM Security Access Manager
                              6 October 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Security Access Manager
Publisher:         IBM
Operating System:  Network Appliance
Impact/Access:     Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
                   Reduced Security         -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-4720 CVE-2019-4305 CVE-2019-4304

Reference:         ESB-2020.2622
                   ESB-2020.2199

Original Bulletin: 
   https://www.ibm.com/support/pages/node/6343153

- --------------------------BEGIN INCLUDED TEXT--------------------

Multiple Security Vulnerabilities fixed in IBM WebSphere Liberty as shipped in
IBM Security Access Manager

Security Bulletin

Summary

IBM Security Access Manager has shipped fixes that were fixed in IBM Security
WebSphere Liberty.

Vulnerability Details

CVEID: CVE-2019-4304
DESCRIPTION: IBM WebSphere Application Server - Liberty could allow a remote
attacker to bypass security restrictions caused by improper session validation.
IBM X-Force ID: 160950.
CVSS Base score: 6.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
160950 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)

CVEID: CVE-2019-4305
DESCRIPTION: IBM WebSphere Application Server Liberty could allow a remote
attacker to obtain sensitive information caused by the improper setting of a
cookie. IBM X-Force ID: 160951.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
160951 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2019-4720
DESCRIPTION: IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is
vulnerable to a denial of service, caused by sending a specially-crafted
request. A remote attacker could exploit this vulnerability to cause the server
to consume all available memory. IBM X-Force ID: 172125.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
172125 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

+--------------------+----------+
|Affected Product(s) |Version(s)|
+--------------------+----------+
|ISAM                |9.0       |
+--------------------+----------+
|ISAM                |8.0       |
+--------------------+----------+

Remediation/Fixes

+---------------------------+-------+-------+-----------------------+
|Product Name               |VRMF   |APAR   |Remediation/First Fix  |
+---------------------------+-------+-------+-----------------------+
|IBM Security Access Manager|8.0.1  |IJ24609|8.0.1-ISS-WGA-FP0009   |
+---------------------------+-------+-------+-----------------------+
|IBM Security Access Manager|9.0.7.1|IJ24609|9.0.7.1-ISS-ISAM-IF0005|
+---------------------------+-------+-------+-----------------------+

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBX3vccuNLKJtyKPYoAQhnqBAAqhBJHZ5r1CnwsImqwKQkAGRJajlif2KH
0SZXQw2FcU6a6NQJq1c2cia9jJek5S7IknqjMs0za1Lups7sdrZIaLJ9RXjlrvB+
f1z/cCqd2OtAx5rOORjq8J/z2W0ZLSB7Q3M6SJcFUYUYK5vRgSJrxvqF5JYf9CtK
2oS8bxCSb1W80LpxXCeAgGSqsNqPD+SuG/YcBTIdqbk6qX9x1SNBGgo+r6rdOTs4
EpHBZiMmfJ6YfcziUvc0Qbz1fKKnoTQBPpv/9TkjIKc6mTAklcO9YIYMATcqiJTy
Cb5iR0hIXhB8wcbSnb8n7C6sl1sdoYUQ382rB6CAUKHgzRa2z9m3AB0Ux7KDuLEk
7yTpHN0wuVo0879jXmROZQzvK5HU8i4KpbbEqTLcJKlkq26//JdQLfkXajdteZdg
EUOisshydK9rhcjDKrmV+mLOOWPNm5Vwu+0IT20lr13bMVF4ZKjMKrXrLptcNP0Y
A0KCJcJAab9S51jfpKb5V4KQ4XnCZk33hXI0tnFMmKZ+M2PG5R9cJPbiOqqDB6jf
r0QXEZrTuUZ34NvXxuS0NGl2tI0xwk0FHVdjvE3AqBXai7LA4JPDMqRwKyrCbTv7
PxbNJOE7rLXj0X1YexCFMyeL+eC9dU/ZiWjDWQaNVN0Zu6YaDuehliKvru06/RwU
IjHSGM1sOxc=
=pvto
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3452 – [Appliance] IBM Security Access Manager: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2020/10/06/esb-2020-3452-appliance-ibm-security-access-manager-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3452-appliance-ibm-security-access-manager-multiple-vulnerabilities

ESB-2020.3450 – [RedHat] mariadb: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3450
rh-mariadb102-mariadb and rh-mariadb102-galera security and bug fix update
                              6 October 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           mariadb
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 7
                   Red Hat Enterprise Linux WS/Desktop 7
                   Red Hat Enterprise Linux Server 6
                   Red Hat Enterprise Linux WS/Desktop 6
Impact/Access:     Modify Arbitrary Files   -- Existing Account      
                   Denial of Service        -- Existing Account      
                   Access Confidential Data -- Remote/Unauthenticated
                   Unauthorised Access      -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-13249 CVE-2020-2922 CVE-2020-2814
                   CVE-2020-2812 CVE-2020-2780 CVE-2020-2760
                   CVE-2020-2752 CVE-2020-2574 CVE-2019-2974
                   CVE-2019-2938 CVE-2019-2805 CVE-2019-2758
                   CVE-2019-2740 CVE-2019-2739 CVE-2019-2737
                   CVE-2019-2628 CVE-2019-2627 CVE-2019-2614

Reference:         ASB-2020.0087
                   ESB-2020.3400
                   ESB-2020.3153
                   ESB-2019.4124

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2020:4174

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: rh-mariadb102-mariadb and rh-mariadb102-galera security and bug fix update
Advisory ID:       RHSA-2020:4174-01
Product:           Red Hat Software Collections
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:4174
Issue date:        2020-10-05
CVE Names:         CVE-2019-2614 CVE-2019-2627 CVE-2019-2628 
                   CVE-2019-2737 CVE-2019-2739 CVE-2019-2740 
                   CVE-2019-2758 CVE-2019-2805 CVE-2019-2938 
                   CVE-2019-2974 CVE-2020-2574 CVE-2020-2752 
                   CVE-2020-2760 CVE-2020-2780 CVE-2020-2812 
                   CVE-2020-2814 CVE-2020-2922 CVE-2020-13249 
=====================================================================

1. Summary:

An update for rh-mariadb102-mariadb and rh-mariadb102-galera is now
available for Red Hat Software Collections.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64

3. Description:

MariaDB is a multi-user, multi-threaded SQL database server. For all
practical purposes, MariaDB is binary-compatible with MySQL.

The following packages have been upgraded to a later upstream version:
rh-mariadb102-mariadb (10.2.33), rh-mariadb102-galera (25.3.29).
(BZ#1880319, BZ#1880328)

Security Fix(es):

* mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)
(CVE-2019-2614)

* mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr
2019) (CVE-2019-2627)

* mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628)

* mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019)
(CVE-2019-2737)

* mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul
2019) (CVE-2019-2739)

* mysql: Server: XML unspecified vulnerability (CPU Jul 2019)
(CVE-2019-2740)

* mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758)

* mysql: Server: Parser unspecified vulnerability (CPU Jul 2019)
(CVE-2019-2805)

* mysql: InnoDB unspecified vulnerability (CPU Oct 2019) (CVE-2019-2938)

* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019)
(CVE-2019-2974)

* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752)

* mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2760)

* mysql: Server: DML unspecified vulnerability (CPU Apr 2020)
(CVE-2020-2780)

* mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020)
(CVE-2020-2812)

* mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2814)

* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2922)

* mariadb-connector-c: Improper validation of content in a OK packet
received from server (CVE-2020-13249)

* mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the MariaDB server daemon (mysqld) will be
restarted automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1702969 - CVE-2019-2614 mysql: Server: Replication unspecified vulnerability (CPU Apr 2019)
1702976 - CVE-2019-2627 mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019)
1702977 - CVE-2019-2628 mysql: InnoDB unspecified vulnerability (CPU Apr 2019)
1731997 - CVE-2019-2737 mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019)
1731999 - CVE-2019-2739 mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)
1732000 - CVE-2019-2740 mysql: Server: XML unspecified vulnerability (CPU Jul 2019)
1732008 - CVE-2019-2758 mysql: InnoDB unspecified vulnerability (CPU Jul 2019)
1732025 - CVE-2019-2805 mysql: Server: Parser unspecified vulnerability (CPU Jul 2019)
1764680 - CVE-2019-2938 mysql: InnoDB unspecified vulnerability (CPU Oct 2019)
1764691 - CVE-2019-2974 mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019)
1798587 - CVE-2020-2574 mysql: C API unspecified vulnerability (CPU Jan 2020)
1830056 - CVE-2020-2780 mysql: Server: DML unspecified vulnerability (CPU Apr 2020)
1830059 - CVE-2020-2812 mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020)
1830060 - CVE-2020-2814 mysql: InnoDB unspecified vulnerability (CPU Apr 2020)
1830082 - CVE-2020-2760 mysql: InnoDB unspecified vulnerability (CPU Apr 2020)
1835849 - CVE-2020-2752 mysql: C API unspecified vulnerability (CPU Apr 2020)
1835850 - CVE-2020-2922 mysql: C API unspecified vulnerability (CPU Apr 2020)
1839827 - CVE-2020-13249 mariadb-connector-c: Improper validation of content in a OK packet received from server
1880319 - Tracker: MariaDB rebase to the latest version (10.2.33)
1880328 - Update Galera to the appropriate version (25.3.29)

6. Package List:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):

Source:
rh-mariadb102-galera-25.3.29-1.el6.src.rpm
rh-mariadb102-mariadb-10.2.33-1.el6.src.rpm

x86_64:
rh-mariadb102-galera-25.3.29-1.el6.x86_64.rpm
rh-mariadb102-galera-debuginfo-25.3.29-1.el6.x86_64.rpm
rh-mariadb102-mariadb-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-backup-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-backup-syspaths-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-bench-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-common-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-config-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-config-syspaths-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-debuginfo-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-devel-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-errmsg-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-gssapi-client-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-gssapi-server-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-oqgraph-engine-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-server-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-server-galera-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-server-galera-syspaths-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-server-syspaths-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-server-utils-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-server-utils-syspaths-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-syspaths-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-test-10.2.33-1.el6.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):

Source:
rh-mariadb102-galera-25.3.29-1.el6.src.rpm
rh-mariadb102-mariadb-10.2.33-1.el6.src.rpm

x86_64:
rh-mariadb102-galera-25.3.29-1.el6.x86_64.rpm
rh-mariadb102-galera-debuginfo-25.3.29-1.el6.x86_64.rpm
rh-mariadb102-mariadb-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-backup-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-backup-syspaths-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-bench-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-common-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-config-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-config-syspaths-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-debuginfo-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-devel-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-errmsg-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-gssapi-client-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-gssapi-server-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-oqgraph-engine-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-server-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-server-galera-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-server-galera-syspaths-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-server-syspaths-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-server-utils-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-server-utils-syspaths-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-syspaths-10.2.33-1.el6.x86_64.rpm
rh-mariadb102-mariadb-test-10.2.33-1.el6.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source:
rh-mariadb102-galera-25.3.29-1.el7.src.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.src.rpm

aarch64:
rh-mariadb102-galera-25.3.29-1.el7.aarch64.rpm
rh-mariadb102-galera-debuginfo-25.3.29-1.el7.aarch64.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-backup-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-backup-syspaths-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-bench-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-common-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-config-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-config-syspaths-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-debuginfo-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-devel-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-errmsg-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-gssapi-client-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-gssapi-server-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-oqgraph-engine-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-server-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-server-galera-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-server-galera-syspaths-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-server-syspaths-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-server-utils-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-server-utils-syspaths-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-syspaths-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-test-10.2.33-1.el7.aarch64.rpm

ppc64le:
rh-mariadb102-galera-25.3.29-1.el7.ppc64le.rpm
rh-mariadb102-galera-debuginfo-25.3.29-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-backup-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-backup-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-bench-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-common-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-config-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-config-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-debuginfo-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-devel-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-errmsg-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-gssapi-client-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-gssapi-server-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-oqgraph-engine-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-galera-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-galera-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-utils-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-utils-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-test-10.2.33-1.el7.ppc64le.rpm

s390x:
rh-mariadb102-galera-25.3.29-1.el7.s390x.rpm
rh-mariadb102-galera-debuginfo-25.3.29-1.el7.s390x.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-backup-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-backup-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-bench-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-common-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-config-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-config-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-debuginfo-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-devel-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-errmsg-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-gssapi-client-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-gssapi-server-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-oqgraph-engine-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-galera-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-galera-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-utils-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-utils-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-test-10.2.33-1.el7.s390x.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source:
rh-mariadb102-galera-25.3.29-1.el7.src.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.src.rpm

aarch64:
rh-mariadb102-galera-25.3.29-1.el7.aarch64.rpm
rh-mariadb102-galera-debuginfo-25.3.29-1.el7.aarch64.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-backup-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-backup-syspaths-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-bench-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-common-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-config-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-config-syspaths-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-debuginfo-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-devel-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-errmsg-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-gssapi-client-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-gssapi-server-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-oqgraph-engine-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-server-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-server-galera-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-server-galera-syspaths-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-server-syspaths-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-server-utils-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-server-utils-syspaths-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-syspaths-10.2.33-1.el7.aarch64.rpm
rh-mariadb102-mariadb-test-10.2.33-1.el7.aarch64.rpm

ppc64le:
rh-mariadb102-galera-25.3.29-1.el7.ppc64le.rpm
rh-mariadb102-galera-debuginfo-25.3.29-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-backup-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-backup-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-bench-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-common-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-config-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-config-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-debuginfo-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-devel-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-errmsg-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-gssapi-client-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-gssapi-server-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-oqgraph-engine-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-galera-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-galera-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-utils-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-utils-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-test-10.2.33-1.el7.ppc64le.rpm

s390x:
rh-mariadb102-galera-25.3.29-1.el7.s390x.rpm
rh-mariadb102-galera-debuginfo-25.3.29-1.el7.s390x.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-backup-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-backup-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-bench-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-common-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-config-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-config-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-debuginfo-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-devel-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-errmsg-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-gssapi-client-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-gssapi-server-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-oqgraph-engine-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-galera-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-galera-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-utils-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-utils-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-test-10.2.33-1.el7.s390x.rpm

x86_64:
rh-mariadb102-galera-25.3.29-1.el7.x86_64.rpm
rh-mariadb102-galera-debuginfo-25.3.29-1.el7.x86_64.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-backup-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-backup-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-bench-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-common-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-config-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-config-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-debuginfo-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-devel-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-errmsg-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-gssapi-client-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-gssapi-server-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-oqgraph-engine-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-galera-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-galera-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-utils-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-utils-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-test-10.2.33-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):

Source:
rh-mariadb102-galera-25.3.29-1.el7.src.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.src.rpm

ppc64le:
rh-mariadb102-galera-25.3.29-1.el7.ppc64le.rpm
rh-mariadb102-galera-debuginfo-25.3.29-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-backup-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-backup-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-bench-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-common-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-config-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-config-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-debuginfo-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-devel-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-errmsg-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-gssapi-client-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-gssapi-server-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-oqgraph-engine-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-galera-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-galera-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-utils-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-utils-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-test-10.2.33-1.el7.ppc64le.rpm

s390x:
rh-mariadb102-galera-25.3.29-1.el7.s390x.rpm
rh-mariadb102-galera-debuginfo-25.3.29-1.el7.s390x.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-backup-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-backup-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-bench-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-common-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-config-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-config-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-debuginfo-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-devel-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-errmsg-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-gssapi-client-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-gssapi-server-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-oqgraph-engine-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-galera-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-galera-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-utils-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-utils-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-test-10.2.33-1.el7.s390x.rpm

x86_64:
rh-mariadb102-galera-25.3.29-1.el7.x86_64.rpm
rh-mariadb102-galera-debuginfo-25.3.29-1.el7.x86_64.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-backup-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-backup-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-bench-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-common-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-config-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-config-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-debuginfo-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-devel-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-errmsg-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-gssapi-client-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-gssapi-server-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-oqgraph-engine-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-galera-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-galera-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-utils-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-utils-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-test-10.2.33-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7):

Source:
rh-mariadb102-galera-25.3.29-1.el7.src.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.src.rpm

ppc64le:
rh-mariadb102-galera-25.3.29-1.el7.ppc64le.rpm
rh-mariadb102-galera-debuginfo-25.3.29-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-backup-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-backup-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-bench-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-common-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-config-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-config-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-debuginfo-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-devel-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-errmsg-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-gssapi-client-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-gssapi-server-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-oqgraph-engine-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-galera-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-galera-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-utils-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-server-utils-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-syspaths-10.2.33-1.el7.ppc64le.rpm
rh-mariadb102-mariadb-test-10.2.33-1.el7.ppc64le.rpm

s390x:
rh-mariadb102-galera-25.3.29-1.el7.s390x.rpm
rh-mariadb102-galera-debuginfo-25.3.29-1.el7.s390x.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-backup-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-backup-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-bench-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-common-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-config-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-config-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-debuginfo-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-devel-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-errmsg-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-gssapi-client-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-gssapi-server-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-oqgraph-engine-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-galera-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-galera-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-utils-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-server-utils-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-syspaths-10.2.33-1.el7.s390x.rpm
rh-mariadb102-mariadb-test-10.2.33-1.el7.s390x.rpm

x86_64:
rh-mariadb102-galera-25.3.29-1.el7.x86_64.rpm
rh-mariadb102-galera-debuginfo-25.3.29-1.el7.x86_64.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-backup-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-backup-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-bench-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-common-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-config-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-config-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-debuginfo-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-devel-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-errmsg-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-gssapi-client-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-gssapi-server-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-oqgraph-engine-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-galera-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-galera-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-utils-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-utils-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-test-10.2.33-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):

Source:
rh-mariadb102-galera-25.3.29-1.el7.src.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.src.rpm

x86_64:
rh-mariadb102-galera-25.3.29-1.el7.x86_64.rpm
rh-mariadb102-galera-debuginfo-25.3.29-1.el7.x86_64.rpm
rh-mariadb102-mariadb-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-backup-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-backup-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-bench-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-common-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-config-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-config-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-debuginfo-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-devel-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-errmsg-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-gssapi-client-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-gssapi-server-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-oqgraph-engine-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-galera-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-galera-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-utils-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-server-utils-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-syspaths-10.2.33-1.el7.x86_64.rpm
rh-mariadb102-mariadb-test-10.2.33-1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-2614
https://access.redhat.com/security/cve/CVE-2019-2627
https://access.redhat.com/security/cve/CVE-2019-2628
https://access.redhat.com/security/cve/CVE-2019-2737
https://access.redhat.com/security/cve/CVE-2019-2739
https://access.redhat.com/security/cve/CVE-2019-2740
https://access.redhat.com/security/cve/CVE-2019-2758
https://access.redhat.com/security/cve/CVE-2019-2805
https://access.redhat.com/security/cve/CVE-2019-2938
https://access.redhat.com/security/cve/CVE-2019-2974
https://access.redhat.com/security/cve/CVE-2020-2574
https://access.redhat.com/security/cve/CVE-2020-2752
https://access.redhat.com/security/cve/CVE-2020-2760
https://access.redhat.com/security/cve/CVE-2020-2780
https://access.redhat.com/security/cve/CVE-2020-2812
https://access.redhat.com/security/cve/CVE-2020-2814
https://access.redhat.com/security/cve/CVE-2020-2922
https://access.redhat.com/security/cve/CVE-2020-13249
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=ogLs
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=q0uO
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3450 – [RedHat] mariadb: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2020/10/06/esb-2020-3450-redhat-mariadb-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3450-redhat-mariadb-multiple-vulnerabilities

ESB-2020.3449 – [Linux][RedHat] rh-maven35-jackson-databind: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3449
                rh-maven35-jackson-databind security update
                              6 October 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           rh-maven35-jackson-databind
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 7
                   Red Hat Enterprise Linux WS/Desktop 7
                   Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-24750  

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2020:4173

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Red Hat. It is recommended that administrators
         running rh-maven35-jackson-databind check for an updated version of
         the software for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: rh-maven35-jackson-databind security update
Advisory ID:       RHSA-2020:4173-01
Product:           Red Hat Software Collections
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:4173
Issue date:        2020-10-05
CVE Names:         CVE-2020-24750 
=====================================================================

1. Summary:

An update for rh-maven35-jackson-databind is now available for Red Hat
Software Collections.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7) - noarch
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch

3. Description:

The jackson-databind package provides general data-binding functionality
for Jackson, which works on top of Jackson core streaming API.

Security Fix(es):

* jackson-databind: Serialization gadgets in
com.pastdev.httpcomponents.configuration.JndiConfiguration (CVE-2020-24750)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1882310 - CVE-2020-24750 jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration

6. Package List:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source:
rh-maven35-jackson-databind-2.7.6-2.11.el7.src.rpm

noarch:
rh-maven35-jackson-databind-2.7.6-2.11.el7.noarch.rpm
rh-maven35-jackson-databind-javadoc-2.7.6-2.11.el7.noarch.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source:
rh-maven35-jackson-databind-2.7.6-2.11.el7.src.rpm

noarch:
rh-maven35-jackson-databind-2.7.6-2.11.el7.noarch.rpm
rh-maven35-jackson-databind-javadoc-2.7.6-2.11.el7.noarch.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):

Source:
rh-maven35-jackson-databind-2.7.6-2.11.el7.src.rpm

noarch:
rh-maven35-jackson-databind-2.7.6-2.11.el7.noarch.rpm
rh-maven35-jackson-databind-javadoc-2.7.6-2.11.el7.noarch.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7):

Source:
rh-maven35-jackson-databind-2.7.6-2.11.el7.src.rpm

noarch:
rh-maven35-jackson-databind-2.7.6-2.11.el7.noarch.rpm
rh-maven35-jackson-databind-javadoc-2.7.6-2.11.el7.noarch.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):

Source:
rh-maven35-jackson-databind-2.7.6-2.11.el7.src.rpm

noarch:
rh-maven35-jackson-databind-2.7.6-2.11.el7.noarch.rpm
rh-maven35-jackson-databind-javadoc-2.7.6-2.11.el7.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-24750
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=jbsa
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=SW5u
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3449 – [Linux][RedHat] rh-maven35-jackson-databind: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2020/10/06/esb-2020-3449-linuxredhat-rh-maven35-jackson-databind-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3449-linuxredhat-rh-maven35-jackson-databind-multiple-vulnerabilities

ESB-2020.3448 – [RedHat] Red Hat Virtualization: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3448
     Red Hat Virtualization security, bug fix, and enhancement update
                              6 October 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat Virtualization
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 8
                   Red Hat Enterprise Linux WS/Desktop 8
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Denial of Service               -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-14364 CVE-2020-10713 

Reference:         ESB-2020.3407

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2020:4172

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat Virtualization security, bug fix, and enhancement update
Advisory ID:       RHSA-2020:4172-01
Product:           Red Hat Virtualization
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:4172
Issue date:        2020-10-05
CVE Names:         CVE-2020-10713 CVE-2020-14364 
=====================================================================

1. Summary:

An update for cockpit-ovirt, imgbased, redhat-release-virtualization-host,
and redhat-virtualization-host is now available for Red Hat Virtualization
4 for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHEL 8-based RHEV-H for RHEV 4 (build requirements) - noarch, x86_64
Red Hat Virtualization 4 Hypervisor for RHEL 8 - noarch
Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts - noarch

3. Description:

The redhat-virtualization-host packages provide the Red Hat Virtualization
Host. These packages include redhat-release-virtualization-host,
ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are
installed using a special build of Red Hat Enterprise Linux with only the
packages required to host virtual machines. RHVH features a Cockpit user
interface for monitoring the host's resources and performing administrative
tasks. 

The ovirt-node-ng packages provide the Red Hat Virtualization Host. These
packages include redhat-release-virtualization-host, ovirt-node, and
rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a
special build of Red Hat Enterprise Linux with only the packages required
to host virtual machines. RHVH features a Cockpit user interface for
monitoring the host's resources and performing administrative tasks.

The following packages have been upgraded to a later upstream version:
cockpit-ovirt (0.14.11), imgbased (1.2.12),
redhat-release-virtualization-host (4.4.2), redhat-virtualization-host
(4.4.2). (BZ#1875362, BZ#1878045)

Security Fix(es):

* grub2: Crafted grub.cfg file can lead to arbitrary code execution during
boot process (CVE-2020-10713)

* QEMU: usb: out-of-bounds r/w access issue while processing usb packets
(CVE-2020-14364)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1805589 - grub2-mkconfig produces incorrect config if host installed over iSCSI
1825243 - CVE-2020-10713 grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process
1847547 - SSH connection disabled during ISO installation
1852721 - Installation of node will not quit when mountpoint has existing domain (VMs)
1859876 - imgbase check failed after register to engine
1868312 - Rebase RHV-H 4.4.2 on Ansible 2.9.12
1869201 - CVE-2020-14364 QEMU: usb: out-of-bounds r/w access issue while processing usb packets
1873049 - Require tested ansible-2.9.13 for ovirt-hosted-engine-setup in RHV Manager 4.4.2
1875362 - Upgrade cockpit-ovirt to 0.14.11

6. Package List:

Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts:

Source:
cockpit-ovirt-0.14.11-1.el8ev.src.rpm

noarch:
cockpit-ovirt-dashboard-0.14.11-1.el8ev.noarch.rpm

Red Hat Virtualization 4 Hypervisor for RHEL 8:

Source:
redhat-virtualization-host-4.4.2-20200930.0.el8_2.src.rpm

noarch:
redhat-virtualization-host-image-update-4.4.2-20200930.0.el8_2.noarch.rpm

RHEL 8-based RHEV-H for RHEV 4 (build requirements):

Source:
imgbased-1.2.12-0.1.el8ev.src.rpm
redhat-release-virtualization-host-4.4.2-1.el8ev.src.rpm

noarch:
imgbased-1.2.12-0.1.el8ev.noarch.rpm
python3-imgbased-1.2.12-0.1.el8ev.noarch.rpm
redhat-virtualization-host-image-update-placeholder-4.4.2-1.el8ev.noarch.rpm

x86_64:
redhat-release-virtualization-host-4.4.2-1.el8ev.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-10713
https://access.redhat.com/security/cve/CVE-2020-14364
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/grub2bootloader

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=MRJ+
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=qPE+
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3448 – [RedHat] Red Hat Virtualization: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2020/10/06/esb-2020-3448-redhat-red-hat-virtualization-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3448-redhat-red-hat-virtualization-multiple-vulnerabilities

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...