Malware Devil

Tuesday, January 19, 2021

ESB-2021.0177.2 – UPDATE [Juniper] Junos OS: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2021.0177.2
       JSA11094 and JSA11114 - 2021-01 Security Bulletins: Junos OS
                              19 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Junos OS
Publisher:         Juniper Networks
Operating System:  Juniper
Impact/Access:     Root Compromise                 -- Existing Account      
                   Execute Arbitrary Code/Commands -- Existing Account      
                   Denial of Service               -- Remote/Unauthenticated
                   Access Confidential Data        -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-0223 CVE-2021-0222 CVE-2021-0204

Original Bulletin: 
   http://kb.juniper.net/InfoCenter/index?page=content&id=JSA11094
   http://kb.juniper.net/InfoCenter/index?page=content&id=JSA11114

Revision History:  January 19 2021: Vendor issues minor update
                   January 15 2021: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

2021-01 Security Bulletin: Junos OS: Upon receipt of certain protocol packets with invalid payloads a self-propagating Denial of Service may occur. (CVE-2021-0222)

Article ID  : JSA11094
Last Updated: 18 Jan 2021
Version     : 3.0

Product Affected:
This issue affects Junos OS 14.1X53, 15.1, 16.1, 17.1, 17.2, 17.3, 17.4, 18.1,
18.2, 18.3, 18.4, 19.1, 19.2, 19.3. Affected platforms: EX2300, EX3400, EX4300,
EX4600, EX4650, QFX3500, QFX5100, QFX5110, QFX5120, QFX5200, QFX5210.
Problem:

A vulnerability in Juniper Networks Junos OS allows an attacker to cause a
Denial of Service (DoS) to the device by sending certain crafted protocol
packets from an adjacent device with invalid payloads to the device.

These crafted packets, which should be discarded, are instead replicated and
sent to the RE. Over time, a Denial of Service (DoS) occurs. Continued receipt
of these crafted protocol packets will cause an extended Denial of Service
(DoS) condition, which may cause wider traffic impact due to protocol flapping.

An indication of compromise is to check "monitor interface traffic" on the
ingress and egress port packet counts. For each ingress packet, two duplicate
packets are seen on egress.

This issue can be triggered by IPv4 and IPv6 packets.

This issue affects all traffic through the device.

This issue affects:

Juniper Networks Junos OS:

  o 14.1X53 versions prior to 14.1X53-D53 on EX4300, QFX3500, QFX5100, EX4600;
  o 15.1 versions prior to 15.1R7-S6 on EX4300, QFX3500, QFX5100, EX4600;
  o 16.1 versions prior to 16.1R7-S7 on EX4300, QFX5100, EX4600;
  o 17.1 versions prior to 17.1R2-S11 on EX4300, QFX5100, EX4600;
  o 17.1 versions prior to 17.1R3-S2 on EX4300;
  o 17.2 versions prior to 17.2R1-S9 on EX4300;
  o 17.2 versions prior to 17.2R3-S3 on EX4300, QFX5100, EX4600, QFX5110,
    QFX5200;
  o 17.3 versions prior to 17.3R2-S5, 17.3R3-S7 on EX4300, QFX5100, EX4600,
    QFX5110, QFX5200;
  o 17.4 versions prior to 17.4R2-S9, 17.4R3 on EX4300, QFX5100, EX4600,
    QFX5110, QFX5200;
  o 18.1 versions prior to 18.1R3-S9 on EX4300, QFX5100, EX4600, QFX5110,
    QFX5200, QFX5210, EX2300, EX3400;
  o 18.2 versions prior to 18.2R2-S7 on EX4300;
  o 18.2 versions prior to 18.2R3-S3 on EX4300, QFX5100, EX4600, QFX5110,
    QFX5200, QFX5210, EX2300, EX3400;
  o 18.3 versions prior to 18.3R2-S3, on EX4300;
  o 18.3 versions prior to 18.3R1-S7, 18.3R3-S1 on EX4300, QFX5100, EX4600,
    QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400;
  o 18.4 versions prior to 18.4R1-S5, 18.4R2-S3, 18.4R3 on EX4300, QFX5100,
    EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400;
  o 19.1 versions prior to 19.1R1-S4, 19.1R2-S1, 19.1R3 on EX4300, QFX5100,
    EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400;
  o 19.2 versions prior to 19.2R1-S4, 19.2R2 on EX4300;
  o 19.2 versions prior to 19.2R1-S3, 19.2R2 on QFX5100, EX4600, QFX5110,
    QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400;
  o 19.3 versions prior to 19.3R2-S1, 19.3R3 on EX4300;
  o 19.3 versions prior to 19.3R1-S1, 19.3R2, 19.3R3 on QFX5100, EX4600,
    QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400;

This issue was seen during production usage.

This issue has been assigned CVE-2021-0222 .

Solution:

The following software releases have been updated to resolve this specific
issue: 14.1X53-D53, 15.1R7-S6, 16.1R7-S7, 17.1R2-S11, 17.2R3-S3, 17.3R2-S5,
17.3R3-S7, 17.4R2-S9, 17.4R3, 18.1R3-S9, 18.2R3-S3, 18.4R1-S5, 18.4R2-S3,
18.4R3, 19.1R1-S4, 19.1R2-S1, 19.1R3, 19.2R2, 19.3R2-S1, 19.3R3, 19.4R1, and
all subsequent releases.

This issue is being tracked as 1472704 and 1471922 .

Workaround:
There are no available workarounds for this issue.
Implementation:
Software releases or updates are available for download at https://
www.juniper.net/support/downloads/ .
Modification History:
2021-01-13: Initial Publication.
2021-01-18: Additional letter 1 from 117 to 17 removed from version list.
CVSS Score:
7.4 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)
Severity Level:
High
Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common
Vulnerability Scoring System (CVSS) and Juniper's Security Advisories."


- --------------------------------------------------------------------------------

2021-01 Security Bulletin: Junos OS: Multiple Local Privilege Escalation vulnerabilities in SUID binaries

Article ID  : JSA11114
Last Updated: 14 Jan 2021
Version     : 3.0

Product Affected:
This issue affects all versions of Junos OS.
Problem:

Multiple local privilege escalation vulnerabilities in Juniper Networks Junos
OS have been reported due to the setuid bit being enabled on multiple binaries.
These binaries will run as the owner of the executable (typically "root") and
inherit their privileges. Hence these binary files can be used to escalate
privileges to disclose sensitive information or execute arbitrary command as
root.

This issue affects Juniper Networks Junos OS:

  o all versions prior to 15.1R7-S9;
  o 17.3 versions prior to 17.3R3-S11;
  o 17.4 versions prior to 17.4R2-S12, 17.4R3-S3;
  o 18.1 versions prior to 18.1R3-S11;
  o 18.2 versions prior to 18.2R3-S6;
  o 18.3 versions prior to 18.3R3-S4;
  o 18.4 versions prior to 18.4R2-S7, 18.4R3-S6;
  o 19.1 versions prior to 19.1R2-S2, 19.1R3-S4;
  o 19.2 versions prior to 19.2R1-S6, 19.2R3-S1;
  o 19.3 versions prior to 19.3R3-S1;
  o 19.4 versions prior to 19.4R2-S2, 19.4R3-S1;
  o 20.1 versions prior to 20.1R1-S4, 20.1R2;
  o 20.2 versions prior to 20.2R2.

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

This issue was discovered during a external security research.

The following vulnerabilities have been resolved in the releases listed below:

     CVE                CVSS                            Summary
              7.8 ( CVSS:3.1/AV:L/AC:L/ Junos OS: telnetd.real Local Privilege
CVE-2021-0223 PR:L/UI:N/S:U/C:H/I:H/A:H Escalation vulnerabilities in SUID
              )                         binaries
              7.8 ( CVSS:3.1/AV:L/AC:L/ Junos OS: dexp Local Privilege
CVE-2021-0204 PR:L/UI:N/S:U/C:H/I:H/A:H Escalation vulnerabilities in SUID
              )                         binaries

Solution:

The following software releases have been updated to resolve these specific
issues: Junos OS 15.1R7-S9*, 17.3R3-S11*, 17.4R2-S12, 17.4R3-S3, 18.1R3-S11,
18.2R3-S6, 18.3R3-S4, 18.4R2-S7, 18.4R3-S6, 19.1R2-S2, 19.1R3-S4, 19.2R1-S6,
19.2R3-S1, 19.3R3-S1, 19.4R2-S2, 19.4R3-S1, 20.1R1-S4, 20.1R2, 20.2R2, 20.3R1,
and all subsequent releases.

This issue is being tracked as 1525318 and 1529210 .

*Late availability

Workaround:

Use access lists or firewall filters to limit CLI access to the device only
from trusted, administrative networks or hosts.

Limit access to the Junos OS shell to only trusted system administrators.

Implementation:
Software releases or updates are available for download at https://
www.juniper.net/support/downloads/ .
Modification History:

2021-01-13: Initial Publication.
2021-01-14: Added 15.1R7-S9 (late availability).

CVSS Score:
7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Severity Level:
High
Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common
Vulnerability Scoring System (CVSS) and Juniper's Security Advisories."
Acknowledgements:
Juniper SIRT would like to acknowledge and thank Hoang Thach Nguyen (d4rkn3ss)
of STAR Labs for responsibly reporting this vulnerability.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Y9y5
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0177.2 – UPDATE [Juniper] Junos OS: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/01/19/esb-2021-0177-2-update-juniper-junos-os-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0177-2-update-juniper-junos-os-multiple-vulnerabilities

ESB-2021.0214 – [RedHat] postgresql:9.6: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0214
                      postgresql:9.6 security update
                              19 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           postgresql:9.6
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Access Confidential Data        -- Remote/Unauthenticated      
                   Reduced Security                -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-25696 CVE-2020-25695 CVE-2020-25694
                   CVE-2020-14350 CVE-2020-1720 CVE-2019-10208
                   CVE-2019-10130  

Reference:         ESB-2021.0211
                   ESB-2021.0104
                   ESB-2020.4533
                   ESB-2020.4470
                   ESB-2020.4449

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:0167
   https://access.redhat.com/errata/RHSA-2021:0164

Comment: This bulletin contains two (2) Red Hat security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: postgresql:9.6 security update
Advisory ID:       RHSA-2021:0167-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0167
Issue date:        2021-01-18
CVE Names:         CVE-2019-10130 CVE-2019-10208 CVE-2020-1720 
                   CVE-2020-14350 CVE-2020-25694 CVE-2020-25695 
                   CVE-2020-25696 
=====================================================================

1. Summary:

An update for the postgresql:9.6 module is now available for Red Hat
Enterprise Linux 8.1 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream EUS (v. 8.1) - aarch64, ppc64le, s390x, x86_64

3. Description:

PostgreSQL is an advanced object-relational database management system
(DBMS).

The following packages have been upgraded to a later upstream version:
postgresql (9.6.20).

Security Fix(es):

* postgresql: Reconnection can downgrade connection security settings
(CVE-2020-25694)

* postgresql: Multiple features escape "security restricted operation"
sandbox (CVE-2020-25695)

* postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY
DEFINER execution (CVE-2019-10208)

* postgresql: Uncontrolled search path element in CREATE EXTENSION
(CVE-2020-14350)

* postgresql: psql's gset allows overwriting specially treated variables
(CVE-2020-25696)

* postgresql: Selectivity estimators bypass row security policies
(CVE-2019-10130)

* postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization
checks (CVE-2020-1720)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

If the postgresql service is running, it will be automatically restarted
after installing this update.

5. Bugs fixed (https://bugzilla.redhat.com/):

1707109 - CVE-2019-10130 postgresql: Selectivity estimators bypass row security 
policies
1734416 - CVE-2019-10208 postgresql: TYPE in pg_temp executes arbitrary SQL during 
SECURITY DEFINER execution
1798852 - CVE-2020-1720 postgresql: ALTER ... DEPENDS ON EXTENSION is missing 
authorization checks
1865746 - CVE-2020-14350 postgresql: Uncontrolled search path element in CREATE 
EXTENSION
1894423 - CVE-2020-25694 postgresql: Reconnection can downgrade connection security 
settings
1894425 - CVE-2020-25695 postgresql: Multiple features escape "security restricted operation" 
sandbox
1894430 - CVE-2020-25696 postgresql: psql's gset allows overwriting specially treated variables

6. Package List:

Red Hat Enterprise Linux AppStream EUS (v. 8.1):

Source:
postgresql-9.6.20-1.module+el8.1.0+9156+8ff1384f.src.rpm

aarch64:
postgresql-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-contrib-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-contrib-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-debugsource-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-docs-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-docs-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-plperl-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-plperl-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-plpython3-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-plpython3-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-pltcl-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-pltcl-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-server-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-server-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-server-devel-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-server-devel-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-static-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-test-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-test-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm
postgresql-test-rpm-macros-9.6.20-1.module+el8.1.0+9156+8ff1384f.aarch64.rpm

ppc64le:
postgresql-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-contrib-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-contrib-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-debugsource-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-docs-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-docs-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-plperl-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-plperl-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-plpython3-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-plpython3-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-pltcl-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-pltcl-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-server-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-server-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-server-devel-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-server-devel-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-static-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-test-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-test-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm
postgresql-test-rpm-macros-9.6.20-1.module+el8.1.0+9156+8ff1384f.ppc64le.rpm

s390x:
postgresql-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-contrib-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-contrib-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-debugsource-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-docs-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-docs-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-plperl-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-plperl-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-plpython3-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-plpython3-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-pltcl-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-pltcl-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-server-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-server-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-server-devel-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-server-devel-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-static-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-test-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-test-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm
postgresql-test-rpm-macros-9.6.20-1.module+el8.1.0+9156+8ff1384f.s390x.rpm

x86_64:
postgresql-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-contrib-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-contrib-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-debugsource-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-docs-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-docs-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-plperl-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-plperl-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-plpython3-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-plpython3-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-pltcl-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-pltcl-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-server-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-server-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-server-devel-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-server-devel-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-static-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-test-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-test-debuginfo-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm
postgresql-test-rpm-macros-9.6.20-1.module+el8.1.0+9156+8ff1384f.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-10130
https://access.redhat.com/security/cve/CVE-2019-10208
https://access.redhat.com/security/cve/CVE-2020-1720
https://access.redhat.com/security/cve/CVE-2020-14350
https://access.redhat.com/security/cve/CVE-2020-25694
https://access.redhat.com/security/cve/CVE-2020-25695
https://access.redhat.com/security/cve/CVE-2020-25696
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYAW1ftzjgjWX9erEAQjUcQ/+Pe+0UrJJ9h8Ffe3sGAGEvZKqR9/L1Za6
Ubdff6L3eIjrEmPOnq2JWNzKDw0RXpv1s4tiyyrxc2T+kv5FwWWuCw6XWBj1Z48F
/dLI8qSvHAvSMqR+Vh5S3wtxy5yli4InM4UDe31gt88MNwKe8paEEf+DR7jSPuNW
Ffz69IwbJEKXMBsLk4G4rei446vU+m7cocvTjZ9AJd/02SxtGfcrZwXk4i3myBlU
G1CLQdU52b7k4qWzuMwNBKtZnRqjgt+isFG9Z2y+Lx+LEfsderAfbA4Q0enD7eWu
PdlPBvQzVALdlQKD9zI6Pv+dhCTQpVXGWQVjw0QwPfh1aFIyU7bomvt2BaKTIxt5
oaiUUIY1PE5GmRbDoL2F+hLgN21uLiJoEEZWUqVE6eMqAcG3LAjV4pY4Pd6gUERq
xX9g+f6GeaHmVc6h9Tb6kkF7vHXZ47ahUTV8+F/FmJ7VM8NDHTOD/EZyY6XSwFfY
Ym69tVc3GbshtjD+LoLZqHsKbkO3uH9t8uziKH4snpdMvnMLJzwr59xNE8nlsqkJ
/9cFQ2atjWnRjEuqsEh0u5KsCJLqKWwsmlifwx6oDlnXgVquCRIRzWpLNez1kdEx
uWdtYoNcjmt7W1juJRNSo6VaxCm4/+xydlvElg6/wXjRUsz/0iSq3vVh7UtvNmwq
Tv0otd8EJcc=
=kCBq
- -----END PGP SIGNATURE-----

- --------------------------------------------------------------------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: postgresql:9.6 security update
Advisory ID:       RHSA-2021:0164-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0164
Issue date:        2021-01-18
CVE Names:         CVE-2019-10130 CVE-2019-10208 CVE-2020-1720 
                   CVE-2020-14350 CVE-2020-25694 CVE-2020-25695 
                   CVE-2020-25696 
=====================================================================

1. Summary:

An update for the postgresql:9.6 module is now available for Red Hat
Enterprise Linux 8.2 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream EUS (v. 8.2) - aarch64, ppc64le, s390x, x86_64

3. Description:

PostgreSQL is an advanced object-relational database management system
(DBMS).

The following packages have been upgraded to a later upstream version:
postgresql (9.6.20).

Security Fix(es):

* postgresql: Reconnection can downgrade connection security settings
(CVE-2020-25694)

* postgresql: Multiple features escape "security restricted operation"
sandbox (CVE-2020-25695)

* postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY
DEFINER execution (CVE-2019-10208)

* postgresql: Uncontrolled search path element in CREATE EXTENSION
(CVE-2020-14350)

* postgresql: psql's gset allows overwriting specially treated variables
(CVE-2020-25696)

* postgresql: Selectivity estimators bypass row security policies
(CVE-2019-10130)

* postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization
checks (CVE-2020-1720)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

If the postgresql service is running, it will be automatically restarted
after installing this update.

5. Bugs fixed (https://bugzilla.redhat.com/):

1707109 - CVE-2019-10130 postgresql: Selectivity estimators bypass row security 
policies
1734416 - CVE-2019-10208 postgresql: TYPE in pg_temp executes arbitrary SQL during 
SECURITY DEFINER execution
1798852 - CVE-2020-1720 postgresql: ALTER ... DEPENDS ON EXTENSION is missing 
authorization checks
1865746 - CVE-2020-14350 postgresql: Uncontrolled search path element in CREATE 
EXTENSION
1894423 - CVE-2020-25694 postgresql: Reconnection can downgrade connection security 
settings
1894425 - CVE-2020-25695 postgresql: Multiple features escape "security restricted 
operation" sandbox
1894430 - CVE-2020-25696 postgresql: psql's gset allows overwriting specially treated 
variables

6. Package List:

Red Hat Enterprise Linux AppStream EUS (v. 8.2):

Source:
postgresql-9.6.20-1.module+el8.2.0+8939+9a3b4b64.src.rpm

aarch64:
postgresql-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-contrib-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-contrib-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-debugsource-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-docs-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-docs-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-plperl-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-plperl-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-plpython3-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-plpython3-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-pltcl-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-pltcl-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-server-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-server-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-server-devel-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-server-devel-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-static-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-test-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-test-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm
postgresql-test-rpm-macros-9.6.20-1.module+el8.2.0+8939+9a3b4b64.aarch64.rpm

ppc64le:
postgresql-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-contrib-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-contrib-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-debugsource-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-docs-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-docs-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-plperl-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-plperl-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-plpython3-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-plpython3-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-pltcl-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-pltcl-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-server-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-server-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-server-devel-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-server-devel-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-static-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-test-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-test-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm
postgresql-test-rpm-macros-9.6.20-1.module+el8.2.0+8939+9a3b4b64.ppc64le.rpm

s390x:
postgresql-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-contrib-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-contrib-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-debugsource-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-docs-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-docs-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-plperl-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-plperl-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-plpython3-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-plpython3-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-pltcl-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-pltcl-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-server-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-server-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-server-devel-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-server-devel-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-static-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-test-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-test-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm
postgresql-test-rpm-macros-9.6.20-1.module+el8.2.0+8939+9a3b4b64.s390x.rpm

x86_64:
postgresql-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-contrib-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-contrib-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-debugsource-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-docs-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-docs-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-plperl-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-plperl-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-plpython3-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-plpython3-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-pltcl-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-pltcl-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-server-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-server-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-server-devel-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-server-devel-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-static-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-test-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-test-debuginfo-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm
postgresql-test-rpm-macros-9.6.20-1.module+el8.2.0+8939+9a3b4b64.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-10130
https://access.redhat.com/security/cve/CVE-2019-10208
https://access.redhat.com/security/cve/CVE-2020-1720
https://access.redhat.com/security/cve/CVE-2020-14350
https://access.redhat.com/security/cve/CVE-2020-25694
https://access.redhat.com/security/cve/CVE-2020-25695
https://access.redhat.com/security/cve/CVE-2020-25696
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=NUE7
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=JV8l
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0214 – [RedHat] postgresql:9.6: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/01/19/esb-2021-0214-redhat-postgresql9-6-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0214-redhat-postgresql9-6-multiple-vulnerabilities

ESB-2021.0213 – [Debian] gst-plugins-bad1.0: Execute arbitrary code/commands – Unknown/unspecified

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0213
                    gst-plugins-bad1.0 security update
                              19 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           gst-plugins-bad1.0
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Unknown/Unspecified
Resolution:        Patch/Upgrade

Original Bulletin: 
   https://lists.debian.org/debian-security-announce/2021/msg00012.html
   https://lists.debian.org/debian-lts-announce/2021/01/msg00016.html

Comment: This bulletin contains two (2) Debian security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4833-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 18, 2021                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : gst-plugins-bad1.0
CVE ID         : not yet available

Andrew Wesie discovered a buffer overflow in the H264 support of the
GStreamer multimedia framework, which could potentially result in the
execution of arbitrary code.

For the stable distribution (buster), this problem has been fixed in
version 1.14.4-1deb10u1.

We recommend that you upgrade your gst-plugins-bad1.0 packages.

For the detailed security status of gst-plugins-bad1.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gst-plugins-bad1.0

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=iG5E
- -----END PGP SIGNATURE-----

- --------------------------------------------------------------------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -----------------------------------------------------------------------
Debian LTS Advisory DLA-2528-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Utkarsh Gupta
January 19, 2021                            https://wiki.debian.org/LTS
- - -----------------------------------------------------------------------

Package        : gst-plugins-bad1.0
Version        : 1.10.4-1+deb9u1
CVE ID         : not yet available

Andrew Wesie discovered a buffer overflow in the H264 support of the
GStreamer multimedia framework, which could potentially result in the
execution of arbitrary code.

For Debian 9 stretch, this problem has been fixed in version
1.10.4-1+deb9u1.

We recommend that you upgrade your gst-plugins-bad1.0 packages.

For the detailed security status of gst-plugins-bad1.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gst-plugins-bad1.0

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=q/Gd
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=060z
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0213 – [Debian] gst-plugins-bad1.0: Execute arbitrary code/commands – Unknown/unspecified appeared first on Malware Devil.



https://malwaredevil.com/2021/01/19/esb-2021-0213-debian-gst-plugins-bad1-0-execute-arbitrary-code-commands-unknown-unspecified/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0213-debian-gst-plugins-bad1-0-execute-arbitrary-code-commands-unknown-unspecified

ESB-2021.0212 – [RedHat] OpenShift Container Platform 4.6.12: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0212
     OpenShift Container Platform 4.6.12 packages and security update
                              19 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           OpenShift Container Platform 4.6.12
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Overwrite Arbitrary Files       -- Existing Account            
                   Denial of Service               -- Remote/Unauthenticated      
                   Provide Misleading Information  -- Remote/Unauthenticated      
                   Access Confidential Data        -- Remote/Unauthenticated      
                   Reduced Security                -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-28362 CVE-2020-25696 CVE-2020-25694
                   CVE-2020-25641 CVE-2020-13249 CVE-2020-8566
                   CVE-2020-8177 CVE-2020-2922 CVE-2020-2752
                   CVE-2020-2574 CVE-2020-2309 CVE-2020-2308
                   CVE-2020-2307 CVE-2020-2306 CVE-2020-2305
                   CVE-2020-2304 CVE-2020-1971 

Reference:         ESB-2021.0171
                   ESB-2020.4521
                   ESB-2020.4516
                   ESB-2020.4423
                   ESB-2020.2085

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:0038
   https://access.redhat.com/errata/RHSA-2021:0039
   https://access.redhat.com/errata/RHSA-2021:0037

Comment: This bulletin contains three (3) Red Hat security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: OpenShift Container Platform 4.6.12 packages and security update
Advisory ID:       RHSA-2021:0038-01
Product:           Red Hat OpenShift Enterprise
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0038
Issue date:        2021-01-18
CVE Names:         CVE-2020-2304 CVE-2020-2305 CVE-2020-2306 
                   CVE-2020-2307 CVE-2020-2308 CVE-2020-2309 
                   CVE-2020-28362 
=====================================================================

1. Summary:

Red Hat OpenShift Container Platform release 4.6.12 is now available with
updates to packages and images that fix several bugs.

This release includes a security update for Red Hat OpenShift Container
Platform 4.6.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenShift Container Platform 4.6 - noarch, ppc64le, s390x, x86_64

3. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

Security Fix(es):

* jenkins-2-plugins/subversion: XML parser is not preventing XML external
entity (XXE) attacks (CVE-2020-2304)

* jenkins-2-plugins/mercurial: XML parser is not preventing XML external
entity (XXE) attacks (CVE-2020-2305)

* jenkins-2-plugins/mercurial: Missing permission check in an HTTP endpoint
could result in information disclosure (CVE-2020-2306)

* jenkins-2-plugins/kubernetes: Jenkins controller environment variables
are accessible in Kubernetes Plugin (CVE-2020-2307)

* jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes
Plugin allows listing pod templates (CVE-2020-2308)

* jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes
Plugin allows enumerating credentials IDs (CVE-2020-2309)

* golang: math/big: panic during recursive division of very large numbers
(CVE-2020-28362)

This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.6.12. See the following advisory for the container images for
this release:

https://access.redhat.com/errata/RHSA-2021:0037

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

All OpenShift Container Platform 4.6 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster
- - -between-minor.html#understanding-upgrade-channels_updating-cluster-between
- - -minor.

4. Solution:

For OpenShift Container Platform 4.6 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel
ease-notes.html

Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster
- - -cli.html.

5. Bugs fixed (https://bugzilla.redhat.com/):

1895939 - CVE-2020-2304 jenkins-2-plugins/subversion: XML parser is not prevententing XML external entity (XXE) attacks
1895940 - CVE-2020-2305 jenkins-2-plugins/mercurial: XML parser is not prevententing XML external entity (XXE) attacks
1895941 - CVE-2020-2306 jenkins-2-plugins/mercurial: Missing permission check in an HTTP endpoint could result in information disclosure
1895945 - CVE-2020-2307 jenkins-2-plugins/kubernetes: Jenkins controller environment variables are accessible in Kubernetes Plugin
1895946 - CVE-2020-2308 jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows listing pod templates
1895947 - CVE-2020-2309 jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows enumerating credentials IDs
1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers

6. Package List:

Red Hat OpenShift Container Platform 4.6:

Source:
jenkins-2-plugins-4.6.1608634578-1.el7.src.rpm
openshift-4.6.0-202012190744.p0.git.94235.c62c6f7.el7.src.rpm
openshift-ansible-4.6.0-202012172338.p0.git.0.a15d08c.el7.src.rpm
openshift-clients-4.6.0-202012172338.p0.git.3800.30af700.el7.src.rpm

noarch:
jenkins-2-plugins-4.6.1608634578-1.el7.noarch.rpm
openshift-ansible-4.6.0-202012172338.p0.git.0.a15d08c.el7.noarch.rpm
openshift-ansible-test-4.6.0-202012172338.p0.git.0.a15d08c.el7.noarch.rpm

x86_64:
openshift-clients-4.6.0-202012172338.p0.git.3800.30af700.el7.x86_64.rpm
openshift-clients-redistributable-4.6.0-202012172338.p0.git.3800.30af700.el7.x86_64.rpm
openshift-hyperkube-4.6.0-202012190744.p0.git.94235.c62c6f7.el7.x86_64.rpm

Red Hat OpenShift Container Platform 4.6:

Source:
atomic-openshift-service-idler-4.6.0-202012171504.p0.git.15.f4535bc.el8.src.rpm
console-login-helper-messages-0.20.3-1.rhaos4.6.el8.src.rpm
cri-o-1.19.1-2.rhaos4.6.git2af9ecf.el8.src.rpm
jenkins-2-plugins-4.6.1609853716-1.el8.src.rpm
openshift-4.6.0-202012190744.p0.git.94235.c62c6f7.el8.src.rpm
openshift-clients-4.6.0-202012172338.p0.git.3800.30af700.el8.src.rpm
openshift-kuryr-4.6.0-202012171504.p0.git.2216.1fecf92.el8.src.rpm

noarch:
console-login-helper-messages-0.20.3-1.rhaos4.6.el8.noarch.rpm
console-login-helper-messages-issuegen-0.20.3-1.rhaos4.6.el8.noarch.rpm
console-login-helper-messages-profile-0.20.3-1.rhaos4.6.el8.noarch.rpm
jenkins-2-plugins-4.6.1609853716-1.el8.noarch.rpm
openshift-kuryr-cni-4.6.0-202012171504.p0.git.2216.1fecf92.el8.noarch.rpm
openshift-kuryr-common-4.6.0-202012171504.p0.git.2216.1fecf92.el8.noarch.rpm
openshift-kuryr-controller-4.6.0-202012171504.p0.git.2216.1fecf92.el8.noarch.rpm
python3-kuryr-kubernetes-4.6.0-202012171504.p0.git.2216.1fecf92.el8.noarch.rpm

ppc64le:
atomic-openshift-service-idler-4.6.0-202012171504.p0.git.15.f4535bc.el8.ppc64le.rpm
cri-o-1.19.1-2.rhaos4.6.git2af9ecf.el8.ppc64le.rpm
cri-o-debuginfo-1.19.1-2.rhaos4.6.git2af9ecf.el8.ppc64le.rpm
cri-o-debugsource-1.19.1-2.rhaos4.6.git2af9ecf.el8.ppc64le.rpm
openshift-clients-4.6.0-202012172338.p0.git.3800.30af700.el8.ppc64le.rpm
openshift-hyperkube-4.6.0-202012190744.p0.git.94235.c62c6f7.el8.ppc64le.rpm

s390x:
atomic-openshift-service-idler-4.6.0-202012171504.p0.git.15.f4535bc.el8.s390x.rpm
cri-o-1.19.1-2.rhaos4.6.git2af9ecf.el8.s390x.rpm
cri-o-debuginfo-1.19.1-2.rhaos4.6.git2af9ecf.el8.s390x.rpm
cri-o-debugsource-1.19.1-2.rhaos4.6.git2af9ecf.el8.s390x.rpm
openshift-clients-4.6.0-202012172338.p0.git.3800.30af700.el8.s390x.rpm
openshift-hyperkube-4.6.0-202012190744.p0.git.94235.c62c6f7.el8.s390x.rpm

x86_64:
atomic-openshift-service-idler-4.6.0-202012171504.p0.git.15.f4535bc.el8.x86_64.rpm
cri-o-1.19.1-2.rhaos4.6.git2af9ecf.el8.x86_64.rpm
cri-o-debuginfo-1.19.1-2.rhaos4.6.git2af9ecf.el8.x86_64.rpm
cri-o-debugsource-1.19.1-2.rhaos4.6.git2af9ecf.el8.x86_64.rpm
openshift-clients-4.6.0-202012172338.p0.git.3800.30af700.el8.x86_64.rpm
openshift-clients-redistributable-4.6.0-202012172338.p0.git.3800.30af700.el8.x86_64.rpm
openshift-hyperkube-4.6.0-202012190744.p0.git.94235.c62c6f7.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-2304
https://access.redhat.com/security/cve/CVE-2020-2305
https://access.redhat.com/security/cve/CVE-2020-2306
https://access.redhat.com/security/cve/CVE-2020-2307
https://access.redhat.com/security/cve/CVE-2020-2308
https://access.redhat.com/security/cve/CVE-2020-2309
https://access.redhat.com/security/cve/CVE-2020-28362
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=tMa0
- -----END PGP SIGNATURE-----

- ------------------------------------------------------------------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: OpenShift Container Platform 4.6.12 extras and security update
Advisory ID:       RHSA-2021:0039-01
Product:           Red Hat OpenShift Enterprise
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0039
Issue date:        2021-01-18
CVE Names:         CVE-2020-1971 CVE-2020-2304 CVE-2020-2305 
                   CVE-2020-2306 CVE-2020-2307 CVE-2020-2308 
                   CVE-2020-2309 CVE-2020-8177 CVE-2020-25641 
                   CVE-2020-28362 
=====================================================================

1. Summary:

Red Hat OpenShift Container Platform release 4.6.12 is now available with
updates to packages and images that fix several bugs and add enhancements.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

Security Fix(es):

* golang: math/big: panic during recursive division of very large numbers
(CVE-2020-28362)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.6.12. See the following advisory for the container images for
this release:

https://access.redhat.com/errata/RHSA-2021:0037

All OpenShift Container Platform 4.6 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster
- - -between-minor.html#understanding-upgrade-channels_updating-cluster-between
- - -minor.

3. Solution:

For OpenShift Container Platform 4.6 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel
ease-notes.html

Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster
- - -cli.html.

4. Bugs fixed (https://bugzilla.redhat.com/):

1888393 - Alert ElasticsearchBulkRequestsRejectionJumps never gets pending/firing due to there is no `bulk` thread pool.
1890801 - Changes on spec.logStore.elasticsearch.nodeCount not reflected when decreasing the number of nodes
1892794 - Reduce log chatter in cluster logging operator
1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers
1901299 - Change ES Operator CSV to clarify the scope for this Operator
1907519 - [logforward]error_class=ArgumentError error="time must be a Fluent::EventTime (or Integer): Float"
1909614 - Old kibana index causing crashloop
1909616 - Facing error "Cannot authenticate user because admin user is not permitted to login via HTTP" in OCP 4.5.20
1913104 - Placeholder bug for OCP 4.6.0 extras release

5. References:

https://access.redhat.com/security/cve/CVE-2020-1971
https://access.redhat.com/security/cve/CVE-2020-2304
https://access.redhat.com/security/cve/CVE-2020-2305
https://access.redhat.com/security/cve/CVE-2020-2306
https://access.redhat.com/security/cve/CVE-2020-2307
https://access.redhat.com/security/cve/CVE-2020-2308
https://access.redhat.com/security/cve/CVE-2020-2309
https://access.redhat.com/security/cve/CVE-2020-8177
https://access.redhat.com/security/cve/CVE-2020-25641
https://access.redhat.com/security/cve/CVE-2020-28362
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=EPJM
- -----END PGP SIGNATURE-----

- -------------------------------------------------------------------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: OpenShift Container Platform 4.6.12 bug fix and security update
Advisory ID:       RHSA-2021:0037-01
Product:           Red Hat OpenShift Enterprise
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0037
Issue date:        2021-01-18
CVE Names:         CVE-2020-1971 CVE-2020-2304 CVE-2020-2305 
                   CVE-2020-2306 CVE-2020-2307 CVE-2020-2308 
                   CVE-2020-2309 CVE-2020-2574 CVE-2020-2752 
                   CVE-2020-2922 CVE-2020-8177 CVE-2020-8566 
                   CVE-2020-13249 CVE-2020-25641 CVE-2020-25694 
                   CVE-2020-25696 CVE-2020-28362 
=====================================================================

1. Summary:

Red Hat OpenShift Container Platform release 4.6.12 is now available with
updates to packages and images that fix several bugs.

This release includes a security update for Red Hat OpenShift Container
Platform 4.6.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the container images for Red Hat OpenShift Container
Platform 4.6.12. See the following advisory for the RPM packages for this
release:

https://access.redhat.com/errata/RHSA-2021:0038

Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel
ease-notes.html

Security Fix(es):

* kubernetes: Ceph RBD adminSecrets exposed in logs when loglevel >= 4
(CVE-2020-8566)

* golang: math/big: panic during recursive division of very large numbers
(CVE-2020-28362)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

You may download the oc tool and use it to inspect release image metadata
as follows:

(For x86_64 architecture)

  $ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.6.12-x86_64

The image digest is
sha256:5c3618ab914eb66267b7c552a9b51c3018c3a8f8acf08ce1ff7ae4bfdd3a82bd

(For s390x architecture)

  $ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.6.12-s390x

The image digest is
sha256:9e78700d5b1b8618d67d39f12a2c163f08e537eb4cea89cd28d1aa3f4ea356bb

(For ppc64le architecture)

  $ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.6.12-ppc64le

The image digest is
sha256:290cd8207d81123ba05c2f4f6f29c99c4001e1afbbfdee94c327ceb81ab75924

All OpenShift Container Platform 4.6 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster
- - -between-minor.html#understanding-upgrade-channels_updating-cluster-between
- - -minor.

3. Solution:

For OpenShift Container Platform 4.6 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel
ease-notes.html

Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster
- - -cli.html.

4. Bugs fixed (https://bugzilla.redhat.com/):

1810470 - [Flake] volume expansion tests occasionally flake with EBS CSI driver
1811341 - Subpath test pod did not start within 5 minutes
1814282 - Storage e2es leaving namespaces/pods around
1836931 - `oc explain localvolume` returns empty description
1842747 - Not READYTOUSE volumesnapshot instance can not be deleted
1843008 - Fix reconcilliation of manifests for 4.6 channel for LSO
1850161 - [4.6] the skipVersion should exactly match regex in art.yaml
1852619 - must-gather creates empty files occasionally
1866843 - upgrade got stuck because of FailedAttachVolume
1867704 - cluster-storage-operator needs to grant pod list/watch permissions to aws operator
1867757 - Rebase node-registrar sidebar with latest version
1871439 - Bump node registrar golang version
1871955 - Allow snapshot operator to run on masters
1872000 - Allow ovirt controller to run on master nodes
1872244 - [aws-ebs-csi-driver] build fails
1872290 - storage operator does not install on ovirt
1872500 - Update resizer sidecar in CSI operators to use timeout parameter than csiTimeout
1873168 - add timeout parameter to resizer for aws
1877084 - tune resizer to have higher timeout than 2mins
1879221 - [Assisted-4.6][Staging] assisted-service API does not prevent a request with another user's credentials from setting cluster installation progress
1881625 - replace goautoreneg library in LSO
1886640 - CVE-2020-8566 kubernetes: Ceph RBD adminSecrets exposed in logs when loglevel >= 4
1888909 - Placeholder bug for OCP 4.6.0 rpm release
1889416 - Installer complains about not enough vcpu for the baremetal flavor where generic bm flavor is being used
1889936 - Backport timecache LRU fix
1894244 - [Backport 4.6] IO archive contains more records of than is the limit
1894678 - Installer panics on invalid flavor
1894878 - Helm chart fails to install using developer console because of TLS certificate error
1895325 - [OSP] External mode cluster creation disabled for Openstack and oVirt platform
1895426 - unable to edit an application with a custom builder image
1895434 - unable to edit custom template application
1897337 - Mounts failing with error "Failed to start transient scope unit: Argument list too long"
1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers
1898178 - [OVN] EgressIP does not guard against node IP assignment
1899266 - [4.6z] Baremetal IPI with IPv6 control plane: nodes respond with duplicate packets to ICMP6 echo requests
1899622 - [4.6z] configure-ovs.sh doesn't configure bonding options
1900736 - [SR-IOV] Backport request to SR-IOV operator version 4.6 - SriovNetworkNodePolicies apply ignoring the spec.nodeSelector.
1900792 - Track all resource counts via telemetry
1901736 - additionalSecurityGroupIDs not working for master nodes
1903353 - Etcd container leaves grep and lsof zombie processes
1905947 - [Internal Mode] Object gateway (RGW) in unknown state after OCP upgrade.
1906428 - [release-4.6]: When using webhooks in OCP 4.5 fails to rollout latest deploymentconfig
1906723 - File /etc/NetworkManager/system-connections/default_connection.nmconnection  is incompatible with SR-IOV operator
1906836 - [sig-arch][Early] Managed cluster should start all core operators: monitoring: container has runAsNonRoot and image has non-numeric user (nobody)
1907203 - clusterresourceoverride-operator has version: 1.0.0 every build
1908472 - High Podready Latency due to timed out waiting for annotations
1908749 - [GSS] Unable to deploy OCS 4.5.2 on OCP 4.6.1, cannot `Create OCS Cluster Service`
1908803 - [OVN] Network Policy fails to work when project label gets overwritten
1908847 - [4.6.z] RHCOS 4.6 - Missing Initiatorname
1909062 - ARO/Azure: excessive pod memory allocation causes node lockup
1909248 - Intermittent packet drop from pod to pod
1909682 - When scaling down the status of the node is stuck on deleting
1909990 - oVirt provider uses depricated cluster-api project
1910066 - OpenShift YAML editor jumps to top every few seconds
1910104 - [oVirt] Node is not removed when VM has been removed from oVirt engine
1911790 - [Assisted-4.6] [Staging] reduce disk speed requirement for test/dev environments
1913103 - Placeholder bug for OCP 4.6.0 rpm release
1913105 - Placeholder bug for OCP 4.6.0 metadata release
1913263 - [4.6] Unable to schedule a pod due to Insufficient ephemeral-storage
1913329 - [Assisted-4.6] [Staging] Installation fails to start
1914988 - [4.6.z] real-time kernel in RHCOS is not synchronized
1915007 - Fixed by revert -- Upgrade to OCP 4.6.9 results in cluster-wide DNS and connectivity issues due to bad NetworkPolicy flows

5. References:

https://access.redhat.com/security/cve/CVE-2020-1971
https://access.redhat.com/security/cve/CVE-2020-2304
https://access.redhat.com/security/cve/CVE-2020-2305
https://access.redhat.com/security/cve/CVE-2020-2306
https://access.redhat.com/security/cve/CVE-2020-2307
https://access.redhat.com/security/cve/CVE-2020-2308
https://access.redhat.com/security/cve/CVE-2020-2309
https://access.redhat.com/security/cve/CVE-2020-2574
https://access.redhat.com/security/cve/CVE-2020-2752
https://access.redhat.com/security/cve/CVE-2020-2922
https://access.redhat.com/security/cve/CVE-2020-8177
https://access.redhat.com/security/cve/CVE-2020-8566
https://access.redhat.com/security/cve/CVE-2020-13249
https://access.redhat.com/security/cve/CVE-2020-25641
https://access.redhat.com/security/cve/CVE-2020-25694
https://access.redhat.com/security/cve/CVE-2020-25696
https://access.redhat.com/security/cve/CVE-2020-28362
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=+mgi
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=8P3H
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0212 – [RedHat] OpenShift Container Platform 4.6.12: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/01/19/esb-2021-0212-redhat-openshift-container-platform-4-6-12-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0212-redhat-openshift-container-platform-4-6-12-multiple-vulnerabilities

ESB-2021.0211 – [RedHat] libpq: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0211
                           libpq security update
                              19 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libpq
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Access Confidential Data        -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-25696 CVE-2020-25694 

Reference:         ESB-2021.0104

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:0165

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: libpq security update
Advisory ID:       RHSA-2021:0165-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0165
Issue date:        2021-01-18
CVE Names:         CVE-2020-25694 CVE-2020-25696 
=====================================================================

1. Summary:

An update for libpq is now available for Red Hat Enterprise Linux 8.1
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream EUS (v. 8.1) - aarch64, ppc64le, s390x, x86_64

3. Description:

The libpq package provides the PostgreSQL client library, which allows
client programs to connect to PostgreSQL servers. 

The following packages have been upgraded to a later upstream version:
libpq (12.5). (BZ#1898226, BZ#1901561)

Security Fix(es):

* postgresql: Reconnection can downgrade connection security settings
(CVE-2020-25694)

* postgresql: psql's gset allows overwriting specially treated variables
(CVE-2020-25696)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1894423 - CVE-2020-25694 postgresql: Reconnection can downgrade connection security settings
1894430 - CVE-2020-25696 postgresql: psql's gset allows overwriting specially treated variables

6. Package List:

Red Hat Enterprise Linux AppStream EUS (v. 8.1):

Source:
libpq-12.5-2.el8_1.src.rpm

aarch64:
libpq-12.5-2.el8_1.aarch64.rpm
libpq-debuginfo-12.5-2.el8_1.aarch64.rpm
libpq-debugsource-12.5-2.el8_1.aarch64.rpm
libpq-devel-12.5-2.el8_1.aarch64.rpm
libpq-devel-debuginfo-12.5-2.el8_1.aarch64.rpm

ppc64le:
libpq-12.5-2.el8_1.ppc64le.rpm
libpq-debuginfo-12.5-2.el8_1.ppc64le.rpm
libpq-debugsource-12.5-2.el8_1.ppc64le.rpm
libpq-devel-12.5-2.el8_1.ppc64le.rpm
libpq-devel-debuginfo-12.5-2.el8_1.ppc64le.rpm

s390x:
libpq-12.5-2.el8_1.s390x.rpm
libpq-debuginfo-12.5-2.el8_1.s390x.rpm
libpq-debugsource-12.5-2.el8_1.s390x.rpm
libpq-devel-12.5-2.el8_1.s390x.rpm
libpq-devel-debuginfo-12.5-2.el8_1.s390x.rpm

x86_64:
libpq-12.5-2.el8_1.i686.rpm
libpq-12.5-2.el8_1.x86_64.rpm
libpq-debuginfo-12.5-2.el8_1.i686.rpm
libpq-debuginfo-12.5-2.el8_1.x86_64.rpm
libpq-debugsource-12.5-2.el8_1.i686.rpm
libpq-debugsource-12.5-2.el8_1.x86_64.rpm
libpq-devel-12.5-2.el8_1.i686.rpm
libpq-devel-12.5-2.el8_1.x86_64.rpm
libpq-devel-debuginfo-12.5-2.el8_1.i686.rpm
libpq-devel-debuginfo-12.5-2.el8_1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-25694
https://access.redhat.com/security/cve/CVE-2020-25696
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=DSfP
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ymbO
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0211 – [RedHat] libpq: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/01/19/esb-2021-0211-redhat-libpq-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0211-redhat-libpq-multiple-vulnerabilities

ESB-2021.0210 – [RedHat] xstream: Execute arbitrary code/commands – Existing account

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0210
                          xstream security update
                              19 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           xstream
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-26217  

Reference:         ESB-2021.0131
                   ESB-2020.4430
                   ESB-2020.4241

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:0162

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: xstream security update
Advisory ID:       RHSA-2021:0162-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0162
Issue date:        2021-01-18
CVE Names:         CVE-2020-26217 
=====================================================================

1. Summary:

An update for xstream is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client Optional (v. 7) - noarch
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch
Red Hat Enterprise Linux Server Optional (v. 7) - noarch
Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch

3. Description:

XStream is a Java XML serialization library to serialize objects to and
deserialize object from XML.

Security Fix(es):

* XStream: remote code execution due to insecure XML deserialization when
relying on blocklists (CVE-2020-26217)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1898907 - CVE-2020-26217 XStream: remote code execution due to insecure XML deserialization when relying on blocklists

6. Package List:

Red Hat Enterprise Linux Client Optional (v. 7):

Source:
xstream-1.3.1-12.el7_9.src.rpm

noarch:
xstream-1.3.1-12.el7_9.noarch.rpm
xstream-javadoc-1.3.1-12.el7_9.noarch.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

Source:
xstream-1.3.1-12.el7_9.src.rpm

noarch:
xstream-1.3.1-12.el7_9.noarch.rpm
xstream-javadoc-1.3.1-12.el7_9.noarch.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

Source:
xstream-1.3.1-12.el7_9.src.rpm

noarch:
xstream-1.3.1-12.el7_9.noarch.rpm
xstream-javadoc-1.3.1-12.el7_9.noarch.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

Source:
xstream-1.3.1-12.el7_9.src.rpm

noarch:
xstream-1.3.1-12.el7_9.noarch.rpm
xstream-javadoc-1.3.1-12.el7_9.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-26217
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=GEOX
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=nfNj
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0210 – [RedHat] xstream: Execute arbitrary code/commands – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2021/01/19/esb-2021-0210-redhat-xstream-execute-arbitrary-code-commands-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0210-redhat-xstream-execute-arbitrary-code-commands-existing-account

Network Security News Summary for Tuesday January 19th, 2021

A brief daily summary of what is important in cybersecurity. The podcast is published every weekday and designed to get you ready for the day with a brief, usually about 5 minutes long, summary of current network security-related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .

The post Network Security News Summary for Tuesday January 19th, 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/01/19/network-security-news-summary-for-tuesday-january-19th-2021/?utm_source=rss&utm_medium=rss&utm_campaign=network-security-news-summary-for-tuesday-january-19th-2021

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...