-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.4961
  SVD-2023-0808: August Third Party Package Updates in Splunk Enterprise
                              31 August 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Splunk Enterprise
Publisher:         Splunk
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-29405 CVE-2023-29404 CVE-2023-29403
                   CVE-2023-29402 CVE-2023-29400 CVE-2023-27538
                   CVE-2023-27537 CVE-2023-27536 CVE-2023-27535
                   CVE-2023-27534 CVE-2023-27533 CVE-2023-24540
                   CVE-2023-24539 CVE-2023-23916 CVE-2023-23915
                   CVE-2023-23914 CVE-2022-46175 CVE-2022-43552
                   CVE-2022-43551 CVE-2022-42916 CVE-2022-42915
                   CVE-2022-42004 CVE-2022-42003 CVE-2022-41722
                   CVE-2022-41720 CVE-2022-41716 CVE-2022-41715
                   CVE-2022-40899 CVE-2022-40897 CVE-2022-40023
                   CVE-2022-38900 CVE-2022-37603 CVE-2022-37601
                   CVE-2022-37599 CVE-2022-36227 CVE-2022-35737
                   CVE-2022-35260 CVE-2022-35252 CVE-2022-33987
                   CVE-2022-32221 CVE-2022-32208 CVE-2022-32207
                   CVE-2022-32206 CVE-2022-32205 CVE-2022-32189
                   CVE-2022-32149 CVE-2022-32148 CVE-2022-31129
                   CVE-2022-30635 CVE-2022-30634 CVE-2022-30633
                   CVE-2022-30632 CVE-2022-30631 CVE-2022-30630
                   CVE-2022-30629 CVE-2022-30580 CVE-2022-30115
                   CVE-2022-29804 CVE-2022-29526 CVE-2022-28327
                   CVE-2022-28131 CVE-2022-27782 CVE-2022-27781
                   CVE-2022-27780 CVE-2022-27779 CVE-2022-27778
                   CVE-2022-27776 CVE-2022-27775 CVE-2022-27774
                   CVE-2022-27664 CVE-2022-27536 CVE-2022-27191
                   CVE-2022-25881 CVE-2022-24999 CVE-2022-24921
                   CVE-2022-24675 CVE-2022-23806 CVE-2022-23773
                   CVE-2022-23772 CVE-2022-23491 CVE-2022-22576
                   CVE-2022-3517 CVE-2022-3510 CVE-2022-3509
                   CVE-2022-3171 CVE-2022-2880 CVE-2022-2879
                   CVE-2022-2309 CVE-2022-1962 CVE-2022-1941
                   CVE-2022-1705 CVE-2021-44717 CVE-2021-44716
                   CVE-2021-43565 CVE-2021-41772 CVE-2021-41771
                   CVE-2021-41184 CVE-2021-41183 CVE-2021-41182
                   CVE-2021-39293 CVE-2021-38561 CVE-2021-38297
                   CVE-2021-36976 CVE-2021-36221 CVE-2021-34558
                   CVE-2021-33198 CVE-2021-33197 CVE-2021-33196
                   CVE-2021-33195 CVE-2021-33194 CVE-2021-31566
                   CVE-2021-31525 CVE-2021-29923 CVE-2021-29425
                   CVE-2021-29060 CVE-2021-27919 CVE-2021-27918
                   CVE-2021-23382 CVE-2021-23343 CVE-2021-22947
                   CVE-2021-22946 CVE-2021-22945 CVE-2021-22926
                   CVE-2021-22925 CVE-2021-22924 CVE-2021-22923
                   CVE-2021-22922 CVE-2021-22901 CVE-2021-22898
                   CVE-2021-22897 CVE-2021-22890 CVE-2021-22876
                   CVE-2021-22569 CVE-2021-20066 CVE-2021-3803
                   CVE-2021-3572 CVE-2021-3520 CVE-2020-29652
                   CVE-2020-28851 CVE-2020-28469 CVE-2020-14155
                   CVE-2020-8908 CVE-2020-8286 CVE-2020-8285
                   CVE-2020-8284 CVE-2020-8231 CVE-2020-8177
                   CVE-2020-8169 CVE-2019-20838 CVE-2019-20454
                   CVE-2018-20225 CVE-2018-10237 CVE-2013-7489

Original Bulletin: 
   https://advisory.splunk.com//advisories/SVD-2023-0808

Comment: CVSS (Max):  9.8 CVE-2023-29405 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: [NIST], GitHub, Google Inc.
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

August Third Party Package Updates in Splunk Enterprise

Advisory ID: SVD-2023-0808

CVE ID: Multiple

Published: 2023-08-30

Last Update: 2023-08-30

Description

Splunk remedied common vulnerabilities and exposures (CVEs) in Third Party
Packages in Splunk Enterprise, including the folLowing:

     CVE             Package            Remediation     Severity
CVE-2022-38900 decode-uri-component Upgraded to 6.0.0   High
CVE-2022-33987 got                  Upgraded to 12.5.3  Medium
CVE-2022-37601 loader-utils         Upgraded to 1.4.2   Critical
CVE-2021-23382 postcss              Upgraded to 7.0.37  High
CVE-2021-29060 color-string         Upgraded to 1.5.5   Medium
CVE-2022-38900 decode-uri-component Upgraded to 0.2.1   High
CVE-2020-28469 glob-parent          Upgraded to 5.1.2   High
CVE-2022-37599 loader-utils         Upgraded to 2.0.4   High
CVE-2022-37601 loader-utils         Upgraded to 2.0.4   Critical
CVE-2022-37603 loader-utils         Upgraded to 2.0.4   High
CVE-2022-3517  minimatch            Upgraded to 3.0.5   High
CVE-2022-31129 moment               Upgraded to 2.29.4  High
CVE-2021-3803  nth-check            Upgraded to 2.0.1   High
CVE-2021-23343 path-parse           Upgraded to 1.0.7   High
CVE-2022-24999 qs                   Upgraded to 6.5.3   High
CVE-2023-27538 curl                 Upgraded to 8.0.1   Medium
CVE-2023-27537 curl                 Upgraded to 8.0.1   Medium
CVE-2023-27536 curl                 Upgraded to 8.0.1   Medium
CVE-2023-27535 curl                 Upgraded to 8.0.1   Medium
CVE-2023-27534 curl                 Upgraded to 8.0.1   High
CVE-2023-27533 curl                 Upgraded to 8.0.1   High
CVE-2023-23916 curl                 Upgraded to 8.0.1   Medium
CVE-2023-23915 curl                 Upgraded to 8.0.1   Medium
CVE-2023-23914 curl                 Upgraded to 8.0.1   Critical
CVE-2022-43552 curl                 Upgraded to 8.0.1   Medium
CVE-2022-43551 curl                 Upgraded to 8.0.1   High
CVE-2022-42916 curl                 Upgraded to 8.0.1   High
CVE-2022-42915 curl                 Upgraded to 8.0.1   High
CVE-2022-35260 curl                 Upgraded to 8.0.1   Medium
CVE-2022-32221 curl                 Upgraded to 8.0.1   Critical
CVE-2022-35252 curl                 Upgraded to 8.0.1   Low
CVE-2022-32208 curl                 Upgraded to 8.0.1   Medium
CVE-2022-32207 curl                 Upgraded to 8.0.1   Critical
CVE-2022-32206 curl                 Upgraded to 8.0.1   Medium
CVE-2022-32205 curl                 Upgraded to 8.0.1   Medium
CVE-2022-30115 curl                 Upgraded to 8.0.1   Medium
CVE-2022-27782 curl                 Upgraded to 8.0.1   High
CVE-2022-27781 curl                 Upgraded to 8.0.1   High
CVE-2022-27780 curl                 Upgraded to 8.0.1   High
CVE-2022-27779 curl                 Upgraded to 8.0.1   Medium
CVE-2022-27778 curl                 Upgraded to 8.0.1   High
CVE-2022-27776 curl                 Upgraded to 8.0.1   Medium
CVE-2022-27775 curl                 Upgraded to 8.0.1   High
CVE-2022-27774 curl                 Upgraded to 8.0.1   Medium
CVE-2022-22576 curl                 Upgraded to 8.0.1   High
CVE-2021-22947 curl                 Upgraded to 8.0.1   Medium
CVE-2021-22946 curl                 Upgraded to 8.0.1   High
CVE-2021-22945 curl                 Upgraded to 8.0.1   Critical
CVE-2021-22926 curl                 Upgraded to 8.0.1   High
CVE-2021-22925 curl                 Upgraded to 8.0.1   Medium
CVE-2021-22924 curl                 Upgraded to 8.0.1   Low
CVE-2021-22923 curl                 Upgraded to 8.0.1   Medium
CVE-2021-22922 curl                 Upgraded to 8.0.1   Medium
CVE-2021-22901 curl                 Upgraded to 8.0.1   High
CVE-2021-22898 curl                 Upgraded to 8.0.1   Low
CVE-2021-22897 curl                 Upgraded to 8.0.1   Medium
CVE-2021-22890 curl                 Upgraded to 8.0.1   Low
CVE-2021-22876 curl                 Upgraded to 8.0.1   Medium
CVE-2020-8286  curl                 Upgraded to 8.0.1   High
CVE-2020-8285  curl                 Upgraded to 8.0.1   High
CVE-2020-8284  curl                 Upgraded to 8.0.1   Low
CVE-2020-8231  curl                 Upgraded to 8.0.1   High
CVE-2020-8177  curl                 Upgraded to 8.0.1   High
CVE-2020-8169  curl                 Upgraded to 8.0.1   High
CVE-2022-29804 go                   Upgraded to 1.19.8  High
CVE-2022-32189 go                   Upgraded to 1.19.8  High
CVE-2022-32148 go                   Upgraded to 1.19.8  Medium
CVE-2022-30635 go                   Upgraded to 1.19.8  High
CVE-2022-30633 go                   Upgraded to 1.19.8  High
CVE-2022-30632 go                   Upgraded to 1.19.8  High
CVE-2022-30631 go                   Upgraded to 1.19.8  High
CVE-2022-30630 go                   Upgraded to 1.19.8  High
CVE-2022-30629 go                   Upgraded to 1.19.8  Low
CVE-2022-30580 go                   Upgraded to 1.19.8  High
CVE-2022-28131 go                   Upgraded to 1.19.8  High
CVE-2022-1962  go                   Upgraded to 1.19.8  Medium
CVE-2022-1705  go                   Upgraded to 1.19.8  Medium
CVE-2022-30634 go                   Upgraded to 1.19.8  High
CVE-2022-29526 go                   Upgraded to 1.19.8  Medium
CVE-2022-28327 go                   Upgraded to 1.19.8  High
CVE-2022-24675 go                   Upgraded to 1.19.8  High
CVE-2022-27191 go                   Upgraded to 1.19.8  High
CVE-2022-24921 go                   Upgraded to 1.19.8  High
CVE-2022-23806 go                   Upgraded to 1.19.8  Critical
CVE-2022-23773 go                   Upgraded to 1.19.8  High
CVE-2022-23772 go                   Upgraded to 1.19.8  High
CVE-2021-39293 go                   Upgraded to 1.19.8  High
CVE-2021-44716 go                   Upgraded to 1.19.8  High
CVE-2021-44717 go                   Upgraded to 1.19.8  Medium
CVE-2021-41772 go                   Upgraded to 1.19.8  High
CVE-2021-41771 go                   Upgraded to 1.19.8  High
CVE-2021-38297 go                   Upgraded to 1.19.8  Critical
CVE-2021-36221 go                   Upgraded to 1.19.8  Medium
CVE-2021-29923 go                   Upgraded to 1.19.8  High
CVE-2021-33198 go                   Upgraded to 1.19.8  High
CVE-2021-33197 go                   Upgraded to 1.19.8  Medium
CVE-2021-33196 go                   Upgraded to 1.19.8  High
CVE-2021-33195 go                   Upgraded to 1.19.8  High
CVE-2021-34558 go                   Upgraded to 1.19.8  Medium
CVE-2021-31525 go                   Upgraded to 1.19.8  Medium
CVE-2021-33194 go                   Upgraded to 1.19.8  High
CVE-2021-27919 go                   Upgraded to 1.19.8  Medium
CVE-2021-27918 go                   Upgraded to 1.19.8  High
CVE-2022-29804 go                   Upgraded to 1.19.8  High
CVE-2022-32189 go                   Upgraded to 1.19.8  High
CVE-2022-32148 go                   Upgraded to 1.19.8  Medium
CVE-2022-30635 go                   Upgraded to 1.19.8  High
CVE-2022-30633 go                   Upgraded to 1.19.8  High
CVE-2022-30632 go                   Upgraded to 1.19.8  High
CVE-2022-30631 go                   Upgraded to 1.19.8  High
CVE-2022-30630 go                   Upgraded to 1.19.8  High
CVE-2022-30629 go                   Upgraded to 1.19.8  Low
CVE-2022-30580 go                   Upgraded to 1.19.8  High
CVE-2022-28131 go                   Upgraded to 1.19.8  High
CVE-2022-1962  go                   Upgraded to 1.19.8  Medium
CVE-2022-1705  go                   Upgraded to 1.19.8  Medium
CVE-2022-30634 go                   Upgraded to 1.19.8  High
CVE-2022-29526 go                   Upgraded to 1.19.8  Medium
CVE-2022-28327 go                   Upgraded to 1.19.8  High
CVE-2022-24675 go                   Upgraded to 1.19.8  High
CVE-2022-27191 go                   Upgraded to 1.19.8  High
CVE-2022-24921 go                   Upgraded to 1.19.8  High
CVE-2022-23806 go                   Upgraded to 1.19.8  Critical
CVE-2022-23773 go                   Upgraded to 1.19.8  High
CVE-2022-23772 go                   Upgraded to 1.19.8  High
CVE-2021-39293 go                   Upgraded to 1.19.8  High
CVE-2021-44716 go                   Upgraded to 1.19.8  High
CVE-2021-44717 go                   Upgraded to 1.19.8  Medium
CVE-2021-41772 go                   Upgraded to 1.19.8  High
CVE-2021-41771 go                   Upgraded to 1.19.8  High
CVE-2021-38297 go                   Upgraded to 1.19.8  Critical
CVE-2022-29804 go                   Upgraded to 1.19.8  High
CVE-2022-32189 go                   Upgraded to 1.19.8  High
CVE-2022-32148 go                   Upgraded to 1.19.8  Medium
CVE-2022-30635 go                   Upgraded to 1.19.8  High
CVE-2022-30633 go                   Upgraded to 1.19.8  High
CVE-2022-30632 go                   Upgraded to 1.19.8  High
CVE-2022-30631 go                   Upgraded to 1.19.8  High
CVE-2022-30630 go                   Upgraded to 1.19.8  High
CVE-2022-30629 go                   Upgraded to 1.19.8  Low
CVE-2022-30580 go                   Upgraded to 1.19.8  High
CVE-2022-28131 go                   Upgraded to 1.19.8  High
CVE-2022-1962  go                   Upgraded to 1.19.8  Medium
CVE-2022-1705  go                   Upgraded to 1.19.8  Medium
CVE-2022-30634 go                   Upgraded to 1.19.8  High
CVE-2022-29526 go                   Upgraded to 1.19.8  Medium
CVE-2022-27536 go                   Upgraded to 1.19.8  High
CVE-2022-28327 go                   Upgraded to 1.19.8  High
CVE-2022-23806 go                   Upgraded to 1.2     Critical
CVE-2021-38297 go                   Upgraded to 1.2     Critical
CVE-2022-23806 go                   Upgraded to 1.2     Critical
CVE-2022-32149 go                   Upgraded to 1.2     High
CVE-2022-30635 go                   Upgraded to 1.2     High
CVE-2022-23772 go                   Upgraded to 1.2     High
CVE-2022-40023 go                   Upgraded to 1.2     High
CVE-2022-40023 go                   Upgraded to 1.2     High
CVE-2021-43565 go                   Upgraded to 1.2     High
CVE-2022-30580 go                   Upgraded to 1.2     High
CVE-2022-30580 go                   Upgraded to 1.2     High
CVE-2022-30633 go                   Upgraded to 1.2     High
CVE-2022-30633 go                   Upgraded to 1.2     High
CVE-2022-28131 go                   Upgraded to 1.2     High
CVE-2022-28131 go                   Upgraded to 1.2     High
CVE-2022-30632 go                   Upgraded to 1.2     High
CVE-2022-30632 go                   Upgraded to 1.2     High
CVE-2021-38561 go                   Upgraded to 1.2     High
CVE-2022-41716 go                   Upgraded to 1.2     High
CVE-2022-41716 go                   Upgraded to 1.2     High
CVE-2022-40899 go                   Upgraded to 1.2     High
CVE-2022-28327 go                   Upgraded to 1.2     High
CVE-2022-28327 go                   Upgraded to 1.2     High
CVE-2022-24921 go                   Upgraded to 1.2     High
CVE-2022-24921 go                   Upgraded to 1.2     High
CVE-2022-30630 go                   Upgraded to 1.2     High
CVE-2022-30630 go                   Upgraded to 1.2     High
CVE-2022-27191 go                   Upgraded to 1.2     High
CVE-2022-27191 go                   Upgraded to 1.2     High
CVE-2022-42003 go                   Upgraded to 1.2     High
CVE-2022-23773 go                   Upgraded to 1.2     High
CVE-2022-23773 go                   Upgraded to 1.2     High
CVE-2022-30634 go                   Upgraded to 1.2     High
CVE-2020-29652 go                   Upgraded to 1.2     High
CVE-2022-41715 go                   Upgraded to 1.2     High
CVE-2022-41715 go                   Upgraded to 1.2     High
CVE-2022-24675 go                   Upgraded to 1.2     High
CVE-2022-24675 go                   Upgraded to 1.2     High
CVE-2022-30634 go                   Upgraded to 1.2     High
CVE-2022-41720 go                   Upgraded to 1.2     High
CVE-2022-3510  go                   Upgraded to 1.2     High
CVE-2022-27664 go                   Upgraded to 1.2     High
CVE-2022-23491 go                   Upgraded to 1.2     High
CVE-2022-23491 go                   Upgraded to 1.2     High
CVE-2022-2880  go                   Upgraded to 1.2     High
CVE-2022-2880  go                   Upgraded to 1.2     High
CVE-2022-29804 go                   Upgraded to 1.2     High
CVE-2022-32189 go                   Upgraded to 1.2     High
CVE-2022-32189 go                   Upgraded to 1.2     High
CVE-2021-39293 go                   Upgraded to 1.2     High
CVE-2021-41772 go                   Upgraded to 1.2     High
CVE-2022-29804 go                   Upgraded to 1.2     High
CVE-2022-30635 go                   Upgraded to 1.2     High
CVE-2022-23772 go                   Upgraded to 1.2     High
CVE-2022-41720 go                   Upgraded to 1.2     High
CVE-2022-3509  go                   Upgraded to 1.2     High
CVE-2022-2309  go                   Upgraded to 1.2     High
CVE-2022-30631 go                   Upgraded to 1.2     High
CVE-2022-30631 go                   Upgraded to 1.2     High
CVE-2018-20225 go                   Upgraded to 1.2     High
CVE-2022-32149 go                   Upgraded to 1.2     High
CVE-2021-43565 go                   Upgraded to 1.2     High
CVE-2020-28851 go                   Upgraded to 1.2     High
CVE-2022-42004 go                   Upgraded to 1.2     High
CVE-2022-1941  go                   Upgraded to 1.2     High
CVE-2022-3171  go                   Upgraded to 1.2     High
CVE-2021-41771 go                   Upgraded to 1.2     High
CVE-2022-2879  go                   Upgraded to 1.2     High
CVE-2022-2879  go                   Upgraded to 1.2     High
CVE-2022-1962  go                   Upgraded to 1.2     Medium
CVE-2022-29526 go                   Upgraded to 1.2     Medium
CVE-2021-44717 go                   Upgraded to 1.2     Medium
CVE-2022-1705  go                   Upgraded to 1.2     Medium
CVE-2021-22569 go                   Upgraded to 1.2     Medium
CVE-2021-29425 go                   Upgraded to 1.2     Medium
CVE-2022-1962  go                   Upgraded to 1.2     Medium
CVE-2022-29526 go                   Upgraded to 1.2     Medium
CVE-2022-1705  go                   Upgraded to 1.2     Medium
CVE-2013-7489  go                   Upgraded to 1.2     Medium
CVE-2022-32148 go                   Upgraded to 1.2     Medium
CVE-2022-32148 go                   Upgraded to 1.2     Medium
CVE-2021-20066 go                   Upgraded to 1.2     Medium
CVE-2021-3572  go                   Upgraded to 1.2     Medium
CVE-2018-10237 go                   Upgraded to 1.2     Medium
CVE-2022-40897 go                   Upgraded to 1.2     Medium
CVE-2022-30629 go                   Upgraded to 1.2     Low
CVE-2020-8908  go                   Upgraded to 1.2     Low
CVE-2022-30629 go                   Upgraded to 1.2     Low
CVE-2022-41722 go                   Upgraded to 1.2     High
CVE-2022-25881 http-cache-semantics Upgraded to 4.1.1   High
CVE-2022-42003 jackson-databind     Upgraded to 2.13.5  High
CVE-2022-42004 jackson-databind     Upgraded to 2.13.5  High
CVE-2021-41182 jquery-ui            Upgraded to 1.13.2  Medium
CVE-2021-41183 jquery-ui            Upgraded to 1.13.2  Medium
CVE-2021-41184 jquery-ui            Upgraded to 1.13.2  Medium
CVE-2022-46175 json5                Upgraded to 1.0.2   High
CVE-2022-36227 libarchive           Upgraded to 3.6.2   Critical
CVE-2021-31566 libarchive           Upgraded to 3.6.2   High
CVE-2021-36976 libarchive           Upgraded to 3.6.2   Medium
CVE-2021-3520  lz4                  Upgraded to. 1.9.4  Critical
CVE-2022-40023 mako                 Patched             High
CVE-2022-40023 mako                 Upgraded to 1.2.4   High
CVE-2020-14155 pcre2                Upgraded to 10.40   Medium
CVE-2019-20454 pcre2                Upgraded to 10.40   High
CVE-2019-20838 pcre2                Upgraded to 10.40   High
CVE-2022-35737 sqlite               Upgraded to 3.41.2  High
CVE-2023-29404 go                   Upgraded to 1.19.10 Critical
CVE-2023-29402 go                   Upgraded to 1.19.10 Critical
CVE-2023-24540 go                   Upgraded to 1.19.10 Critical
CVE-2023-29405 go                   Upgraded to 1.19.10 Critical
CVE-2023-29400 go                   Upgraded to 1.19.10 High
CVE-2023-24539 go                   Upgraded to 1.19.10 High
CVE-2023-29403 go                   Upgraded to 1.19.10 High
CVE-2023-29403 go                   Upgraded to 1.19.10 High

Solution

For Splunk Enterprise, upgrade versions to 8.2.12, 9.0.6, or 9.1.1.

Product Status

     Product      Version Component Affected Version Fix Version
Splunk Enterprise 8.2     -         8.2.0 to 8.2.11  8.2.12
Splunk Enterprise 9.0     -         9.0.0 to 9.0.5   9.0.6
Splunk Enterprise 9.1     -         9.1.0            9.1.1

Severity

For the CVEs in this list, Splunk adopted the national vulnerability database
(NVD) common vulnerability scoring system (CVSS) rating to align with industry
standards.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/

iQIVAwUBZPAWs8kNZI30y1K9AQir0Q//a6xmD8V3mtdIc3CdnZ5OCNmEGppj0HL6
pNxRKKbgUxWghr4TuJt3Bwzi7+G3X/G7souIa66LrC3wUmKFK1JAqXq1dF4eCnUE
pKkTon/RGEbXxxkdHoMkCDLNvq0yOEQNc7ZxKak7CEtQRCEEkk44vEsDcp4D0p+T
ELA1P9urtWypQe82UoZFdnFBOlHifPNTp4V4EcZxfFK8V6eGNkHB5XVyA5fRbQ8x
pPam6z4uW6DxJts0jXHB103Y4NRCpsc02bLp073CE9UPkyrWzviv4c6tATZopj9Y
757aGTE+Sg73tKJCrqbfr1Twl8fAyUb5o3J5dmK8K1ogZ0kv7rhG+OicZ2mxXgmY
X0NjOo70brb+sngir+hdnHMqJojmWAU5mSkX2K/xaAXF0AOajYf6c6X4q7M1A9y8
xaZX6xiXueEzaDCiMHY7b/gnq56FhuyQGtBHysUIui6WEEYNvVnfbsA5J7LNTvW4
pO7ahdtKXuzoeinyhfY7l6HHs+T0UdfT+jbpmdQi63GCiGfeTxZrPwpAJ+cxAHJ+
t1Uc+LvpucS3DvFzIky64MEJKCPtJZtIuKICI7XOZ5wscIY0NQpjPkpYxMRSX+/E
D6XvsoY+qc0esGaCW01Cf8C1/gQQfl41bL2XLZFe3XZC3PAYPJ1WGppuxLcWEXw+
O5M1npFwtHQ=
=DEOK
-----END PGP SIGNATURE-----