ESB-2018.2169 - [Ubuntu][RedHat] Red Hat Ceph Storage 2.5: Multiple vulnerabilities 2018-07-27

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2169
         Moderate: Red Hat Ceph Storage 2.5 security, enhancement,
                            and bug fix update
                               27 July 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat Ceph Storage 2.5
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 7
                   Red Hat Enterprise Linux WS/Desktop 7
                   Ubuntu
Impact/Access:     Delete Arbitrary Files         -- Existing Account            
                   Provide Misleading Information -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-10861 CVE-2018-1129 CVE-2018-1128

Reference:         ESB-2018.2030

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2018:2261
   https://access.redhat.com/errata/RHSA-2018:2274

Comment: This bulletin contains two (2) Red Hat security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory (PDC)

Synopsis:          Moderate: Red Hat Ceph Storage 2.5 security, enhancement, and bug fix update
Advisory ID:       RHSA-2018:2261-01
Product:           Red Hat Ceph Storage
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:2261
Issue date:        2018-07-26
CVE Names:         CVE-2018-1128 CVE-2018-1129 CVE-2018-10861 
=====================================================================

1. Summary:

An update for ceph is now available for Red Hat Ceph Storage 2.5 for Red
Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Ceph Storage 2.5 Client-Tools - noarch, x86_64
Red Hat Ceph Storage 2.5 ComputeNode-Tools - noarch, x86_64
Red Hat Ceph Storage 2.5 MON - x86_64
Red Hat Ceph Storage 2.5 OSD - x86_64
Red Hat Ceph Storage 2.5 Server-Tools - noarch, x86_64
Red Hat Ceph Storage 2.5 Workstation-Tools - noarch, x86_64

3. Description:

Red Hat Ceph Storage is a scalable, open, software-defined storage platform
that combines the most stable version of the Ceph storage system with a
Ceph management platform, deployment utilities, and support services.

Security Fix(es):

* ceph: cephx protocol is vulnerable to replay attack (CVE-2018-1128)

* ceph: cephx uses weak signatures (CVE-2018-1129)

* ceph: ceph-mon does not perform authorization on OSD pool ops
(CVE-2018-10861)

For more details about the security issue(s), including the impact, a CVSS
score and other related information refer to the CVE page(s) listed in the
Reference section.

Enhancement(s):

* Ceph OSDs now logs when they shutdown due to disk operations timing out
by default. (BZ#1568897)

* The `radosgw-admin orphans find` command can inadvertently remove data
objects still in use, if followed by another operation, such as, a `rados
rm` command. Users are now warned before attempting to produce lists of
potentially orphaned objects. (BZ#1573656)

* The 'ceph-osdomap-tool' now has a 'compact' command to perform offline
compaction on an OSD's 'omap' directory. (BZ#1574231)

* For S3 and Swift protocols, an option to list buckets/containers in
natural (partial) order has been added. Listing containers in sorted order
is canonical in both protocols, but is costly, and not required by some
client applications. The performance and workload cost of S3 and Swift
bucket/container listings is reduced for sharded buckets/containers when
the `allow_unordered` extension is used. (BZ#1595374)

* An asynchronous mechanism for executing the Ceph Object Gateway garbage
collection using the `librados` APIs has been introduced. The original
garbage collection mechanism serialized all processing, and lagged behind
applications in specific workloads. Garbage collection performance has been
significantly improved, and can be tuned to specific site requirements.
(BZ#1595383)

Bug Fix(es):

These updated ceph packages include numerous bug fixes. Space precludes
documenting all of these changes in this advisory. Users are directed to
the Red Hat Ceph Storage 2.5 Release Notes for information on the most
significant bug fixes for this release:

https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2.5/html
/release_notes/bug_fixes

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1448084 - [rbd-mirror] : manually removing a replicated image might result in an empty image
1515341 - [rbd] rbd du on empty pool does not return proper output
1522881 - RGW Memory Leak
1548071 - [CEE/SD][ceph-ansible][RHCS2]rolling-update.yml does not set noout,noscrub and nodeep-scrub flags
1554963 - Pool create cmd's expected_num_objects is not properly interpreted
1563825 - Ubuntu build errors because of "no such option: --use-wheel" in pip
1568897 - [RFE][CEE/SD] change "osd_max_markdown_count" dout level from (10) -> (0) for RHCS 2.y version
1574231 - RHCS 2.5.1 - Add compact operation to ceph-osdomap-tool
1575866 - CVE-2018-1128 ceph: cephx protocol is vulnerable to replay attack
1576057 - CVE-2018-1129 ceph: cephx uses weak signatures
1581579 - After latest environment update all ceph-disk@dev-sdXX.service are in failed state
1584218 - RGW listing versioned bucket objects always give 1 extra entry in the list in every 1000 entries
1584763 - Some versioned objects don't sync when uploaded with 's3cmd sync'
1584829 - objects in cache never refresh after rgw_cache_expiry_interval
1593308 - CVE-2018-10861 ceph: ceph-mon does not perform authorization on OSD pool ops
1595374 - [RFE] rgw: implement partial order bucket/container listing (perf)
1595383 - [RFE] implement parallel async/mt garbage collection
1595386 - RGW spinning at 100% CPU with no op traffic
1599507 - [Continuous OSD memory usage growth in a HEALTH_OK cluster] RGW workload makes OSD memory explode

6. Package List:

Red Hat Ceph Storage 2.5 Client-Tools:

Source:
ceph-10.2.10-28.el7cp.src.rpm
ceph-ansible-3.0.39-1.el7cp.src.rpm

noarch:
ceph-ansible-3.0.39-1.el7cp.noarch.rpm

x86_64:
ceph-base-10.2.10-28.el7cp.x86_64.rpm
ceph-common-10.2.10-28.el7cp.x86_64.rpm
ceph-debuginfo-10.2.10-28.el7cp.x86_64.rpm
ceph-fuse-10.2.10-28.el7cp.x86_64.rpm
ceph-mds-10.2.10-28.el7cp.x86_64.rpm
ceph-radosgw-10.2.10-28.el7cp.x86_64.rpm
ceph-selinux-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-devel-10.2.10-28.el7cp.x86_64.rpm
librados2-10.2.10-28.el7cp.x86_64.rpm
librados2-devel-10.2.10-28.el7cp.x86_64.rpm
librbd1-10.2.10-28.el7cp.x86_64.rpm
librbd1-devel-10.2.10-28.el7cp.x86_64.rpm
librgw2-10.2.10-28.el7cp.x86_64.rpm
librgw2-devel-10.2.10-28.el7cp.x86_64.rpm
python-cephfs-10.2.10-28.el7cp.x86_64.rpm
python-rados-10.2.10-28.el7cp.x86_64.rpm
python-rbd-10.2.10-28.el7cp.x86_64.rpm
rbd-mirror-10.2.10-28.el7cp.x86_64.rpm

Red Hat Ceph Storage 2.5 ComputeNode-Tools:

Source:
ceph-10.2.10-28.el7cp.src.rpm
ceph-ansible-3.0.39-1.el7cp.src.rpm

noarch:
ceph-ansible-3.0.39-1.el7cp.noarch.rpm

x86_64:
ceph-base-10.2.10-28.el7cp.x86_64.rpm
ceph-common-10.2.10-28.el7cp.x86_64.rpm
ceph-debuginfo-10.2.10-28.el7cp.x86_64.rpm
ceph-fuse-10.2.10-28.el7cp.x86_64.rpm
ceph-mds-10.2.10-28.el7cp.x86_64.rpm
ceph-radosgw-10.2.10-28.el7cp.x86_64.rpm
ceph-selinux-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-devel-10.2.10-28.el7cp.x86_64.rpm
librados2-10.2.10-28.el7cp.x86_64.rpm
librados2-devel-10.2.10-28.el7cp.x86_64.rpm
librbd1-10.2.10-28.el7cp.x86_64.rpm
librbd1-devel-10.2.10-28.el7cp.x86_64.rpm
librgw2-10.2.10-28.el7cp.x86_64.rpm
librgw2-devel-10.2.10-28.el7cp.x86_64.rpm
python-cephfs-10.2.10-28.el7cp.x86_64.rpm
python-rados-10.2.10-28.el7cp.x86_64.rpm
python-rbd-10.2.10-28.el7cp.x86_64.rpm
rbd-mirror-10.2.10-28.el7cp.x86_64.rpm

Red Hat Ceph Storage 2.5 MON:

Source:
ceph-10.2.10-28.el7cp.src.rpm

x86_64:
ceph-base-10.2.10-28.el7cp.x86_64.rpm
ceph-common-10.2.10-28.el7cp.x86_64.rpm
ceph-debuginfo-10.2.10-28.el7cp.x86_64.rpm
ceph-mon-10.2.10-28.el7cp.x86_64.rpm
ceph-selinux-10.2.10-28.el7cp.x86_64.rpm
ceph-test-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-devel-10.2.10-28.el7cp.x86_64.rpm
librados2-10.2.10-28.el7cp.x86_64.rpm
librados2-devel-10.2.10-28.el7cp.x86_64.rpm
librbd1-10.2.10-28.el7cp.x86_64.rpm
librbd1-devel-10.2.10-28.el7cp.x86_64.rpm
librgw2-10.2.10-28.el7cp.x86_64.rpm
librgw2-devel-10.2.10-28.el7cp.x86_64.rpm
python-cephfs-10.2.10-28.el7cp.x86_64.rpm
python-rados-10.2.10-28.el7cp.x86_64.rpm
python-rbd-10.2.10-28.el7cp.x86_64.rpm

Red Hat Ceph Storage 2.5 OSD:

Source:
ceph-10.2.10-28.el7cp.src.rpm

x86_64:
ceph-base-10.2.10-28.el7cp.x86_64.rpm
ceph-common-10.2.10-28.el7cp.x86_64.rpm
ceph-debuginfo-10.2.10-28.el7cp.x86_64.rpm
ceph-osd-10.2.10-28.el7cp.x86_64.rpm
ceph-selinux-10.2.10-28.el7cp.x86_64.rpm
ceph-test-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-devel-10.2.10-28.el7cp.x86_64.rpm
librados2-10.2.10-28.el7cp.x86_64.rpm
librados2-devel-10.2.10-28.el7cp.x86_64.rpm
librbd1-10.2.10-28.el7cp.x86_64.rpm
librbd1-devel-10.2.10-28.el7cp.x86_64.rpm
librgw2-10.2.10-28.el7cp.x86_64.rpm
librgw2-devel-10.2.10-28.el7cp.x86_64.rpm
python-cephfs-10.2.10-28.el7cp.x86_64.rpm
python-rados-10.2.10-28.el7cp.x86_64.rpm
python-rbd-10.2.10-28.el7cp.x86_64.rpm

Red Hat Ceph Storage 2.5 Server-Tools:

Source:
ceph-10.2.10-28.el7cp.src.rpm
ceph-ansible-3.0.39-1.el7cp.src.rpm

noarch:
ceph-ansible-3.0.39-1.el7cp.noarch.rpm

x86_64:
ceph-base-10.2.10-28.el7cp.x86_64.rpm
ceph-common-10.2.10-28.el7cp.x86_64.rpm
ceph-debuginfo-10.2.10-28.el7cp.x86_64.rpm
ceph-fuse-10.2.10-28.el7cp.x86_64.rpm
ceph-mds-10.2.10-28.el7cp.x86_64.rpm
ceph-radosgw-10.2.10-28.el7cp.x86_64.rpm
ceph-selinux-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-devel-10.2.10-28.el7cp.x86_64.rpm
librados2-10.2.10-28.el7cp.x86_64.rpm
librados2-devel-10.2.10-28.el7cp.x86_64.rpm
librbd1-10.2.10-28.el7cp.x86_64.rpm
librbd1-devel-10.2.10-28.el7cp.x86_64.rpm
librgw2-10.2.10-28.el7cp.x86_64.rpm
librgw2-devel-10.2.10-28.el7cp.x86_64.rpm
python-cephfs-10.2.10-28.el7cp.x86_64.rpm
python-rados-10.2.10-28.el7cp.x86_64.rpm
python-rbd-10.2.10-28.el7cp.x86_64.rpm
rbd-mirror-10.2.10-28.el7cp.x86_64.rpm

Red Hat Ceph Storage 2.5 Workstation-Tools:

Source:
ceph-10.2.10-28.el7cp.src.rpm
ceph-ansible-3.0.39-1.el7cp.src.rpm

noarch:
ceph-ansible-3.0.39-1.el7cp.noarch.rpm

x86_64:
ceph-base-10.2.10-28.el7cp.x86_64.rpm
ceph-common-10.2.10-28.el7cp.x86_64.rpm
ceph-debuginfo-10.2.10-28.el7cp.x86_64.rpm
ceph-fuse-10.2.10-28.el7cp.x86_64.rpm
ceph-mds-10.2.10-28.el7cp.x86_64.rpm
ceph-radosgw-10.2.10-28.el7cp.x86_64.rpm
ceph-selinux-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-devel-10.2.10-28.el7cp.x86_64.rpm
librados2-10.2.10-28.el7cp.x86_64.rpm
librados2-devel-10.2.10-28.el7cp.x86_64.rpm
librbd1-10.2.10-28.el7cp.x86_64.rpm
librbd1-devel-10.2.10-28.el7cp.x86_64.rpm
librgw2-10.2.10-28.el7cp.x86_64.rpm
librgw2-devel-10.2.10-28.el7cp.x86_64.rpm
python-cephfs-10.2.10-28.el7cp.x86_64.rpm
python-rados-10.2.10-28.el7cp.x86_64.rpm
python-rbd-10.2.10-28.el7cp.x86_64.rpm
rbd-mirror-10.2.10-28.el7cp.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-1128
https://access.redhat.com/security/cve/CVE-2018-1129
https://access.redhat.com/security/cve/CVE-2018-10861
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2.5/html/release_notes/bug_fixes

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBW1ob3tzjgjWX9erEAQjdExAAhfYqnLGq7AXZBXFNyWrvpng4Ez/JZrZ4
cMMsLYQAJl3G+TM9mQsQ+SJDL/Bug0NZ3Zcs341q4tOeykHGnvZzn4Ka0jHcTX23
mtr6V/tcrpscpMcRfPnnKQIOQ62E2KhxW4yxIw57S75amyM3k0oQ9LxYZSGGvRS7
vpLu3JqocwRf1OCDjLjnv7i54fhIhWZEdQVqZHOCFGairRArQJ9q0x49/jmwt3LU
qsuT9wu0Q98bNf1UOpc0R945tE18b/fpwUie4IXGqwpqVK7wKC0PfeKDxPqBhAlv
HZDFrogjBhwTI07vLN5oel/uhTsYUaClJ/QlJ0S+2DmNOuwQRK6Q4tC/sninE1Ne
byLKjSAW68GVFWt8BM7Eh5lhamkm7N1UK6IfjIrX4SMSpgUMaA8b2ec72QDP+j5G
amPdmNGvKGZspdvkkTJcn2lWi4wkcZEsbRGuOV4cnQz0pzHd+/L8R7GAKcXwrZUQ
bOKHhfaz64G22V5wPhZeJdUWXh+2hVh55s/3XadfBCD5Z3gxRcDc1HlenCG547Rk
Y6d0zlr8bm9RcEkbdCMMsxLnWoyYKEuq3qVHohxoKMqkCeN2WrCg7CwMGvSssGg4
PiDXUGHoxrbVxSqgCAoWy03r6nKMLzU3c4gN7j+aSAri2ZwLe/qQeRg6N6XRSd/D
2TBKH8KDoBU=
=DXPE
- -----END PGP SIGNATURE-----

- -------------------------------------------------------------------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Ceph Storage 2.5 security, enhancement, and bug fix update
Advisory ID:       RHSA-2018:2274-01
Product:           Red Hat Ceph Storage
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:2274
Issue date:        2018-07-26
CVE Names:         CVE-2018-1128 CVE-2018-1129 CVE-2018-10861 
=====================================================================

1. Summary:

An update for ceph is now available for Red Hat Ceph Storage 2.5 for Ubuntu
16.04.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat Ceph Storage is a scalable, open, software-defined storage platform
that combines the most stable version of the Ceph storage system with a
Ceph management platform, deployment utilities, and support services.

Security Fix(es):

* ceph: cephx protocol is vulnerable to replay attack (CVE-2018-1128)

* ceph: cephx uses weak signatures (CVE-2018-1129)

* ceph: ceph-mon does not perform authorization on OSD pool ops
(CVE-2018-10861)

For more details about the security issue(s), including the impact, a CVSS
score and other related information refer to the CVE page(s) listed in the
Reference section.

Enhancement(s):

* Ceph OSDs now log when they shutdown due to disk operations timing out by
default. (BZ#1568897)

* The `radosgw-admin orphans find` command can inadvertently remove data
objects still in use, if followed by another operation, such as, a `rados
rm` command. Users are now warned before attempting to produce lists of
potentially orphaned objects. (BZ#1573656)

* The 'ceph-osdomap-tool' now has a 'compact' command to perform offline
compaction on an OSD's 'omap' directory. (BZ#1574231)

* For S3 and Swift protocols, an option to list buckets/containers in
natural (partial) order has been added. Listing containers in sorted order
is canonical in both protocols, but is costly, and not required by some
client applications. The performance and workload cost of S3 and Swift
bucket/container listings is reduced for sharded buckets/containers when
the `allow_unordered` extension is used. (BZ#1595374)

* An asynchronous mechanism for executing the Ceph Object Gateway garbage
collection using the `librados` APIs has been introduced. The original
garbage collection mechanism serialized all processing, and lagged behind
applications in specific workloads. Garbage collection performance has been
significantly improved, and can be tuned to specific site requirements.
(BZ#1595383)

Bug Fix(es):

These updated Ceph packages include numerous bug fixes. Space precludes
documenting all of these changes in this advisory. Users are directed to
the Red Hat Ceph Storage 2.5 Release Notes for information on the most
significant bug fixes for this release:

https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2.5/html
/release_notes/bug_fixes

3. Solution:

The References section of this erratum contains a download link. You must
log in to download the update.

Refer to the Red Hat Ceph Storage 2 Installation Guide for more
information:

https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2/html-s
ingle/installation_guide_for_ubuntu/#enabling_the_red_hat_ceph_storage_repo
sitories

4. Bugs fixed (https://bugzilla.redhat.com/):

1575866 - CVE-2018-1128 ceph: cephx protocol is vulnerable to replay attack
1576057 - CVE-2018-1129 ceph: cephx uses weak signatures
1593308 - CVE-2018-10861 ceph: ceph-mon does not perform authorization on OSD pool ops

5. References:

https://access.redhat.com/security/cve/CVE-2018-1128
https://access.redhat.com/security/cve/CVE-2018-1129
https://access.redhat.com/security/cve/CVE-2018-10861
https://rhcs.download.redhat.com/ubuntu
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2.5/html/release_notes/bug_fixes

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBW1nqedzjgjWX9erEAQiKfhAAgjF9OBXSfS4hbBU6v6NGNhcKDjmHYcdB
ZvCsojXNS2IOOt7xPleIp3rl9+xG+CMtkaKBeGEEUX31aBYeXt9N6lLAmExx6NK5
iOJY85NaPJzJGz2ZViyWN/5sWgP9C7TrwXJbupzyRdSJzNCBz0ycTeJh5xCkJVUC
dW2pusH2hhm3YE3J5OSofMlCXhGYPecxLH3HYuY66UxxcseMGwpsRuZWqBwItgsA
LGpWwIqAwT4WvVMFMOUaOroR20eMyuQy57j1Qd0SPduoEr6UcRJgjT8K+dyxwiuJ
8+zxrFHCk7O7CEecwkVkDVmMaguw1gfpJPsSqP5JtOVpXLSuVR3Hq5Tvjh/YJBm2
ZUsJyh3Te7q6vccaEX2nNczO2e/yqIY5GpIaM3FcPdktg1gw4fPgzUPfFVXG8/DX
iLEh83c+u4+1GoiJd6cKnTwo0+gmxcpzKfCAVXDHV/rbFxPvDw9Yvh5MOWqNmqtf
CWSyROSOuPgIS0eMey0qMAeHXW8VyHMn6k6gfz4DYum3gRLFy5zFDa9t+Is+F7Ar
LPZ/FYTOamF/SCR/myoZ96xTr2Hy5k7yLOhgWsj0DLl7eGaG9OD/GGTfzJpQyDNu
rwPK2bbAdBeC7EUiQe0K7CUQ028clZlSA4vsJTuy7QsiGBUlcy/NY7jDufWp/3iA
76oGByf1oSk=
=2cms
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=668e
-----END PGP SIGNATURE-----

« Back to bulletins