Multiple CVEs identified by vulnerability scanning tools addressed via Brocade ASCG v3.1.0
24891
06 August 2024
06 August 2024
CLOSED
MEDIUM
Varies
CVE-2023-5981, CVE-2023-27043, CVE-2023-51385, CVE-2023-48795, CVE-2021-35939, CVE-2021-35937, CVE-2021-35938, CVE-2023-48795, CVE-2021-41043, CVE-2020-28241, CVE-2023-28322, CVE-2023-46218, CVE-2023-38546, CVE-2024-28834, CVE-2024-22365, CVE-2023-6004, CVE-2023-6918, CVE-2023-46316, CVE-2022-4645, CVE-2023-6135, CVE-2023-43804, CVE-2023-5678
Brocade Security Advisory ID |
BSA-2024-2717 |
Component |
Rocky Linux |
|
|
Summary
ASCG v3.1.0 utilizes Rocky Linux version 8.10, addressing a number of potential security vulnerabilities. A complete list of CVEs reported by Rocky Linux as being addressed in this update are provided in the ASCG v3.1.0 Release Notes.
In addition, a number of CVEs identified via internal security scanning are also being addressed within the ASCG v3.1.0 release:
Security Update |
CVE ID |
Gnutls [RLSA-2024:0155] |
CVE-2023-5981 |
Python3 [RLSA-2024:0256] |
CVE-2023-27043 |
Openssh [RLSA-2024:0606] |
CVE-2023-51385, CVE-2023-48795 |
Rpm [RLSA-2024:0647] |
CVE-2021-35939, CVE-2021-35937, CVE-2021-35938 |
Libssh [RLSA-2024:0628] |
CVE-2023-48795 |
Tcpdump [RLSA-2024:0769] |
CVE-2021-41043 |
Libmaxminddb [RLSA-2024:0768] |
CVE-2020-28241 |
Curl [RLSA-2024:1601] |
CVE-2023-28322, CVE-2023-46218, CVE-2023-38546 |
Gnutls [RLSA-2024:1784] |
CVE-2024-28834 |
Pam [RLSA-2024:3163] |
CVE-2024-22365 |
libssh [RLSA-2024:3233] |
CVE-2023-6004, CVE-2023-6918 |
traceroute [RLSA-2024:3211] |
CVE-2023-46316 |
libtiff [RLSA-2024:3059] |
CVE-2022-4645 |
nss [RLSA-2024:0786] |
CVE-2023-6135 |
urllib3 |
CVE-2023-43804 |
openssl |
CVE-2023-5678 |
Solution
Security updates for all CVEs listed above provided in Brocade ASCG v3.1.0 and later versions
Revision History
Version |
Change |
Date |
1.0 |
Initial Publication |
August 6, 2024 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.