June Third Party Package Updates in Splunk Universal Forwarders
Advisory ID: SVD-2023-0614
CVE ID: Multiple
Published: 2023-06-01
Last Update: 2023-06-01
Description
Splunk remedied common vulnerabilities and exposures (CVEs) in Third Party Packages in versions 8.1.14, 8.2.11, and 9.0.5 of Splunk Universal Forwarder, including the following:
Package | Remediation | CVE | Severity |
---|---|---|---|
libxml2 | Patched | CVE-2022-40303 | High |
libxml2 | Patched | CVE-2022-40304 | High |
OpenSSL 1.0.2 | Upgraded to 1.0.2zg | CVE-2023-0286 | High |
OpenSSL 1.0.2 | Upgraded to 1.0.2zg | CVE-2023-0215 | High |
OpenSSL 1.0.2 | Upgraded to 1.0.2zg | CVE-2022-4304 | Medium |
curl | Upgraded to 8.0.1 | CVE-2023-27538 | Medium |
curl | Upgraded to 8.0.1 | CVE-2023-27537 | Medium |
curl | Upgraded to 8.0.1 | CVE-2023-27536 | Critical |
curl | Upgraded to 8.0.1 | CVE-2023-27535 | High |
curl | Upgraded to 8.0.1 | CVE-2023-27534 | High |
curl | Upgraded to 8.0.1 | CVE-2023-27533 | High |
curl | Upgraded to 8.0.1 | CVE-2023-23916 | Medium |
curl | Upgraded to 8.0.1 | CVE-2023-23915 | Medium |
curl | Upgraded to 8.0.1 | CVE-2023-23914 | Critical |
curl | Upgraded to 8.0.1 | CVE-2022-43552 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-43551 | High |
curl | Upgraded to 8.0.1 | CVE-2022-42916 | High |
curl | Upgraded to 8.0.1 | CVE-2022-42915 | Critical |
curl | Upgraded to 8.0.1 | CVE-2022-35260 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-32221 | Critical |
curl | Upgraded to 8.0.1 | CVE-2022-35252 | Low |
curl | Upgraded to 8.0.1 | CVE-2022-32208 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-32207 | Critical |
curl | Upgraded to 8.0.1 | CVE-2022-32206 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-32205 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-30115 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-27782 | High |
curl | Upgraded to 8.0.1 | CVE-2022-27781 | High |
curl | Upgraded to 8.0.1 | CVE-2022-27780 | High |
curl | Upgraded to 8.0.1 | CVE-2022-27779 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-27778 | High |
curl | Upgraded to 8.0.1 | CVE-2022-27776 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-27775 | High |
curl | Upgraded to 8.0.1 | CVE-2022-27774 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-22576 | High |
curl | Upgraded to 8.0.1 | CVE-2021-22947 | Medium |
curl | Upgraded to 8.0.1 | CVE-2021-22946 | High |
curl | Upgraded to 8.0.1 | CVE-2021-22945 | Critical |
curl | Upgraded to 8.0.1 | CVE-2021-22926 | High |
curl | Upgraded to 8.0.1 | CVE-2021-22925 | Medium |
curl | Upgraded to 8.0.1 | CVE-2021-22924 | Low |
curl | Upgraded to 8.0.1 | CVE-2021-22923 | Medium |
curl | Upgraded to 8.0.1 | CVE-2021-22922 | Medium |
curl | Upgraded to 8.0.1 | CVE-2021-22901 | High |
curl | Upgraded to 8.0.1 | CVE-2021-22898 | Low |
curl | Upgraded to 8.0.1 | CVE-2021-22897 | Medium |
curl | Upgraded to 8.0.1 | CVE-2021-22890 | Low |
curl | Upgraded to 8.0.1 | CVE-2021-22876 | Medium |
curl | Upgraded to 8.0.1 | CVE-2020-8286 | High |
curl | Upgraded to 8.0.1 | CVE-2020-8285 | High |
curl | Upgraded to 8.0.1 | CVE-2020-8284 | Low |
curl | Upgraded to 8.0.1 | CVE-2020-8231 | High |
curl | Upgraded to 8.0.1 | CVE-2020-8177 | High |
curl | Upgraded to 8.0.1 | CVE-2020-8169 | High |
libarchive | Upgraded to 3.6.2 | CVE-2022-36227 | Critical |
libarchive | Upgraded to 3.6.2 | CVE-2021-31566 | High |
libarchive | Upgraded to 3.6.2 | CVE-2021-36976 | Medium |
lz4 | Upgraded to 1.9.4 | CVE-2021-3520 | Critical |
SQLite | Upgraded to 3.41.2 | CVE-2022-35737 | High |
zlib | Applied patch | CVE-2018-25032 | High |
zlib | Applied patch | CVE-2022-37434 | Critical |
Solution
For Splunk Universal Forwarder, upgrade versions to 8.1.14, 8.2.11, 9.0.5, or higher.
Product Status
Product | Version | Component | Affected Version | Fix Version |
---|---|---|---|---|
Universal Forwarders | 8.1 | - | 8.1.13 and Lower | 8.1.14 |
Universal Forwarders | 8.2 | - | 8.2.0 to 8.2.10 | 8.2.11 |
Universal Forwarders | 9.0 | - | 9.0.0 to 9.0.4 | 9.0.5 |
Severity
For the CVEs in this list, Splunk adopted the national vulnerability database (NVD) CVSS rating to align with industry standards.