August Third Party Package Updates in Splunk Universal Forwarder
Advisory ID: SVD-2023-0809
CVE ID: Multiple
Published: 2023-08-30
Last Update: 2023-08-30
Description
Splunk remedied common vulnerabilities and exposures (CVEs) in Third Party Packages in Splunk Universal Forwarder, including the folLowing:
Package | Remediation | CVE | Severity |
---|---|---|---|
libxslt | Patched | CVE-2021-30560 | High |
libxslt | Patched | CVE-2021-30560 | High |
curl | Upgraded to 8.0.1 | CVE-2023-27538 | Medium |
curl | Upgraded to 8.0.1 | CVE-2023-27537 | Medium |
curl | Upgraded to 8.0.1 | CVE-2023-27536 | Medium |
curl | Upgraded to 8.0.1 | CVE-2023-27535 | Medium |
curl | Upgraded to 8.0.1 | CVE-2023-27534 | High |
curl | Upgraded to 8.0.1 | CVE-2023-27533 | High |
curl | Upgraded to 8.0.1 | CVE-2023-23916 | Medium |
curl | Upgraded to 8.0.1 | CVE-2023-23915 | Medium |
curl | Upgraded to 8.0.1 | CVE-2023-23914 | Critical |
curl | Upgraded to 8.0.1 | CVE-2022-43552 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-43551 | High |
curl | Upgraded to 8.0.1 | CVE-2022-42916 | High |
curl | Upgraded to 8.0.1 | CVE-2022-42915 | High |
curl | Upgraded to 8.0.1 | CVE-2022-35260 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-32221 | Critical |
curl | Upgraded to 8.0.1 | CVE-2022-35252 | Low |
curl | Upgraded to 8.0.1 | CVE-2022-32208 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-32207 | Critical |
curl | Upgraded to 8.0.1 | CVE-2022-32206 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-32205 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-30115 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-27782 | High |
curl | Upgraded to 8.0.1 | CVE-2022-27781 | High |
curl | Upgraded to 8.0.1 | CVE-2022-27780 | High |
curl | Upgraded to 8.0.1 | CVE-2022-27779 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-27778 | High |
curl | Upgraded to 8.0.1 | CVE-2022-27776 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-27775 | High |
curl | Upgraded to 8.0.1 | CVE-2022-27774 | Medium |
curl | Upgraded to 8.0.1 | CVE-2022-22576 | High |
curl | Upgraded to 8.0.1 | CVE-2021-22947 | Medium |
curl | Upgraded to 8.0.1 | CVE-2021-22946 | High |
curl | Upgraded to 8.0.1 | CVE-2021-22945 | Critical |
curl | Upgraded to 8.0.1 | CVE-2021-22926 | High |
curl | Upgraded to 8.0.1 | CVE-2021-22925 | Medium |
curl | Upgraded to 8.0.1 | CVE-2021-22924 | Low |
curl | Upgraded to 8.0.1 | CVE-2021-22923 | Medium |
curl | Upgraded to 8.0.1 | CVE-2021-22922 | Medium |
curl | Upgraded to 8.0.1 | CVE-2021-22901 | High |
curl | Upgraded to 8.0.1 | CVE-2021-22898 | Low |
curl | Upgraded to 8.0.1 | CVE-2021-22897 | Medium |
curl | Upgraded to 8.0.1 | CVE-2021-22890 | Low |
curl | Upgraded to 8.0.1 | CVE-2021-22876 | Medium |
curl | Upgraded to 8.0.1 | CVE-2020-8286 | High |
curl | Upgraded to 8.0.1 | CVE-2020-8285 | High |
curl | Upgraded to 8.0.1 | CVE-2020-8284 | Low |
curl | Upgraded to 8.0.1 | CVE-2020-8231 | High |
curl | Upgraded to 8.0.1 | CVE-2020-8177 | High |
curl | Upgraded to 8.0.1 | CVE-2020-8169 | High |
libarchive | Upgraded to 3.6.2 | CVE-2022-36227 | Critical |
libarchive | Upgraded to 3.6.2 | CVE-2021-31566 | High |
libarchive | Upgraded to 3.6.2 | CVE-2021-36976 | Medium |
lz4 | Upgraded to. 1.9.4 | CVE-2021-3520 | Critical |
pcre2 | Upgraded to 10.40 | CVE-2020-14155 | Medium |
pcre2 | Upgraded to 10.40 | CVE-2019-20454 | High |
pcre2 | Upgraded to 10.40 | CVE-2019-20838 | High |
pcre2 | Upgraded to 10.40 | CVE-2020-14155 | Medium |
pcre2 | Upgraded to 10.40 | CVE-2019-20454 | High |
pcre2 | Upgraded to 10.40 | CVE-2019-20838 | High |
sqlite | Upgraded to 3.41.2 | CVE-2022-35737 | High |
Solution
For Splunk Universal Forwarder, upgrade versions to 8.2.12, 9.0.6, or 9.1.1.
Product Status
Product | Version | Component | Affected Version | Fix Version |
---|---|---|---|---|
Universal Forwarder | 8.2 | - | 8.2.0 to 8.2.11 | 8.2.12 |
Universal Forwarder | 9.0 | - | 9.0.0 to 9.0.5 | 9.0.6 |
Universal Forwarder | 9.1 | - | 9.1.0 | 9.1.1 |
Severity
For the CVEs in this list, Splunk adopted the national vulnerability database (NVD) common vulnerability scoring system (CVSS) rating to align with industry standards.