Summary
The latest update to the TrustKeeper scan engine that powers our Trustwave Vulnerability Management product (including both internal and external vulnerability scanning) is now available. Enjoy!
New Vulnerability Test Highlights
- Log4shell vulnerability detection active check.
- Credentialed checks detecting Log4J2 on CentOS, Debian, Fedora, FreeBSD, RedHat and Ubuntu.
Some of the more interesting vulnerability tests we added recently are as follows:
Apache
- Apache Log4J2 Remote Code Execution Active Check (CVE-2021-44228) (CVE-2021-44228)
CentOS Linux (Credentialed Checks)
- Apache Log4J2 Remote Code Execution RedHat (CVE-2021-44228) (CVE-2021-44228)
CentOS Linux (Credentialed Checks)
Debian Linux (Credentialed Checks)
- Apache Log4J2 Remote Code Execution Debian (CVE-2021-44228) (CVE-2021-44228)
- Debian bluez LTS Security Update (DLA-2827-1) (CVE-2019-8921, CVE-2019-8922, CVE-2021-41229)
- Debian gmp LTS Security Update (DLA-2837-1) (CVE-2021-43618)
- Debian icu Security Update (DSA-5014-1) (CVE-2020-21913)
- Debian libmodbus LTS Security Update (DLA-2825-1) (CVE-2019-14462, CVE-2019-14463)
- Debian libntlm LTS Security Update (DLA-2831-1) (CVE-2019-17455)
- Debian librecad LTS Security Update (DLA-2838-1) (CVE-2021-21898, CVE-2021-21899, CVE-2021-21900)
- Debian libvorbis LTS Security Update (DLA-2828-1) (CVE-2017-14160, CVE-2018-10392, CVE-2018-10393)
- Debian libvpx LTS Security Update (DLA-2829-1) (CVE-2020-0034)
- Debian linux-4.19 LTS Security Update (DLA-2785-1) (CVE-2020-16119, CVE-2020-3702, CVE-2021-22543, CVE-2021-33624, CVE-2021-3444, CVE-2021-34556, CVE-2021-35039, CVE-2021-35477, CVE-2021-3600, CVE-2021-3612, CVE-2021-3653, CVE-2021-3655, CVE-2021-3656, CVE-2021-3679, CVE-2021-37159, CVE-2021-3732, CVE-2021-3743, CVE-2021-3753, CVE-2021-38160, CVE-2021-38198, CVE-2021-38199, CVE-2021-38205, CVE-2021-40490)
- Debian mbedtls LTS Security Update (DLA-2826-1) (CVE-2018-9988, CVE-2018-9989, CVE-2020-36475, CVE-2020-36476, CVE-2020-36478, CVE-2021-24119)
- Debian nss LTS Security Update (DLA-2836-1) (CVE-2021-43527)
- Debian nss Security Update (DSA-5016-1) (CVE-2021-43527)
- Debian openjdk-17 Security Update (DSA-5012-1) (CVE-2021-35556, CVE-2021-35559, CVE-2021-35561, CVE-2021-35564, CVE-2021-35567, CVE-2021-35578, CVE-2021-35586, CVE-2021-35603)
- Debian opensc LTS Security Update (DLA-2832-1) (CVE-2019-15945, CVE-2019-15946, CVE-2019-19479, CVE-2020-26570, CVE-2020-26571, CVE-2020-26572)
- Debian roundcube Security Update (DSA-5013-1) (CVE-2021-44025, CVE-2021-44026)
- Debian rsync LTS Security Update (DLA-2833-1) (CVE-2018-5764)
- Debian rsyslog LTS Security Update (DLA-2835-1) (CVE-2019-17041, CVE-2019-17042)
- Debian samba Security Update (DSA-5015-1) (CVE-2020-25717)
- Debian tar LTS Security Update (DLA-2830-1) (CVE-2018-20482)
- Debian uriparser LTS Security Update (DLA-2834-1) (CVE-2018-20721)
- Debian xen Security Update (DSA-5017-1) (CVE-2021-28704, CVE-2021-28705, CVE-2021-28706, CVE-2021-28707, CVE-2021-28708, CVE-2021-28709)
Fedora (Credentialed Checks)
- Apache Log4J2 Remote Code Execution Fedora (CVE-2021-44228) (CVE-2021-44228)
- Fedora busybox Security Update (FEDORA-2021-5a95823596) (CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376, CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380, CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384, CVE-2021-42385, CVE-2021-42386)
- Fedora busybox Security Update (FEDORA-2021-c52c0fe490) (CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376, CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380, CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384, CVE-2021-42385, CVE-2021-42386)
- Fedora getdata Security Update (FEDORA-2021-197545a753) (CVE-2021-20204)
- Fedora getdata Security Update (FEDORA-2021-3b8bb26909) (CVE-2021-20204)
- Fedora kernel Security Update (FEDORA-2021-c0dc424b7d) (CVE-2021-4001)
- Fedora libxls Security Update (FEDORA-2021-25e89d9374) (CVE-2021-27836)
- Fedora libxls Security Update (FEDORA-2021-785cdbddf9) (CVE-2021-27836)
- Fedora mingw-speex Security Update (FEDORA-2021-73c086ef46) (CVE-2020-23903)
- Fedora Multiple Packages Security Update (FEDORA-2021-1d77047c61) (CVE-2016-2124, CVE-2020-25717, CVE-2020-25718, CVE-2020-25719, CVE-2020-25721, CVE-2020-25722, CVE-2021-23192, CVE-2021-3738)
- Fedora Multiple Packages Security Update (FEDORA-2021-5d227916bc) (CVE-2021-41160)
- Fedora Multiple Packages Security Update (FEDORA-2021-67c946a9f3) (CVE-2021-21898, CVE-2021-21899, CVE-2021-21900)
- Fedora Multiple Packages Security Update (FEDORA-2021-ac23d9e47f) (CVE-2021-41160)
- Fedora Multiple Packages Security Update (FEDORA-2021-b58af96f33) (CVE-2020-25664)
- Fedora Multiple Packages Security Update (FEDORA-2021-eab8c5a263) (CVE-2021-43975, CVE-2021-43976)
- Fedora Multiple Packages Security Update (FEDORA-2021-eb2742b148) (CVE-2021-41190)
- Fedora nss Security Update (FEDORA-2021-d0be347892) (CVE-2021-43527)
- Fedora php Security Update (FEDORA-2021-88ba46f2b2) (CVE-2021-21707)
- Fedora php Security Update (FEDORA-2021-c8043fa05f) (CVE-2021-21707)
- Fedora php-symfony4 Security Update (FEDORA-2021-0294e8ca24) (CVE-2021-41270)
- Fedora roundcubemail Security Update (FEDORA-2021-167865df98) (CVE-2021-44025, CVE-2021-44026)
- Fedora roundcubemail Security Update (FEDORA-2021-43d3c10590) (CVE-2021-44025, CVE-2021-44026)
- Fedora skopeo Security Update (FEDORA-2021-aacef7fa15) (CVE-2021-41190)
- Fedora slurm Security Update (FEDORA-2021-0611d621ec) (CVE-2021-43337)
- Fedora stargz-snapshotter Security Update (FEDORA-2021-d250fc2622) (CVE-2021-41190)
- Fedora suricata Security Update (FEDORA-2021-c7fd9e9126) (CVE-2021-35063)
- Fedora wireshark Security Update (FEDORA-2021-97bd631e0a) (CVE-2021-39920, CVE-2021-39921, CVE-2021-39922, CVE-2021-39923, CVE-2021-39924, CVE-2021-39925, CVE-2021-39926, CVE-2021-39928, CVE-2021-39929)
VMWare
FreeBSD
- Apache Log4J2 Remote Code Execution FreeBSD (CVE-2021-44228) (CVE-2021-44228)
- FreeBSD mailman Security Update (0d6efbe3-52d9-11ec-9472-e3667ed6088e) (CVE-2021-44227)
- FreeBSD NSS Security Update (47695a9c-5377-11ec-8be6-d4c9ef517024) (CVE-2021-43527)
- FreeBSD py-matrix-synapse Security Update (27aa2253-4c72-11ec-b6b9-e86a64caca56) (CVE-2021-41281)
- FreeBSD rubygem-cgi Security Update (2c6af5c3-4d36-11ec-a539-0800270512f4) (CVE-2021-41816)
- FreeBSD rubygem-cgi Security Update (4548ec97-4d38-11ec-a539-0800270512f4) (CVE-2021-41819)
Ubuntu (Credentialed Checks)
- Apache Log4J2 Remote Code Execution Ubuntu (CVE-2021-44228) (CVE-2021-44228)
- Ubuntu ICU vulnerability (USN-5156-1) (CVE-2021-30535)
- Ubuntu ImageMagick vulnerabilities (USN-5158-1) (CVE-2021-20244, CVE-2021-20246, CVE-2021-20309, CVE-2021-20312, CVE-2021-20313)
- Ubuntu libmodbus vulnerabilities (USN-5173-1) (CVE-2019-14462, CVE-2019-14463)
- Ubuntu Linux kernel (OEM) vulnerabilities (USN-5165-1) (CVE-2021-3760, CVE-2021-3772, CVE-2021-42327, CVE-2021-42739, CVE-2021-43056, CVE-2021-43267, CVE-2021-43389)
- Ubuntu Linux kernel vulnerabilities (USN-5161-1) (CVE-2021-3655, CVE-2021-3744, CVE-2021-3764, CVE-2021-42252)
- Ubuntu Linux kernel vulnerabilities (USN-5162-1) (CVE-2021-3655, CVE-2021-3744, CVE-2021-3764, CVE-2021-42252, CVE-2021-43057)
- Ubuntu Linux kernel vulnerabilities (USN-5163-1) (CVE-2021-3655, CVE-2021-37159, CVE-2021-3744, CVE-2021-3764)
- Ubuntu Linux kernel vulnerabilities (USN-5164-1) (CVE-2021-37159, CVE-2021-3744, CVE-2021-3764)
- Ubuntu Long Range ZIP vulnerabilities (USN-5171-1) (CVE-2017-8844, CVE-2017-8846, CVE-2017-9928, CVE-2017-9929, CVE-2018-10685, CVE-2018-11496, CVE-2018-5650, CVE-2018-5747, CVE-2018-5786)
- Ubuntu MariaDB vulnerability (USN-5170-1) (CVE-2021-35604)
- Ubuntu NSS vulnerability (USN-5168-1) (CVE-2021-43527)
- Ubuntu Samba vulnerabilities (USN-5174-1) (CVE-2016-2124, CVE-2020-25717, CVE-2020-25722, CVE-2021-3671)
- Ubuntu Thunderbird vulnerability (USN-5168-2) (CVE-2021-43527)
- Ubuntu uriparser vulnerabilities (USN-5172-1) (CVE-2018-19198, CVE-2018-19199, CVE-2018-19200, CVE-2018-20721)
How to Update?
All Trustwave customers using the TrustKeeper Scan Engine receive the updates automatically as soon as an update is available. No action is required.