Juniper Networks has issued three advisories for vital bugs in a mammoth patch launch masking greater than 30 vulnerabilities.
The first critical advisory covers greater than 100 third-party patches in Contrail Cloud launch 13.7.0.
The networking vendor mentioned the vulnerabilities may additionally have an effect on all older Contrail Cloud variations.
The bugs are apparently largely inherited from libraries delivery with Purple Hat’s OpenStack 13.0.z15, and date again to 2016.
Essentially the most vital bugs within the patch cowl libxml2, the Apache HTTP server, Python 3.x, and the Expat library.
A number of third-party vulnerabilities in Junos Area model 22.3R1 are lined in this advisory.
The vital bugs are a use-after-free in systemd, a buffer overflow in Python Three by way of 3.9.1, and an arbitrary file write within the zgrep utility.
The final critical advisory covers 32 third-party vulnerabilities in all variations of Contrail Service Orchestration prior to six.3.0, together with a privilege escalation bug in sudo, denial of service bugs in ngnix and dnsmasq, and bugs in Kerberos and OpenSSL.
The total checklist of advisories is here.

