SUSE Linux Enterprise Workstation Extension SUSE Linux Enterprise Desktop SUSE Linux Enterprise Software Development Kit SUSE Linux Enterprise Server for SAP Applications SUSE Linux Enterprise Server gimp-devel-debuginfo gimp-devel gimp-lang libgimpui-2_0-0-debuginfo libgimpui-2_0-0 libgimp-2_0-0-debuginfo libgimp-2_0-0 gimp-plugins-python-debuginfo gimp-plugins-python gimp-debugsource gimp-debuginfo gimp
CVE
CVE-2022-32990
Krytyczność
4.3 /10
CVSS
AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Opis
Osoba atakująca zdalnie może nakłonić ofiarę do otwarcia specjalnie spreparowanego pliku XCF i doprowadzić do awarii aplikacji.
SUSE Linux Enterprise Storage: 7.1 SUSE Manager Retail Branch Server: 4.2 SUSE Linux Enterprise Desktop: 15-SP3 openSUSE Leap: 15.3 SUSE Manager Server: 4.2 SUSE Manager Proxy: 4.2 SUSE Linux Enterprise Server for SAP Applications: 15-SP3 SUSE Linux Enterprise Server: 15-SP3 SUSE Linux Enterprise High Performance Computing: 15-SP3 SUSE Linux Enterprise Module for Basesystem: 15-SP3 u-boot-xilinxzynqmpzcu102rev10-doc: before 2021.01-150300.7.18.1 u-boot-xilinxzynqmpzcu102rev10: before 2021.01-150300.7.18.1 u-boot-xilinxzynqmpvirt-doc: before 2021.01-150300.7.18.1 u-boot-xilinxzynqmpvirt: before 2021.01-150300.7.18.1 u-boot-rpiarm64-doc: before 2021.01-150300.7.18.1 u-boot-rpiarm64: before 2021.01-150300.7.18.1 u-boot-rpi4-doc: before 2021.01-150300.7.18.1 u-boot-rpi4: before 2021.01-150300.7.18.1 u-boot-rpi3-doc: before 2021.01-150300.7.18.1 u-boot-rpi3: before 2021.01-150300.7.18.1 u-boot-rockpro64-rk3399-doc: before 2021.01-150300.7.18.1 u-boot-rockpro64-rk3399: before 2021.01-150300.7.18.1 u-boot-rock960-rk3399-doc: before 2021.01-150300.7.18.1 u-boot-rock960-rk3399: before 2021.01-150300.7.18.1 u-boot-rock64-rk3328-doc: before 2021.01-150300.7.18.1 u-boot-rock64-rk3328: before 2021.01-150300.7.18.1 u-boot-rock-pi-4-rk3399-doc: before 2021.01-150300.7.18.1 u-boot-rock-pi-4-rk3399: before 2021.01-150300.7.18.1 u-boot-poplar-doc: before 2021.01-150300.7.18.1 u-boot-poplar: before 2021.01-150300.7.18.1 u-boot-pinephone-doc: before 2021.01-150300.7.18.1 u-boot-pinephone: before 2021.01-150300.7.18.1 u-boot-pineh64-doc: before 2021.01-150300.7.18.1 u-boot-pineh64: before 2021.01-150300.7.18.1 u-boot-pinebook-pro-rk3399-doc: before 2021.01-150300.7.18.1 u-boot-pinebook-pro-rk3399: before 2021.01-150300.7.18.1 u-boot-pinebook-doc: before 2021.01-150300.7.18.1 u-boot-pinebook: before 2021.01-150300.7.18.1 u-boot-pine64plus-doc: before 2021.01-150300.7.18.1 u-boot-pine64plus: before 2021.01-150300.7.18.1 u-boot-p3450-0000-doc: before 2021.01-150300.7.18.1 u-boot-p3450-0000: before 2021.01-150300.7.18.1 u-boot-p2771-0000-500-doc: before 2021.01-150300.7.18.1 u-boot-p2771-0000-500: before 2021.01-150300.7.18.1 u-boot-p2371-2180-doc: before 2021.01-150300.7.18.1 u-boot-p2371-2180: before 2021.01-150300.7.18.1 u-boot-orangepipc2-doc: before 2021.01-150300.7.18.1 u-boot-orangepipc2: before 2021.01-150300.7.18.1 u-boot-odroid-n2-doc: before 2021.01-150300.7.18.1 u-boot-odroid-n2: before 2021.01-150300.7.18.1 u-boot-odroid-c4-doc: before 2021.01-150300.7.18.1 u-boot-odroid-c4: before 2021.01-150300.7.18.1 u-boot-odroid-c2-doc: before 2021.01-150300.7.18.1 u-boot-odroid-c2: before 2021.01-150300.7.18.1 u-boot-nanopia64-doc: before 2021.01-150300.7.18.1 u-boot-nanopia64: before 2021.01-150300.7.18.1 u-boot-mvebumcbin-88f8040-doc: before 2021.01-150300.7.18.1 u-boot-mvebumcbin-88f8040: before 2021.01-150300.7.18.1 u-boot-mvebuespressobin-88f3720-doc: before 2021.01-150300.7.18.1 u-boot-mvebuespressobin-88f3720: before 2021.01-150300.7.18.1 u-boot-mvebudbarmada8k-doc: before 2021.01-150300.7.18.1 u-boot-mvebudbarmada8k: before 2021.01-150300.7.18.1 u-boot-mvebudb-88f3720-doc: before 2021.01-150300.7.18.1 u-boot-mvebudb-88f3720: before 2021.01-150300.7.18.1 u-boot-ls1012afrdmqspi-doc: before 2021.01-150300.7.18.1 u-boot-ls1012afrdmqspi: before 2021.01-150300.7.18.1 u-boot-libretech-cc-doc: before 2021.01-150300.7.18.1 u-boot-libretech-cc: before 2021.01-150300.7.18.1 u-boot-libretech-ac-doc: before 2021.01-150300.7.18.1 u-boot-libretech-ac: before 2021.01-150300.7.18.1 u-boot-khadas-vim2-doc: before 2021.01-150300.7.18.1 u-boot-khadas-vim2: before 2021.01-150300.7.18.1 u-boot-khadas-vim-doc: before 2021.01-150300.7.18.1 u-boot-khadas-vim: before 2021.01-150300.7.18.1 u-boot-hikey-doc: before 2021.01-150300.7.18.1 u-boot-hikey: before 2021.01-150300.7.18.1 u-boot-geekbox-doc: before 2021.01-150300.7.18.1 u-boot-geekbox: before 2021.01-150300.7.18.1 u-boot-firefly-rk3399-doc: before 2021.01-150300.7.18.1 u-boot-firefly-rk3399: before 2021.01-150300.7.18.1 u-boot-evb-rk3399-doc: before 2021.01-150300.7.18.1 u-boot-evb-rk3399: before 2021.01-150300.7.18.1 u-boot-dragonboard820c-doc: before 2021.01-150300.7.18.1 u-boot-dragonboard820c: before 2021.01-150300.7.18.1 u-boot-dragonboard410c-doc: before 2021.01-150300.7.18.1 u-boot-dragonboard410c: before 2021.01-150300.7.18.1 u-boot-bananapim64-doc: before 2021.01-150300.7.18.1 u-boot-bananapim64: before 2021.01-150300.7.18.1 u-boot-avnetultra96rev1-doc: before 2021.01-150300.7.18.1 u-boot-avnetultra96rev1: before 2021.01-150300.7.18.1 u-boot-tools-debuginfo: before 2021.01-150300.7.18.1 u-boot-tools: before 2021.01-150300.7.18.1
CVE
CVE-2022-33103
Krytyczność
7.8 /10
CVSS
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Opis
Użytkownik lokalny może wywołać błąd zapisu i wykonać dowolny kod z podwyższonymi uprawnieniami.
SUSE Linux Enterprise Storage SUSE Manager Retail Branch Server SUSE Linux Enterprise High Availability SUSE Manager Proxy SUSE Manager Server SUSE Linux Enterprise Server for SAP Applications SUSE Linux Enterprise High Performance Computing SUSE Linux Enterprise Server openSUSE Leap ruby2.5-rubygem-rails-html-sanitizer-testsuite ruby2.5-rubygem-rails-html-sanitizer-doc ruby2.5-rubygem-rails-html-sanitizer
CVE
CVE-2022-32209
Krytyczność
6.1 /10
CVSS
AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Opis
Zdalny atakujący może ominąć zaimplementowane filtry i wykonać dowolny kod HTML i skrypt w przeglądarce użytkownika w kontekście podatnej strony internetowej.