Poważne luki w SuSE

cert.pse-online.pl 2 lat temu
  1.  
  • SuSE
ProduktSUSE Linux Enterprise Workstation Extension SUSE Linux Enterprise Desktop SUSE Linux Enterprise Software Development Kit SUSE Linux Enterprise Server for SAP Applications SUSE Linux Enterprise Server gimp-devel-debuginfo gimp-devel gimp-lang libgimpui-2_0-0-debuginfo libgimpui-2_0-0 libgimp-2_0-0-debuginfo libgimp-2_0-0 gimp-plugins-python-debuginfo gimp-plugins-python gimp-debugsource gimp-debuginfo gimp
CVECVE-2022-32990
Krytyczność4.3 /10
CVSSAV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
OpisOsoba atakująca zdalnie może nakłonić ofiarę do otwarcia specjalnie spreparowanego pliku XCF i doprowadzić do awarii aplikacji.
AktualizacjaTAK
Linkhttp://www.suse.com/support/update/announcement/2022/suse-su-20222867-1/
  
ProduktSUSE Linux Enterprise Storage: 7.1 SUSE Manager Retail Branch Server: 4.2 SUSE Linux Enterprise Desktop: 15-SP3 openSUSE Leap: 15.3 SUSE Manager Server: 4.2 SUSE Manager Proxy: 4.2 SUSE Linux Enterprise Server for SAP Applications: 15-SP3 SUSE Linux Enterprise Server: 15-SP3 SUSE Linux Enterprise High Performance Computing: 15-SP3 SUSE Linux Enterprise Module for Basesystem: 15-SP3 u-boot-xilinxzynqmpzcu102rev10-doc: before 2021.01-150300.7.18.1 u-boot-xilinxzynqmpzcu102rev10: before 2021.01-150300.7.18.1 u-boot-xilinxzynqmpvirt-doc: before 2021.01-150300.7.18.1 u-boot-xilinxzynqmpvirt: before 2021.01-150300.7.18.1 u-boot-rpiarm64-doc: before 2021.01-150300.7.18.1 u-boot-rpiarm64: before 2021.01-150300.7.18.1 u-boot-rpi4-doc: before 2021.01-150300.7.18.1 u-boot-rpi4: before 2021.01-150300.7.18.1 u-boot-rpi3-doc: before 2021.01-150300.7.18.1 u-boot-rpi3: before 2021.01-150300.7.18.1 u-boot-rockpro64-rk3399-doc: before 2021.01-150300.7.18.1 u-boot-rockpro64-rk3399: before 2021.01-150300.7.18.1 u-boot-rock960-rk3399-doc: before 2021.01-150300.7.18.1 u-boot-rock960-rk3399: before 2021.01-150300.7.18.1 u-boot-rock64-rk3328-doc: before 2021.01-150300.7.18.1 u-boot-rock64-rk3328: before 2021.01-150300.7.18.1 u-boot-rock-pi-4-rk3399-doc: before 2021.01-150300.7.18.1 u-boot-rock-pi-4-rk3399: before 2021.01-150300.7.18.1 u-boot-poplar-doc: before 2021.01-150300.7.18.1 u-boot-poplar: before 2021.01-150300.7.18.1 u-boot-pinephone-doc: before 2021.01-150300.7.18.1 u-boot-pinephone: before 2021.01-150300.7.18.1 u-boot-pineh64-doc: before 2021.01-150300.7.18.1 u-boot-pineh64: before 2021.01-150300.7.18.1 u-boot-pinebook-pro-rk3399-doc: before 2021.01-150300.7.18.1 u-boot-pinebook-pro-rk3399: before 2021.01-150300.7.18.1 u-boot-pinebook-doc: before 2021.01-150300.7.18.1 u-boot-pinebook: before 2021.01-150300.7.18.1 u-boot-pine64plus-doc: before 2021.01-150300.7.18.1 u-boot-pine64plus: before 2021.01-150300.7.18.1 u-boot-p3450-0000-doc: before 2021.01-150300.7.18.1 u-boot-p3450-0000: before 2021.01-150300.7.18.1 u-boot-p2771-0000-500-doc: before 2021.01-150300.7.18.1 u-boot-p2771-0000-500: before 2021.01-150300.7.18.1 u-boot-p2371-2180-doc: before 2021.01-150300.7.18.1 u-boot-p2371-2180: before 2021.01-150300.7.18.1 u-boot-orangepipc2-doc: before 2021.01-150300.7.18.1 u-boot-orangepipc2: before 2021.01-150300.7.18.1 u-boot-odroid-n2-doc: before 2021.01-150300.7.18.1 u-boot-odroid-n2: before 2021.01-150300.7.18.1 u-boot-odroid-c4-doc: before 2021.01-150300.7.18.1 u-boot-odroid-c4: before 2021.01-150300.7.18.1 u-boot-odroid-c2-doc: before 2021.01-150300.7.18.1 u-boot-odroid-c2: before 2021.01-150300.7.18.1 u-boot-nanopia64-doc: before 2021.01-150300.7.18.1 u-boot-nanopia64: before 2021.01-150300.7.18.1 u-boot-mvebumcbin-88f8040-doc: before 2021.01-150300.7.18.1 u-boot-mvebumcbin-88f8040: before 2021.01-150300.7.18.1 u-boot-mvebuespressobin-88f3720-doc: before 2021.01-150300.7.18.1 u-boot-mvebuespressobin-88f3720: before 2021.01-150300.7.18.1 u-boot-mvebudbarmada8k-doc: before 2021.01-150300.7.18.1 u-boot-mvebudbarmada8k: before 2021.01-150300.7.18.1 u-boot-mvebudb-88f3720-doc: before 2021.01-150300.7.18.1 u-boot-mvebudb-88f3720: before 2021.01-150300.7.18.1 u-boot-ls1012afrdmqspi-doc: before 2021.01-150300.7.18.1 u-boot-ls1012afrdmqspi: before 2021.01-150300.7.18.1 u-boot-libretech-cc-doc: before 2021.01-150300.7.18.1 u-boot-libretech-cc: before 2021.01-150300.7.18.1 u-boot-libretech-ac-doc: before 2021.01-150300.7.18.1 u-boot-libretech-ac: before 2021.01-150300.7.18.1 u-boot-khadas-vim2-doc: before 2021.01-150300.7.18.1 u-boot-khadas-vim2: before 2021.01-150300.7.18.1 u-boot-khadas-vim-doc: before 2021.01-150300.7.18.1 u-boot-khadas-vim: before 2021.01-150300.7.18.1 u-boot-hikey-doc: before 2021.01-150300.7.18.1 u-boot-hikey: before 2021.01-150300.7.18.1 u-boot-geekbox-doc: before 2021.01-150300.7.18.1 u-boot-geekbox: before 2021.01-150300.7.18.1 u-boot-firefly-rk3399-doc: before 2021.01-150300.7.18.1 u-boot-firefly-rk3399: before 2021.01-150300.7.18.1 u-boot-evb-rk3399-doc: before 2021.01-150300.7.18.1 u-boot-evb-rk3399: before 2021.01-150300.7.18.1 u-boot-dragonboard820c-doc: before 2021.01-150300.7.18.1 u-boot-dragonboard820c: before 2021.01-150300.7.18.1 u-boot-dragonboard410c-doc: before 2021.01-150300.7.18.1 u-boot-dragonboard410c: before 2021.01-150300.7.18.1 u-boot-bananapim64-doc: before 2021.01-150300.7.18.1 u-boot-bananapim64: before 2021.01-150300.7.18.1 u-boot-avnetultra96rev1-doc: before 2021.01-150300.7.18.1 u-boot-avnetultra96rev1: before 2021.01-150300.7.18.1 u-boot-tools-debuginfo: before 2021.01-150300.7.18.1 u-boot-tools: before 2021.01-150300.7.18.1
CVECVE-2022-33103
Krytyczność7.8 /10
CVSSAV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
OpisUżytkownik lokalny może wywołać błąd zapisu i wykonać dowolny kod z podwyższonymi uprawnieniami.
AktualizacjaTAK
Linkhttp://www.suse.com/support/update/announcement/2022/suse-su-20222868-1/
    
ProduktSUSE Linux Enterprise Storage SUSE Manager Retail Branch Server SUSE Linux Enterprise High Availability SUSE Manager Proxy SUSE Manager Server SUSE Linux Enterprise Server for SAP Applications SUSE Linux Enterprise High Performance Computing SUSE Linux Enterprise Server openSUSE Leap ruby2.5-rubygem-rails-html-sanitizer-testsuite ruby2.5-rubygem-rails-html-sanitizer-doc ruby2.5-rubygem-rails-html-sanitizer
CVECVE-2022-32209
Krytyczność6.1 /10
CVSSAV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
OpisZdalny atakujący może ominąć zaimplementowane filtry i wykonać dowolny kod HTML i skrypt w przeglądarce użytkownika w kontekście podatnej strony internetowej.
AktualizacjaTAK
Linkhttp://www.suse.com/support/update/announcement/2022/suse-su-20222870-1/
Idź do oryginalnego materiału