تنبيه SUSE
2443تاريخ التحذير
مستوى الخطورة
رقم التحذير
القطاع المستهدف
2 فبراير, 2022
● عالٍ جدًا
2022-4314
الكل
أصدرت SUSE عدّة تحديثات لمعالجة عددٍ من الثغرات في المنتجات التالية:
- Linux Kernel (Live Patch 22 for SLE 15)
- SUSE Linux Enterprise Module for Live Patching 15
- SUSE Linux Enterprise Module for Live Patching 15-SP2
- Linux Kernel (Live Patch 11 for SLE 15 SP3)
- SUSE Linux Enterprise Module for Live Patching 15-SP3
- Linux Kernel (Live Patch 15 for SLE 12 SP5)
- SUSE Linux Enterprise Module for Live Patching 15-SP1
- SUSE Linux Enterprise Live Patching 12-SP5
- Linux Kernel (Live Patch 21 for SLE 12 SP5)
- SUSE Linux Enterprise Live Patching 12-SP5
- Linux Kernel (Live Patch 4 for SLE 15 SP3)
- SUSE Linux Enterprise Module for Live Patching 15-SP3
- Linux Kernel (Live Patch 7 for SLE 15 SP3)
- SUSE Linux Enterprise Module for Live Patching 15-SP3
- samba
- SUSE OpenStack Cloud Crowbar 9
- SUSE OpenStack Cloud Crowbar 8
- SUSE OpenStack Cloud 9
- SUSE OpenStack Cloud 8
- SUSE Linux Enterprise Server for SAP 12-SP4
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server 12-SP4-LTSS
- SUSE Linux Enterprise Server 12-SP3-LTSS
- SUSE Linux Enterprise Server 12-SP3-BCL
- SUSE Linux Enterprise High Availability 12-SP4
- SUSE Linux Enterprise High Availability 12-SP3
- HPE Helion Openstack 8
- SUSE Linux Enterprise Module for Server Applications 15-SP3
- SUSE Linux Enterprise Module for Python2 15-SP3
- SUSE Linux Enterprise Module for Basesystem 15-SP3
- SUSE Linux Enterprise Micro 5.1
- SUSE Linux Enterprise High Availability 15-SP3
- SUSE Linux Enterprise Server for SAP 15-SP1
- SUSE Linux Enterprise Server 15-SP1-LTSS
- SUSE Linux Enterprise Server 15-SP1-BCL
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
- SUSE Linux Enterprise High Availability 15-SP1
- SUSE Enterprise Storage 6
- SUSE CaaS Platform 4.0
- SUSE:SLE-15-SP2:Update
- SUSE Linux Enterprise Module for Basesystem 15-SP4
- python-Django1
- SUSE OpenStack Cloud Crowbar 9
- SUSE OpenStack Cloud 9
- SUSE OpenStack Cloud Crowbar 8
- SUSE OpenStack Cloud 8
- HPE Helion Openstack 8
يمكن للمهاجم استغلال الثغرات وتنفيذ ما يلي:
- رفع وترقية الصلاحيات
- هجمة البرمجة عبر المواقع (Cross-site scripting (XSS))
- هجمة حجب الخدمة (DoS attack)
- الكشف والإفصاح عن المعلومات
- تنفيذ برمجيات خبيثة
يوصي المركز بتحديث المنتجات المتأثرة، حيث أصدرت SUSE توضيحًا لهذه التحديثات:
- https://www.suse.com/support/update/announcement/2022/suse-su-20220255-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220254-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220262-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220263-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220267-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220257-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220270-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220271-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220277-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220283-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220284-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220285-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220286-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220287-1/