SUSE Alert
2572Warning Date
Severity Level
Warning Number
Target Sector
27 April, 2022
● Medium
2022-4725
All
SUSE has released security updates to address several vulnerabilities in the following products:
- xen
- HPE Helion Openstack 8
- SUSE Linux Enterprise Server 12-SP3-BCL
- SUSE Linux Enterprise Server 12-SP3-LTSS
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE OpenStack Cloud 8
- SUSE OpenStack Cloud Crowbar 8
- Linux Kernel
- SUSE Linux Enterprise Micro 5.1
- SUSE Linux Enterprise Micro 5.2
- SUSE Linux Enterprise Module for Realtime 15-SP3
- SUSE Linux Enterprise Real Time 15-SP3
- go1.18
- SUSE Linux Enterprise Desktop 15-SP3
- SUSE Linux Enterprise Desktop 15-SP4
- SUSE Linux Enterprise High Performance Computing 15-SP3
- SUSE Linux Enterprise High Performance Computing 15-SP4
- SUSE Linux Enterprise Module for Development Tools 15-SP3
- SUSE Linux Enterprise Module for Development Tools 15-SP4
- SUSE Linux Enterprise Server 15-SP3
- SUSE Linux Enterprise Server 15-SP4
- SUSE Linux Enterprise Server for SAP Applications 15-SP3
- SUSE Linux Enterprise Server for SAP Applications 15-SP4
- SUSE Manager Proxy 4.2
- SUSE Manager Server 4.2
- openSUSE Leap 15.3
- openSUSE Leap 15.4
- go1.17
- SUSE Linux Enterprise Desktop 15-SP3
- SUSE Linux Enterprise Desktop 15-SP4
- SUSE Linux Enterprise High Performance Computing 15-SP3
- SUSE Linux Enterprise High Performance Computing 15-SP4
- SUSE Linux Enterprise Module for Development Tools 15-SP3
- SUSE Linux Enterprise Module for Development Tools 15-SP4
- SUSE Linux Enterprise Realtime Extension 15-SP2
- SUSE Linux Enterprise Server 15-SP3
- SUSE Linux Enterprise Server 15-SP4
- SUSE Linux Enterprise Server for SAP Applications 15-SP3
- SUSE Linux Enterprise Server for SAP Applications 15-SP4
- SUSE Manager Proxy 4.2
- SUSE Manager Server 4.2
- openSUSE Leap 15.3
- openSUSE Leap 15.4
An attacker could exploit these vulnerabilities by doing the follwoing:
- Execute arbitrary code
- Denial of service attack (DoS)
- Privilege escalation
The CERT team encourages users to review SUSE security advisory and apply the necessary updates: