SUSE-SU-2023:1832-1: critical: Security update for SUSE Manager Proxy and Retail Branch Server 4.2
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu May 4 14:55:13 UTC 2023
# Security update for SUSE Manager Proxy and Retail Branch Server 4.2
Announcement ID: SUSE-SU-2023:1832-1
Rating: critical
References:
* #1179926
* #1197027
* #1206562
* #1206973
* #1207063
* #1207308
* #1207352
* #1207490
* #1207799
* #1207829
* #1207830
* #1207838
* #1207883
* #1208288
* #1208321
* #1208325
* #1208586
* #1208687
* #1208719
* #1208772
* #1208908
* #1209369
* #1209386
* #1209689
* #1209703
Cross-References:
* CVE-2020-8908
* CVE-2022-0860
CVSS scores:
* CVE-2020-8908 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2020-8908 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-0860 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
* CVE-2022-0860 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Affected Products:
An update that solves two vulnerabilities and has 23 fixes can now be installed.
## Description:
Maintenance update for SUSE Manager 4.2: Release notes for Server, Proxy and
Retail Branch Server
This is a codestream only patchinfo.
## Patch Instructions:
To install this SUSE Critical update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
## Package List:
## References:
* https://www.suse.com/security/cve/CVE-2020-8908.html
* https://www.suse.com/security/cve/CVE-2022-0860.html
* https://bugzilla.suse.com/show_bug.cgi?id=1179926
* https://bugzilla.suse.com/show_bug.cgi?id=1197027
* https://bugzilla.suse.com/show_bug.cgi?id=1206562
* https://bugzilla.suse.com/show_bug.cgi?id=1206973
* https://bugzilla.suse.com/show_bug.cgi?id=1207063
* https://bugzilla.suse.com/show_bug.cgi?id=1207308
* https://bugzilla.suse.com/show_bug.cgi?id=1207352
* https://bugzilla.suse.com/show_bug.cgi?id=1207490
* https://bugzilla.suse.com/show_bug.cgi?id=1207799
* https://bugzilla.suse.com/show_bug.cgi?id=1207829
* https://bugzilla.suse.com/show_bug.cgi?id=1207830
* https://bugzilla.suse.com/show_bug.cgi?id=1207838
* https://bugzilla.suse.com/show_bug.cgi?id=1207883
* https://bugzilla.suse.com/show_bug.cgi?id=1208288
* https://bugzilla.suse.com/show_bug.cgi?id=1208321
* https://bugzilla.suse.com/show_bug.cgi?id=1208325
* https://bugzilla.suse.com/show_bug.cgi?id=1208586
* https://bugzilla.suse.com/show_bug.cgi?id=1208687
* https://bugzilla.suse.com/show_bug.cgi?id=1208719
* https://bugzilla.suse.com/show_bug.cgi?id=1208772
* https://bugzilla.suse.com/show_bug.cgi?id=1208908
* https://bugzilla.suse.com/show_bug.cgi?id=1209369
* https://bugzilla.suse.com/show_bug.cgi?id=1209386
* https://bugzilla.suse.com/show_bug.cgi?id=1209689
* https://bugzilla.suse.com/show_bug.cgi?id=1209703
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20230504/94396562/attachment.htm>
More information about the sle-security-updates
mailing list