QID 296105
Date Published: 2023-11-30
QID 296105: Oracle Solaris 11.4 Support Repository Update (SRU) 63.157.1 Missing (CPUOCT2023)
The target does not have Solaris 11.4 SRU 63.157.1 applied. The Support Repository Updates provide patch bundles/updates that primarily contain bug fixes for the system and third party software.
Affected Versions:-
Solaris prior 11.4 SRU 63.157.1
QID Detection Logic (Authenticated):
This QID lists installed patch to check if the patches are missing.
NOTE:Revision 2: Published on 2023-11-21
Exploitation could allow an attacker to compromise a integrity of the system.
Solution
Apply Solaris 11.4 Refer to Oracle Solaris 11.4 SRU 63.157.1 for more information.
Reference Index of CVE IDs and Solaris Patches
Vendor References
- CPUOCT2023 -
www.oracle.com/security-alerts/bulletinoct2023.html
CVEs related to QID 296105
CVE-2023-4863 | CVE-2023-38039 | CVE-2023-38545 | CVE-2023-38546 | CVE-2023-40359 | CVE-2023-2906 | CVE-2023-3648 | CVE-2023-3649 | CVE-2023-4511 | CVE-2023-4512 | CVE-2023-4513 | CVE-2021-33391 | CVE-2023-4051 | CVE-2023-4052 | CVE-2023-4053 | CVE-2023-4057 | CVE-2023-4577 | CVE-2023-4578 | CVE-2023-4580 | CVE-2023-4582 | CVE-2023-4583 | CVE-2023-4585 | CVE-2022-37032 | CVE-2023-34410 | CVE-2023-37369 | CVE-2023-38197 | CVE-2023-40217 | CVE-2023-41105 | CVE-2023-2975 | CVE-2023-3446 | CVE-2023-3817 | CVE-2023-2953 | CVE-2022-34670 | CVE-2022-34673 | CVE-2022-34674 | CVE-2022-34676 | CVE-2022-34677 | CVE-2022-34678 | CVE-2022-34679 | CVE-2022-34680 | CVE-2022-34682 | CVE-2022-34684 | CVE-2022-42254 | CVE-2022-42255 | CVE-2022-42256 | CVE-2022-42257 | CVE-2022-42258 | CVE-2022-42259 | CVE-2022-42263 | CVE-2022-42264 | CVE-2022-42265 | CVE-2023-0180 | CVE-2023-0181 | CVE-2023-0183 | CVE-2023-0184 | CVE-2023-0185 | CVE-2023-0187 | CVE-2023-0188 | CVE-2023-0189 | CVE-2023-0190 | CVE-2023-0191 | CVE-2023-0194 | CVE-2023-0195 | CVE-2023-0198 | CVE-2023-0199 | CVE-2023-26551 | CVE-2023-26552 | CVE-2023-26553 | CVE-2023-26554 | CVE-2023-26555 | CVE-2022-4899 | CVE-2023-22005 | CVE-2023-22008 | CVE-2023-22033 | CVE-2023-22038 | CVE-2023-22046 | CVE-2023-22048 | CVE-2023-22053 | CVE-2023-22054 | CVE-2023-22056 | CVE-2023-22057 | CVE-2023-22058 | CVE-2023-4874 | CVE-2023-4875 | CVE-2023-44488 | CVE-2023-5217 | CVE-2023-3316 | CVE-2023-3863 | CVE-2023-38633 | CVE-2022-23825 | CVE-2023-36054 | CVE-2023-22067 | CVE-2023-3428 | CVE-2023-39978 | CVE-2023-39318 | CVE-2023-39319 | CVE-2023-39320 | CVE-2023-39321 | CVE-2023-39322 | CVE-2023-39323 | CVE-2023-39325 | CVE-2023-44487 | CVE-2023-4156 | CVE-2023-37327 | CVE-2023-37328 | CVE-2023-41164 | CVE-2023-43665 | CVE-2023-3341 | CVE-2023-4236 |
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| CPUOCT2023 |
|