Known Vulnerabilities for products from Opensuse

Listed below are 20 of the newest known vulnerabilities associated with the vendor "Opensuse".

These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.

Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2022-21949 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 8.8 - HIGH 2022-05-03 2022-05-10
CVE-2022-21946 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 7.8 - HIGH 2022-03-16 2022-03-22
CVE-2022-21945 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 5.5 - MEDIUM 2022-03-16 2022-03-22
CVE-2022-21944 A UNIX Symbolic Link (Symlink) Following vulnerability in the systemd service file for watchman of openSUSE Backports SLE-15-... 7.8 - HIGH 2022-01-26 2022-02-03
CVE-2022-0368 Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. 7.8 - HIGH 2022-01-26 2022-03-29
CVE-2021-41819 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 7.5 - HIGH 2022-01-01 2022-05-08
CVE-2021-41817 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 7.5 - HIGH 2022-01-01 2022-05-08
CVE-2021-36781 A Incorrect Default Permissions vulnerability in the parsec package of openSUSE Factory allows local attackers to imitate the... 7.1 - HIGH 2022-01-14 2022-01-21
CVE-2021-36777 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 8.8 - HIGH 2022-03-09 2022-03-15
CVE-2021-33938 Buffer overflow vulnerability in function prune_to_recommended in src/policy.c in libsolv before 0.7.17 allows attackers to c... 7.5 - HIGH 2021-09-02 2021-09-07
CVE-2021-33930 Buffer overflow vulnerability in function pool_installable_whatprovides in src/repo.h in libsolv before 0.7.17 allows attacke... 7.5 - HIGH 2021-09-02 2021-09-07
CVE-2021-33929 Buffer overflow vulnerability in function pool_disabled_solvable in src/repo.h in libsolv before 0.7.17 allows attackers to c... 7.5 - HIGH 2021-09-02 2021-09-07
CVE-2021-33928 Buffer overflow vulnerability in function pool_installable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a... 7.5 - HIGH 2021-09-02 2021-09-07
CVE-2021-32000 A UNIX Symbolic Link (Symlink) Following vulnerability in the clone-master-clean-up.sh script of clone-master-clean-up in SUS... 7.1 - HIGH 2021-07-28 2021-08-11
CVE-2021-31998 A Incorrect Default Permissions vulnerability in the packaging of inn of SUSE Linux Enterprise Server 11-SP3; openSUSE Backpo... 7.8 - HIGH 2021-06-10 2021-06-24
CVE-2021-31997 a UNIX Symbolic Link (Symlink) Following vulnerability in python-postorius of openSUSE Leap 15.2, Factory allows local attack... 7.8 - HIGH 2021-06-10 2021-06-24
CVE-2021-26676 gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing furthe... 6.5 - MEDIUM 2021-02-09 2022-05-06
CVE-2021-26675 A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code. 8.8 - HIGH 2021-02-09 2022-05-23
CVE-2021-25322 A UNIX Symbolic Link (Symlink) Following vulnerability in python-HyperKitty of openSUSE Leap 15.2, Factory allows local attac... 7.8 - HIGH 2021-06-10 2021-06-21
CVE-2021-25321 A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager ... 7.8 - HIGH 2021-06-30 2021-07-12

Known software with vulnerabilities from Opensuse

Type Vendor Product Version
ApplicationOpensuseAutoyast2-
ApplicationOpensuseBackports-
ApplicationOpensuseBackports Sle15.0
ApplicationOpensuseCryptctl1.2.6
Operating
System
OpensuseEvergreen11.4
ApplicationOpensuseFactory-
ApplicationOpensuseHylafax5.6.1-lp151.3.7
Operating
System
OpensuseLeap15.0
ApplicationOpensuseLibsolv0.6.4
ApplicationOpensuseLibzypp2.100.1
ApplicationOpensuseMunge-
ApplicationOpensuseMunin-
ApplicationOpensuseOpen Build Service-
ApplicationOpensuseOpenldap22.4.26-0.74.13
Operating
System
OpensuseOpensuse-
ApplicationOpensuseOsc0.162.1-15.9.1
ApplicationOpensusePcp-
ApplicationOpensuseRmt-server-
ApplicationOpensuseSupportutils3.1-5.7.1
Operating
System
OpensuseSuse Linux Enterprise Server11.0

Popular searches for "Opensuse"

OpenSUSE

The openSUSE Project is a worldwide effort that promotes the use of Free and Open Source Software wherever possible. openSUSE is well known for its GNU/Linux based operatings systems, mainly Tumbleweed, a tested rolling release, and Leap, a distribution with Long-Term-Support. MicroOS and Kubic are new transactional, self-contained distributions for use as desktop or container runtime. The initial release of the community project was a beta version of SUSE Linux 10.0.

The makers' choice for sysadmins, developers and desktop users.

www.opensuse.org

The makers' choice for sysadmins, developers and desktop users. Discover Tumbleweed and get the newest Linux packages with our rolling release. Fast! Integrated! Stabilized! Tested!. Discover Leap and get the most complete Linux distribution with openSUSE & $s latest regular-release version!

www.opensuse.com www.opensuse.cz/kategorie/clanky-navody/recenze-opensuse-11-4 www.opensuse.cz/opensuse-pruvodce www.opensuse.cz freshmeat.sourceforge.net/urls/792c9fc4253d011f4bd6d9facc027fb0 OpenSUSE Linux Programmer User (computing) Linux distribution Package manager Desktop environment Software release life cycle Go (programming language) Operating system Desktop computer Rolling release Leap (computer worm) Computer hardware Computing platform Integrated development environment Software versioning Linux kernel Patch (computing) Whiskey Media

© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report