Movatterモバイル変換


[0]ホーム

URL:


Country
Contact Sales

Oracle Solaris Third Party Bulletin - July 2022

 

Description

The Oracle Solaris Third Party Bulletin announces patches for one or more security vulnerabilities addressed in third party software that is included in Oracle Solaris distributions. Starting January 20, 2015, Third Party Bulletins are released on the same day when Oracle Critical Patch Updates are released. These bulletins will also be updated for the following two months after their release (i.e. the two months between the normal quarterly Critical Patch Update publication dates). In addition, Third Party Bulletins may also be updated for vulnerability issues deemed too critical to wait for the next monthly update.

Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Third Party Bulletin security patches as soon as possible.

 

Patch Availability

Please see My Oracle Support Note1448883.1

 

Third Party Bulletin Schedule

Third Party Bulletins are released on the third Tuesday of January, April, July, and October. The next four dates are:

  • 18 October 2022
  • 17 January 2023
  • 18 April 2023
  • 18 July 2023

References

 

Modification History

DateNote
2022-September-20Rev 3. Added CVEs fixed in Solaris 11.4 SRU 49
2022-August-16Rev 2. Added CVEs fixed in Solaris 11.4 SRU 48
2022-July-19Rev 1. Initial Release with all CVEs fixed in Solaris 11.4 SRU 47

Oracle Solaris Executive Summary

This Oracle Solaris Bulletin contains 35 new security patches for the Oracle Solaris Operating System.  24 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. 

Oracle Solaris Third Party Bulletin Risk Matrix

Revision 3: Published on 2022-09-20

CVE#ProductThird
Party
component
ProtocolRemote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (seeRisk Matrix Definitions)Supported
Versions
Affected
Notes
Base
Score
Attack
Vector
Attack
Complexity
Privs
Req'd
User
Interact
ScopeConfid-
entiality
Inte-
grity
Avail-
ability
CVE-2022-34265Oracle SolarisDjangoHTTPYes9.8NetworkLowNoneNoneUn
changed
HighHighHigh11.4 
CVE-2022-1587Oracle SolarisPCREHTTPYes9.1NetworkLowNoneNoneUn
changed
HighNoneHigh11.4See
Note 1
CVE-2022-26691Oracle SolarisCommon Unix Printing SystemNoneNo8.1LocalHighNoneNoneChangedHighHighLow11.4 
CVE-2022-32213Oracle SolarisNode.jsHTTPYes8.1NetworkHighNoneNoneUn
changed
HighHighHigh11.4See
Note 2
CVE-2022-2319Oracle SolarisX.OrgNoneNo7.8LocalLowLowNoneUn
changed
HighHighHigh11.4See
Note 3
CVE-2022-28739Oracle SolarisRubyNoneNo6.2LocalLowNoneNoneUn
changed
NoneHighNone11.4 
CVE-2022-30595Oracle SolarisPython Imaging LibraryNoneNo6.2LocalLowNoneNoneUn
changed
NoneNoneHigh11.4 

Revision 2: Published on 2022-08-16

CVE#ProductThird
Party
component
ProtocolRemote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (seeRisk Matrix Definitions)Supported
Versions
Affected
Notes
Base
Score
Attack
Vector
Attack
Complexity
Privs
Req'd
User
Interact
ScopeConfid-
entiality
Inte-
grity
Avail-
ability
CVE-2022-1292Oracle SolarisOpenSSLMultipleYes9.8NetworkLowNoneNoneUn
changed
HighHighHigh11.4, 10 
CVE-2022-34169Oracle SolarisJDK 7MultipleYes9.8NetworkLowNoneNoneUn
changed
HighHighHigh11.4See
Note 4
CVE-2022-34169Oracle SolarisJDK 8MultipleYes9.8NetworkLowNoneNoneUn
changed
HighHighHigh11.4See
Note 5
CVE-2022-0943Oracle SolarisVimNoneNo7.8LocalLowNoneRequiredUn
changed
HighHighHigh11.4See
Note 6
CVE-2022-1927Oracle SolarisVimNoneNo7.8LocalLowNoneRequiredUn
changed
HighHighHigh11.4See
Note 7
CVE-2021-4219Oracle SolarisImageMagickHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4 
CVE-2022-0778Oracle SolarisMySQLMultipleYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4See
Note 8
CVE-2022-1328Oracle SolarisMuttHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4 
CVE-2022-1473Oracle SolarisOpenSSLTLSYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4See
Note 9
CVE-2022-30333Oracle SolarisUnRARMultipleYes7.5NetworkLowNoneNoneUn
changed
NoneHighNone11.4 
CVE-2022-27779Oracle SolarislibcurlHTTPNo6.8NetworkLowLowRequiredChangedNoneNoneHigh11.4See
Note 10
CVE-2022-24765Oracle SolarisGitNoneNo6.7LocalHighNoneNoneUn
changed
HighHighNone11.4 
CVE-2022-31813Oracle SolarisApache HTTP serverHTTPYes6.5NetworkHighNoneNoneChangedLowLowLow11.4See
Note 11
CVE-2022-2200Oracle SolarisFirefoxHTTPYes6.1NetworkLowNoneRequiredChangedLowLowNone11.4See
Note 12
CVE-2022-24303Oracle SolarisPython Imaging LibraryHTTPYes5.9NetworkHighNoneNoneUn
changed
NoneHighNone11.4 
CVE-2022-1343Oracle SolarisOpenSSLTLSYes5.3NetworkLowNoneNoneUn
changed
NoneLowNone11.4 
CVE-2018-1000007Oracle SolarislibcurlHTTPYes5NetworkHighNoneRequiredUn
changed
LowLowLow11.4See
Note 13
CVE-2022-24302Oracle SolarisParamikoNoneNo5LocalLowLowRequiredUn
changed
HighNoneNone11.4 

Revision 1: Published on 2022-07-19

CVE#ProductThird
Party
component
ProtocolRemote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (seeRisk Matrix Definitions)Supported
Versions
Affected
Notes
Base
Score
Attack
Vector
Attack
Complexity
Privs
Req'd
User
Interact
ScopeConfid-
entiality
Inte-
grity
Avail-
ability
CVE-2021-21708Oracle SolarisPHPHTTPYes9.8NetworkLowNoneNoneUn
changed
HighHighHigh11.4 
CVE-2022-23806Oracle SolarisGCC GoHTTPYes9.1NetworkLowNoneNoneUn
changed
NoneHighHigh11.4See
Note 14
CVE-2022-25762Oracle SolarisApache TomcatHTTPYes8.6NetworkLowNoneNoneUn
changed
HighLowLow11.4 
CVE-2022-24801Oracle SolarisTwistedHTTPYes8.1NetworkHighNoneNoneUn
changed
HighHighHigh11.4 
CVE-2022-23772Oracle SolarisGCC GoHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4See
Note 15
CVE-2022-31736Oracle SolarisFirefoxMultipleYes7.5NetworkHighNoneRequiredUn
changed
HighHighHigh11.4See
Note 16
CVE-2022-1834Oracle SolarisThunderbirdMultipleYes7.5NetworkHighNoneRequiredUn
changed
HighHighHigh11.4See
Note 17
CVE-2022-29824Oracle Solarislibxml2HTTPYes7.4NetworkHighNoneNoneUn
changed
NoneHighHigh11.4 
CVE-2022-1271Oracle SolarisGzipHTTPNo7.1NetworkHighLowRequiredUn
changed
HighHighHigh11.4 
CVE-2022-1271Oracle SolarisGzipMultipleNo7.1NetworkHighLowRequiredUn
changed
HighHighHigh11.4 

Notes:

1. This patch also addresses CVE-2022-1586.

2. This patch also addresses CVE-2022-2097 CVE-2022-32212 CVE-2022-32214 CVE-2022-32215 CVE-2022-32222 CVE-2022-32223.

3. This patch also addresses CVE-2022-2320.

4. This patch also addresses CVE-2022-21540 CVE-2022-21541.

5. This patch also addresses CVE-2022-21540 CVE-2022-21541.

6. This patch also addresses CVE-2022-1154.

7. This patch also addresses CVE-2022-1160 CVE-2022-1381 CVE-2022-1420 CVE-2022-1616 CVE-2022-1619 CVE-2022-1620 CVE-2022-1621 CVE-2022-1629 CVE-2022-1674 CVE-2022-1733 CVE-2022-1735 CVE-2022-1769 CVE-2022-1771 CVE-2022-1785 CVE-2022-1796 CVE-2022-1851 CVE-2022-1886 CVE-2022-1898 CVE-2022-1942.

8. This patch also addresses CVE-2022-21417 CVE-2022-21427 CVE-2022-21444 CVE-2022-21451 CVE-2022-21454 CVE-2022-21460.

9. This patch also addresses CVE-2022-1434.

10. This patch also addresses CVE-2022-27778 CVE-2022-27780 CVE-2022-27781 CVE-2022-27782 CVE-2022-30115.

11. This patch also addresses CVE-2022-26377 CVE-2022-28330 CVE-2022-28614 CVE-2022-28615 CVE-2022-29404 CVE-2022-30522 CVE-2022-30556.

12. This patch also addresses CVE-2022-31744 CVE-2022-34468 CVE-2022-34470 CVE-2022-34472 CVE-2022-34478 CVE-2022-34479 CVE-2022-34481 CVE-2022-34484.

13. This patch also addresses CVE-2022-22576 CVE-2022-27774 CVE-2022-27775 CVE-2022-27776.

14. This patch also addresses CVE-2021-29923 CVE-2022-23772 CVE-2022-23773.

15. This patch also addresses CVE-2022-23772 CVE-2022-23773 CVE-2022-24675 CVE-2022-28327.

16. This patch also addresses CVE-2022-31737 CVE-2022-31738 CVE-2022-31739 CVE-2022-31740 CVE-2022-31741 CVE-2022-31742 CVE-2022-31747.

17. This patch also addresses CVE-2022-31736 CVE-2022-31737 CVE-2022-31738 CVE-2022-31739 CVE-2022-31740 CVE-2022-31741 CVE-2022-31742 CVE-2022-31747.
 

[8]ページ先頭

©2009-2025 Movatter.jp