Movatterモバイル変換


[0]ホーム

URL:


Country
Contact Sales

Oracle Solaris Third Party Bulletin - July 2023

 

Description

The Oracle Solaris Third Party Bulletin announces patches for one or more security vulnerabilities addressed in third party software that is included in Oracle Solaris distributions. Starting January 20, 2015, Third Party Bulletins are released on the same day when Oracle Critical Patch Updates are released. These bulletins will also be updated for the following two months after their release (i.e. the two months between the normal quarterly Critical Patch Update publication dates). In addition, Third Party Bulletins may also be updated for vulnerability issues deemed too critical to wait for the next monthly update.

Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Third Party Bulletin security patches as soon as possible.

 

Patch Availability

Please see My Oracle Support Note1448883.1

 

Third Party Bulletin Schedule

Third Party Bulletins are released on the third Tuesday of January, April, July, and October. The next four dates are:

  • 17 October 2023
  • 16 January 2024
  • 16 April 2024
  • 16 July 2024

References

 

Modification History

DateNote
2023-September-19Rev 3. Added CVEs fixed in Solaris 11.4 SRU 61
2023-August-22Rev 2. Added CVEs fixed in Solaris 11.4 SRU 60
2023-July-18Rev 1. Initial Release with all CVEs fixed in Solaris 11.4 SRU 59 and Solaris 11.3 ESU 36.32

Oracle Solaris Executive Summary

This Oracle Solaris Bulletin contains 57 new security patches for the Oracle Solaris Operating System.  36 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. 

Oracle Solaris Third Party Bulletin Risk Matrix

Revision 3: Published on 2023-09-19

CVE IDProductThird
Party
component
ProtocolRemote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (seeRisk Matrix Definitions)Supported
Versions
Affected
Notes
Base
Score
Attack
Vector
Attack
Complexity
Privs
Req'd
User
Interact
ScopeConfid-
entiality
Inte-
grity
Avail-
ability
CVE-2023-29402Oracle SolarisGo Programming LanguageHTTPYes9.8NetworkLowNoneNoneUn
changed
HighHighHigh11.4See
Note 1
CVE-2023-4056Oracle SolarisFirefoxHTTPYes9.8NetworkLowNoneNoneUn
changed
HighHighHigh11.4See
Note 2
CVE-2023-4056Oracle SolarisThunderbirdHTTPYes9.8NetworkLowNoneNoneUn
changed
HighHighHigh11.4See
Note 3
CVE-2023-37201Oracle SolarisFirefoxHTTPYes8.8NetworkLowNoneRequiredUn
changed
HighHighHigh11.4See
Note 4
CVE-2023-37201Oracle SolarisThunderbirdHTTPYes8.8NetworkLowNoneRequiredUn
changed
HighHighHigh11.4See
Note 5
CVE-2023-3666Oracle SolarisGhostscriptNoneNo8.4LocalLowNoneNoneUn
changed
HighHighHigh11.4See
Note 6
CVE-2023-32005Oracle SolarisNode.jsHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneHighNone11.4See
Note 7
CVE-2023-36053Oracle SolarisDjangoHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4 
CVE-2023-38403Oracle SolarisTool For Measuring Internet BandwidthHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4 
CVE-2023-29406Oracle SolarisGo Programming LanguageHTTPYes6.5NetworkLowNoneRequiredUn
changed
NoneHighNone11.4See
Note 8

Revision 2: Published on 2023-08-22

CVE IDProductThird
Party
component
ProtocolRemote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (seeRisk Matrix Definitions)Supported
Versions
Affected
Notes
Base
Score
Attack
Vector
Attack
Complexity
Privs
Req'd
User
Interact
ScopeConfid-
entiality
Inte-
grity
Avail-
ability
CVE-2022-32221Oracle SolarislibcurlHTTPYes9.8NetworkLowNoneNoneUn
changed
HighHighHigh11.4See
Note 9
CVE-2022-48337Oracle SolarisGNU EmacsHTTPYes9.8NetworkLowNoneNoneUn
changed
HighHighHigh11.4See
Note 10
CVE-2023-28879Oracle SolarisGhostscriptHTTPYes9.8NetworkLowNoneNoneUn
changed
HighHighHigh11.4 
CVE-2023-23914Oracle SolarislibcurlHTTPYes9.1NetworkLowNoneNoneUn
changed
HighHighNone11.4See
Note 11
CVE-2023-0049Oracle SolarisVIMNoneNo7.8LocalLowNoneRequiredUn
changed
HighHighHigh11.4See
Note 12
CVE-2023-1393Oracle SolarisX.OrgNoneNo7.8LocalLowLowNoneUn
changed
HighHighHigh11.4 
CVE-2023-29491Oracle SolarisNcursesNoneNo7.8LocalLowLowNoneUn
changed
HighHighHigh11.4 
CVE-2022-3924Oracle SolarisBindHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4See
Note 13
CVE-2022-4899Oracle SolarisZstd Port For SolarisHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4 
CVE-2023-25193Oracle SolarisHarfbuzz Text Shaping EngineHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4 
CVE-2023-2650Oracle SolarisOpenSSLHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4 
CVE-2023-28450Oracle SolarisDNSmasqHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4 
CVE-2023-2879Oracle SolarisWiresharkHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4See
Note 14
CVE-2023-30581Oracle SolarisNode.jsHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneHighNone11.4See
Note 15
CVE-2023-3138Oracle SolarisX.OrgHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4 
CVE-2023-34241Oracle SolarisCommon Unix Printing System (CUPS)NoneNo7.1LocalLowLowNoneUn
changed
HighNoneHigh11.4 
CVE-2021-46784Oracle SolarisSquidHTTPNo6.5NetworkLowLowNoneUn
changed
NoneNoneHigh11.4 
CVE-2023-31147Oracle SolarisC-Ares Asychronous Dns LibraryHTTPYes6.5NetworkLowNoneNoneUn
changed
LowLowNone11.4See
Note 16
CVE-2023-34969Oracle SolarisDBusHTTPNo6.5NetworkLowLowNoneUn
changed
NoneNoneHigh11.4 
CVE-2023-32681Oracle SolarisRequestsHTTPYes6.1NetworkHighNoneRequiredChangedHighNoneNone11.4 
CVE-2023-22043Oracle SolarisJDK 8HTTPYes5.9NetworkHighNoneNoneUn
changed
NoneHighNone11.4 
CVE-2017-5715Oracle SolarisKernelNoneNo5.6LocalHighLowNoneChangedHighNoneNone11.4 
CVE-2018-3639Oracle SolarisKernelNoneNo5.5LocalLowLowNoneUn
changed
HighNoneNone11.4 
CVE-2021-44917Oracle SolarisGnuplotNoneNo5.5LocalLowNoneRequiredUn
changed
NoneNoneHigh11.4 
CVE-2023-1906Oracle SolarisImageMagickNoneNo5.5LocalLowNoneRequiredUn
changed
NoneNoneHigh11.4 
CVE-2023-29499Oracle SolarisGLibNoneNo5.5LocalLowNoneRequiredUn
changed
NoneNoneHigh11.4See
Note 17
CVE-2023-3195Oracle SolarisImageMagickNoneNo5.5LocalLowNoneRequiredUn
changed
NoneNoneHigh11.4 
CVE-2023-32762Oracle SolarisQt ToolkitHTTPYes5.3NetworkLowNoneNoneUn
changed
NoneLowNone11.4See
Note 18
CVE-2023-1981Oracle SolarisOpenSSLNoneNo0LocalHighHighNoneUn
changed
NoneNoneNone11.4 
CVE-2023-2004Oracle SolarisFreeTypeMultipleYes0NetworkLowNoneNoneUn
changed
NoneNoneNone11.4 

Revision 1: Published on 2023-07-18

CVE IDProductThird
Party
component
ProtocolRemote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (seeRisk Matrix Definitions)Supported
Versions
Affected
Notes
Base
Score
Attack
Vector
Attack
Complexity
Privs
Req'd
User
Interact
ScopeConfid-
entiality
Inte-
grity
Avail-
ability
CVE-2022-37434Oracle SolarisMySQLHTTPYes9.8NetworkLowNoneNoneUn
changed
HighHighHigh11.4See
Note 19
CVE-2023-34416Oracle SolarisFirefoxHTTPYes9.8NetworkLowNoneNoneUn
changed
HighHighHigh11.4See
Note 20
CVE-2023-34416Oracle SolarisThunderbirdHTTPYes9.8NetworkLowNoneNoneUn
changed
HighHighHigh11.4See
Note 21
CVE-2021-3575Oracle SolarisOpenJPEGNoneNo7.8LocalLowNoneRequiredUn
changed
HighHighHigh11.4 
CVE-2023-29007Oracle SolarisGitNoneNo7.8LocalLowNoneRequiredUn
changed
HighHighHigh11.4See
Note 22
CVE-2022-41716Oracle SolarisGoHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneHighNone11.4See
Note 23
CVE-2023-1999Oracle SolarislibwebpHTTPYes7.5NetworkHighNoneRequiredUn
changed
HighHighHigh11.4 
CVE-2023-24998Oracle SolarisApache TomcatHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4See
Note 24
CVE-2023-26767Oracle SolarisLiblouisHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4See
Note 25
CVE-2023-30608Oracle SolarisSQL ParserHTTPYes7.5NetworkLowNoneNoneUn
changed
NoneNoneHigh11.4 
CVE-2023-24539Oracle SolarisGoHTTPYes7.3NetworkLowNoneNoneUn
changed
LowLowLow11.4See
Note 26
CVE-2023-21980Oracle SolarisMySQLHTTPNo7.1NetworkHighLowRequiredUn
changed
HighHighHigh11.4See
Note 27
CVE-2023-28484Oracle Solarislibxml2HTTPYes6.5NetworkLowNoneRequiredUn
changed
NoneNoneHigh11.4See
Note 28
CVE-2022-31783Oracle SolarisLiblouisNoneNo5.5LocalLowNoneRequiredUn
changed
NoneNoneHigh11.4 
CVE-2022-37290Oracle SolarisNautilusNoneNo5.5LocalLowLowNoneUn
changed
NoneNoneHigh11.4See
Note 29
CVE-2023-2731Oracle SolarisLibTIFFNoneNo5.5LocalLowNoneRequiredUn
changed
NoneNoneHigh11.4See
Note 30
CVE-2023-32324Oracle SolarisCommon Unix Printing System (CUPS)NoneNo5.5LocalLowNoneRequiredUn
changed
NoneNoneHigh11.4 

Notes:

1. This patch also addresses CVE-2023-29403 CVE-2023-29404 CVE-2023-29405.

2. This patch also addresses CVE-2023-4045 CVE-2023-4046 CVE-2023-4047 CVE-2023-4048 CVE-2023-4049 CVE-2023-4050 CVE-2023-4054 CVE-2023-4055.

3. This patch also addresses CVE-2023-4045 CVE-2023-4046 CVE-2023-4047 CVE-2023-4048 CVE-2023-4049 CVE-2023-4050 CVE-2023-4054 CVE-2023-4055.

4. This patch also addresses CVE-2023-37202 CVE-2023-37207 CVE-2023-37208 CVE-2023-37211.

5. This patch also addresses CVE-2023-37202 CVE-2023-37207 CVE-2023-37208 CVE-2023-37211.

6. This patch also addresses CVE-2023-36664.

7. This patch also addresses CVE-2023-32002 CVE-2023-32003 CVE-2023-32004 CVE-2023-32006 CVE-2023-32558 CVE-2023-32559.

8. This patch also addresses CVE-2023-29409.

9. This patch also addresses CVE-2023-28319 CVE-2023-28320 CVE-2023-28321 CVE-2023-28322.

10. This patch also addresses CVE-2022-48338 CVE-2022-48339 CVE-2023-27985 CVE-2023-27986.

11. This patch also addresses CVE-2022-32206 CVE-2023-23915 CVE-2023-23916.

12. This patch also addresses CVE-2023-0051 CVE-2023-0054 CVE-2023-0288 CVE-2023-0512 CVE-2023-1127 CVE-2023-1170 CVE-2023-1175.

13. This patch also addresses CVE-2023-2828 CVE-2023-2911.

14. This patch also addresses CVE-2023-0666 CVE-2023-0668 CVE-2023-2854 CVE-2023-2855 CVE-2023-2857 CVE-2023-2858.

15. This patch also addresses CVE-2023-30582 CVE-2023-30583 CVE-2023-30584 CVE-2023-30585 CVE-2023-30586 CVE-2023-30587 CVE-2023-30588 CVE-2023-30589 CVE-2023-30590.

16. This patch also addresses CVE-2023-31124 CVE-2023-31130 CVE-2023-32067.

17. This patch also addresses CVE-2023-32611 CVE-2023-32636 CVE-2023-32643 CVE-2023-32665.

18. This patch also addresses CVE-2023-32573 CVE-2023-32763.

19. This patch also addresses CVE-2022-43551 CVE-2023-0215 CVE-2023-21912 CVE-2023-21980.

20. This patch also addresses CVE-2023-34414.

21. This patch also addresses CVE-2023-34414.

22. This patch also addresses CVE-2023-25652 CVE-2023-25815.

23. This patch also addresses CVE-2022-41717 CVE-2022-41720.

24. This patch also addresses CVE-2023-28709 CVE-2023-34981.

25. This patch also addresses CVE-2023-26768 CVE-2023-26769.

26. This patch also addresses CVE-2023-24540 CVE-2023-29400.

27. This patch also addresses CVE-2023-21911 CVE-2023-21919 CVE-2023-21920 CVE-2023-21929 CVE-2023-21933 CVE-2023-21935 CVE-2023-21940 CVE-2023-21945 CVE-2023-21946 CVE-2023-21947 CVE-2023-21953 CVE-2023-21955 CVE-2023-21962 CVE-2023-21966 CVE-2023-21972 CVE-2023-21976 CVE-2023-21977 CVE-2023-21982.

28. This patch also addresses CVE-2023-29469.

29. This patch also addresses CVE-2022-37290.

30. This patch also addresses CVE-2023-30086 CVE-2023-30774 CVE-2023-30775.
 

[8]ページ先頭

©2009-2025 Movatter.jp