This update for webkit2gtk3 to version 2.22.5 fixes the following issues :
Security issues fixed :
CVE-2018-4372, CVE-2018-4345, CVE-2018-4386, CVE-2018-4375, CVE-2018-4376, CVE-2018-4378, CVE-2018-4382, CVE-2018-4392, CVE-2018-4416, CVE-2018-4191, CVE-2018-4197, CVE-2018-4299, CVE-2018-4306, CVE-2018-4309, CVE-2018-4312, CVE-2018-4314, CVE-2018-4315, CVE-2018-4316, CVE-2018-4317, CVE-2018-4318, CVE-2018-4319, CVE-2018-4323, CVE-2018-4328, CVE-2018-4358, CVE-2018-4359, CVE-2018-4361, CVE-2018-4373, CVE-2018-4162, CVE-2018-4163, CVE-2018-4165, CVE-2018-11713, CVE-2018-4207, CVE-2018-4208, CVE-2018-4209, CVE-2018-4210, CVE-2018-4212, CVE-2018-4213, CVE-2018-4437, CVE-2018-4438, CVE-2018-4441, CVE-2018-4442, CVE-2018-4443, CVE-2018-4464 (bsc#1119558, bsc#1116998, bsc#1110279)
Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from SUSE update advisory SUSE-SU-2019:0092-1.
# The text itself is copyright (C) SUSE.
#
include("compat.inc");
if (description)
{
script_id(121206);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/02/10");
script_cve_id("CVE-2018-11713", "CVE-2018-4162", "CVE-2018-4163", "CVE-2018-4165", "CVE-2018-4191", "CVE-2018-4197", "CVE-2018-4207", "CVE-2018-4208", "CVE-2018-4209", "CVE-2018-4210", "CVE-2018-4212", "CVE-2018-4213", "CVE-2018-4299", "CVE-2018-4306", "CVE-2018-4309", "CVE-2018-4312", "CVE-2018-4314", "CVE-2018-4315", "CVE-2018-4316", "CVE-2018-4317", "CVE-2018-4318", "CVE-2018-4319", "CVE-2018-4323", "CVE-2018-4328", "CVE-2018-4345", "CVE-2018-4358", "CVE-2018-4359", "CVE-2018-4361", "CVE-2018-4372", "CVE-2018-4373", "CVE-2018-4375", "CVE-2018-4376", "CVE-2018-4378", "CVE-2018-4382", "CVE-2018-4386", "CVE-2018-4392", "CVE-2018-4416", "CVE-2018-4437", "CVE-2018-4438", "CVE-2018-4441", "CVE-2018-4442", "CVE-2018-4443", "CVE-2018-4464");
script_name(english:"SUSE SLED15 / SLES15 Security Update : webkit2gtk3 (SUSE-SU-2019:0092-1)");
script_summary(english:"Checks rpm output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote SUSE host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"This update for webkit2gtk3 to version 2.22.5 fixes the following
issues :
Security issues fixed :
CVE-2018-4372, CVE-2018-4345, CVE-2018-4386, CVE-2018-4375,
CVE-2018-4376, CVE-2018-4378, CVE-2018-4382, CVE-2018-4392,
CVE-2018-4416, CVE-2018-4191, CVE-2018-4197, CVE-2018-4299,
CVE-2018-4306, CVE-2018-4309, CVE-2018-4312, CVE-2018-4314,
CVE-2018-4315, CVE-2018-4316, CVE-2018-4317, CVE-2018-4318,
CVE-2018-4319, CVE-2018-4323, CVE-2018-4328, CVE-2018-4358,
CVE-2018-4359, CVE-2018-4361, CVE-2018-4373, CVE-2018-4162,
CVE-2018-4163, CVE-2018-4165, CVE-2018-11713, CVE-2018-4207,
CVE-2018-4208, CVE-2018-4209, CVE-2018-4210, CVE-2018-4212,
CVE-2018-4213, CVE-2018-4437, CVE-2018-4438, CVE-2018-4441,
CVE-2018-4442, CVE-2018-4443, CVE-2018-4464 (bsc#1119558, bsc#1116998,
bsc#1110279)
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1110279"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1116998"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1119558"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-11713/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4162/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4163/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4165/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4191/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4197/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4207/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4208/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4209/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4210/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4212/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4213/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4299/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4306/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4309/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4312/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4314/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4315/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4316/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4317/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4318/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4319/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4323/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4328/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4345/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4358/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4359/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4361/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4372/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4373/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4375/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4376/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4378/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4382/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4386/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4392/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4416/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4437/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4438/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4441/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4442/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4443/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-4464/"
);
# https://www.suse.com/support/update/announcement/2019/suse-su-20190092-1/
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?2c8c2c8c"
);
script_set_attribute(
attribute:"solution",
value:
"To install this SUSE Security Update use the SUSE recommended
installation methods like YaST online_update or 'zypper patch'.
Alternatively you can run the command listed for your product :
SUSE Linux Enterprise Module for Open Buildservice Development Tools
15:zypper in -t patch
SUSE-SLE-Module-Development-Tools-OBS-15-2019-92=1
SUSE Linux Enterprise Module for Desktop Applications 15:zypper in -t
patch SUSE-SLE-Module-Desktop-Applications-15-2019-92=1
SUSE Linux Enterprise Module for Basesystem 15:zypper in -t patch
SUSE-SLE-Module-Basesystem-15-2019-92=1"
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'Safari Webkit JIT Exploit for iOS 7.1.2');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libjavascriptcoregtk-4_0");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libjavascriptcoregtk-4_0-18-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libwebkit2gtk-4_0");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libwebkit2gtk-4_0-37-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:typelib-1_0-JavaScriptCore");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:typelib-1_0-WebKit2");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:typelib-1_0-WebKit2WebExtension");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:webkit-jsc");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:webkit-jsc-4-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:webkit2gtk-4_0-injected-bundles");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:webkit2gtk-4_0-injected-bundles-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:webkit2gtk3-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:webkit2gtk3-devel");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/04/03");
script_set_attribute(attribute:"patch_publication_date", value:"2019/01/15");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/01/16");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
os_ver = os_ver[1];
if (! preg(pattern:"^(SLED15|SLES15)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED15 / SLES15", "SUSE " + os_ver);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
sp = get_kb_item("Host/SuSE/patchlevel");
if (isnull(sp)) sp = "0";
if (os_ver == "SLES15" && (! preg(pattern:"^(0)$", string:sp))) audit(AUDIT_OS_NOT, "SLES15 SP0", os_ver + " SP" + sp);
if (os_ver == "SLED15" && (! preg(pattern:"^(0)$", string:sp))) audit(AUDIT_OS_NOT, "SLED15 SP0", os_ver + " SP" + sp);
flag = 0;
if (rpm_check(release:"SLES15", sp:"0", reference:"libjavascriptcoregtk-4_0-18-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"libjavascriptcoregtk-4_0-18-debuginfo-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"libwebkit2gtk-4_0-37-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"libwebkit2gtk-4_0-37-debuginfo-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"typelib-1_0-JavaScriptCore-4_0-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"typelib-1_0-WebKit2-4_0-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"typelib-1_0-WebKit2WebExtension-4_0-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"webkit-jsc-4-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"webkit-jsc-4-debuginfo-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"webkit2gtk-4_0-injected-bundles-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"webkit2gtk-4_0-injected-bundles-debuginfo-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"webkit2gtk3-debugsource-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLES15", sp:"0", reference:"webkit2gtk3-devel-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"libjavascriptcoregtk-4_0-18-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"libjavascriptcoregtk-4_0-18-debuginfo-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"libwebkit2gtk-4_0-37-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"libwebkit2gtk-4_0-37-debuginfo-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"typelib-1_0-JavaScriptCore-4_0-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"typelib-1_0-WebKit2-4_0-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"typelib-1_0-WebKit2WebExtension-4_0-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"webkit-jsc-4-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"webkit-jsc-4-debuginfo-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"webkit2gtk-4_0-injected-bundles-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"webkit2gtk-4_0-injected-bundles-debuginfo-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"webkit2gtk3-debugsource-2.22.5-3.13.1")) flag++;
if (rpm_check(release:"SLED15", sp:"0", reference:"webkit2gtk3-devel-2.22.5-3.13.1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "webkit2gtk3");
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | suse_linux | libjavascriptcoregtk-4_0 | p-cpe:/a:novell:suse_linux:libjavascriptcoregtk-4_0 |
novell | suse_linux | libjavascriptcoregtk-4_0-18-debuginfo | p-cpe:/a:novell:suse_linux:libjavascriptcoregtk-4_0-18-debuginfo |
novell | suse_linux | libwebkit2gtk-4_0 | p-cpe:/a:novell:suse_linux:libwebkit2gtk-4_0 |
novell | suse_linux | libwebkit2gtk-4_0-37-debuginfo | p-cpe:/a:novell:suse_linux:libwebkit2gtk-4_0-37-debuginfo |
novell | suse_linux | typelib-1_0-javascriptcore | p-cpe:/a:novell:suse_linux:typelib-1_0-javascriptcore |
novell | suse_linux | typelib-1_0-webkit2 | p-cpe:/a:novell:suse_linux:typelib-1_0-webkit2 |
novell | suse_linux | typelib-1_0-webkit2webextension | p-cpe:/a:novell:suse_linux:typelib-1_0-webkit2webextension |
novell | suse_linux | webkit-jsc | p-cpe:/a:novell:suse_linux:webkit-jsc |
novell | suse_linux | webkit-jsc-4-debuginfo | p-cpe:/a:novell:suse_linux:webkit-jsc-4-debuginfo |
novell | suse_linux | webkit2gtk-4_0-injected-bundles | p-cpe:/a:novell:suse_linux:webkit2gtk-4_0-injected-bundles |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11713
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4162
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4163
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4165
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4191
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4197
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4207
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4208
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4209
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4210
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4212
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4213
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4299
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4306
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4309
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4312
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4314
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4315
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4316
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4317
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4318
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4319
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4323
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4328
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4345
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4358
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4359
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4361
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4372
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4373
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4375
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4376
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4378
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4382
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4386
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4392
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4416
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4437
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4438
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4441
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4442
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4443
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4464
www.nessus.org/u?2c8c2c8c
bugzilla.suse.com/show_bug.cgi?id=1110279
bugzilla.suse.com/show_bug.cgi?id=1116998
bugzilla.suse.com/show_bug.cgi?id=1119558
www.suse.com/security/cve/CVE-2018-11713/
www.suse.com/security/cve/CVE-2018-4162/
www.suse.com/security/cve/CVE-2018-4163/
www.suse.com/security/cve/CVE-2018-4165/
www.suse.com/security/cve/CVE-2018-4191/
www.suse.com/security/cve/CVE-2018-4197/
www.suse.com/security/cve/CVE-2018-4207/
www.suse.com/security/cve/CVE-2018-4208/
www.suse.com/security/cve/CVE-2018-4209/
www.suse.com/security/cve/CVE-2018-4210/
www.suse.com/security/cve/CVE-2018-4212/
www.suse.com/security/cve/CVE-2018-4213/
www.suse.com/security/cve/CVE-2018-4299/
www.suse.com/security/cve/CVE-2018-4306/
www.suse.com/security/cve/CVE-2018-4309/
www.suse.com/security/cve/CVE-2018-4312/
www.suse.com/security/cve/CVE-2018-4314/
www.suse.com/security/cve/CVE-2018-4315/
www.suse.com/security/cve/CVE-2018-4316/
www.suse.com/security/cve/CVE-2018-4317/
www.suse.com/security/cve/CVE-2018-4318/
www.suse.com/security/cve/CVE-2018-4319/
www.suse.com/security/cve/CVE-2018-4323/
www.suse.com/security/cve/CVE-2018-4328/
www.suse.com/security/cve/CVE-2018-4345/
www.suse.com/security/cve/CVE-2018-4358/
www.suse.com/security/cve/CVE-2018-4359/
www.suse.com/security/cve/CVE-2018-4361/
www.suse.com/security/cve/CVE-2018-4372/
www.suse.com/security/cve/CVE-2018-4373/
www.suse.com/security/cve/CVE-2018-4375/
www.suse.com/security/cve/CVE-2018-4376/
www.suse.com/security/cve/CVE-2018-4378/
www.suse.com/security/cve/CVE-2018-4382/
www.suse.com/security/cve/CVE-2018-4386/
www.suse.com/security/cve/CVE-2018-4392/
www.suse.com/security/cve/CVE-2018-4416/
www.suse.com/security/cve/CVE-2018-4437/
www.suse.com/security/cve/CVE-2018-4438/
www.suse.com/security/cve/CVE-2018-4441/
www.suse.com/security/cve/CVE-2018-4442/
www.suse.com/security/cve/CVE-2018-4443/
www.suse.com/security/cve/CVE-2018-4464/