6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
3.5 Low
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:N/A:N
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for systemd-presets-common-SUSE fixes the following issues:
The following non-security bugs were fixed:
Modify branding-preset-states to fix systemd-presets-common-SUSE not
enabling new user systemd service preset configuration just as it
handles system service presets. By passing an (optional) second
parameter “user”, the save/apply-changes commands now work with user
services instead of system ones (bsc#1200485)
Add the wireplumber user service preset to enable it by default in
SLE15-SP4 where it replaced pipewire-media-session, but keep
pipewire-media-session preset so we don’t have to branch the
systemd-presets-common-SUSE package for SP4 (bsc#1200485)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2866=1
openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2866=1
SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-2866=1
SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-2866=1
SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-2866=1
SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-2866=1
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
openSUSE Leap | 15.4 | noarch | < - openSUSE Leap 15.4 (noarch): | - openSUSE Leap 15.4 (noarch):.noarch.rpm | |
openSUSE Leap | 15.3 | noarch | < - openSUSE Leap 15.3 (noarch): | - openSUSE Leap 15.3 (noarch):.noarch.rpm | |
SUSE Linux Enterprise Module for Basesystem 15 | SP4 | noarch | < SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch): | - SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch):.noarch.rpm | |
SUSE Linux Enterprise Module for Basesystem 15 | SP3 | noarch | < SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch): | - SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch):.noarch.rpm | |
SUSE Linux Enterprise Micro | 5.2 | noarch | < - SUSE Linux Enterprise Micro 5.2 (noarch): | - SUSE Linux Enterprise Micro 5.2 (noarch):.noarch.rpm | |
SUSE Linux Enterprise Micro | 5.1 | noarch | < - SUSE Linux Enterprise Micro 5.1 (noarch): | - SUSE Linux Enterprise Micro 5.1 (noarch):.noarch.rpm |
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
3.5 Low
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:N/A:N