Summary
The latest update to the Fusion Scan Engine that powers our internal and external vulnerability scanning is now available. Enjoy!
New Vulnerability Test Highlights
Some of the more interesting vulnerability tests we added recently are as follows:
Debian
- Debian asterisk Update (DSA-5438-1) (CVE-2023-27585)
- Debian bind9 Update (DSA-5439-1) (CVE-2023-2828, CVE-2023-2911)
- Debian chromium Update (DSA-5440-1) (CVE-2023-3420, CVE-2023-3421, CVE-2023-3422)
- Debian chromium Update (DSA-5456-1) (CVE-2023-3727, CVE-2023-3728, CVE-2023-3730, CVE-2023-3732, CVE-2023-3733, CVE-2023-3734, CVE-2023-3735, CVE-2023-3736, CVE-2023-3737, CVE-2023-3738, CVE-2023-3740)
- Debian firefox-esr Update (DSA-5450-1) (CVE-2023-37201, CVE-2023-37202, CVE-2023-37207, CVE-2023-37208, CVE-2023-37211)
- Debian flask Update (DSA-5442-1) (CVE-2023-30861)
- Debian ghostscript Update (DSA-5446-1) (CVE-2023-36664)
- Debian gpac Update (DSA-5452-1) (CVE-2023-0760, CVE-2023-3012, CVE-2023-3291)
- Debian hsqldb Update (DSA-5437-1) (CVE-2023-1183)
- Debian hsqldb1.8.0 Update (DSA-5436-1) (CVE-2023-1183)
- Debian kanboard Update (DSA-5454-1) (CVE-2023-36813)
- Debian libx11 Update (DSA-5433-1) (CVE-2023-3138)
- Debian linux Update (DSA-5448-1) (CVE-2023-2124, CVE-2023-2156, CVE-2023-2269, CVE-2023-3090, CVE-2023-31084, CVE-2023-3212, CVE-2023-32250, CVE-2023-32254, CVE-2023-3268, CVE-2023-3269, CVE-2023-3390, CVE-2023-35788)
- Debian linux Update (DSA-5453-1) (CVE-2023-2156, CVE-2023-31248, CVE-2023-35001)
- Debian maradns Update (DSA-5441-1) (CVE-2022-30256, CVE-2023-31137)
- Debian mediawiki Update (DSA-5447-1) (CVE-2023-29141, CVE-2023-36674, CVE-2023-36675)
- Debian minidlna Update (DSA-5434-1) (CVE-2023-33476)
- Debian thunderbird Update (DSA-5451-1) (CVE-2023-37201, CVE-2023-37202, CVE-2023-37207, CVE-2023-37208, CVE-2023-37211)
- Debian trafficserver Update (DSA-5435-1) (CVE-2022-47184, CVE-2023-30631, CVE-2023-33933)
- Debian webkit2gtk Update (DSA-5449-1) (CVE-2023-32439)
- Debian webkit2gtk Update (DSA-5457-1) (CVE-2023-37450)
Fedora
- Fedora bind Update (FEDORA-2023-c0ff5a2f68) (CVE-2023-2828, CVE-2023-2911)
- Fedora chromium Update (FEDORA-2023-b7efbdc392) (CVE-2023-3420, CVE-2023-3422, CVE-2023-36191)
- Fedora cups Update (FEDORA-2023-fac5968b55) (CVE-2023-34241)
- Fedora dav1d Update (FEDORA-2023-9ea5d6e289) (CVE-2023-32570)
- Fedora dotnet6.0 Update (FEDORA-2023-feda45bc39) (CVE-2023-33170)
- Fedora dotnet7.0 Update (FEDORA-2023-d25e798d6c) (CVE-2023-33170)
- Fedora ghostscript Update (FEDORA-2023-b240ebd9aa) (CVE-2023-36664)
- Fedora ghostscript Update (FEDORA-2023-d8a1c3e5e2) (CVE-2023-36664)
- Fedora golang Update (FEDORA-2023-eb60fcd505) (CVE-2023-29402, CVE-2023-29403, CVE-2023-29404, CVE-2023-29405)
- Fedora golang-github-cloudflare-cfssl Update (FEDORA-2023-b1cebc5424) (CVE-2022-41717)
- Fedora golang-github-schollz-croc Update (FEDORA-2023-ac4651c9b2) (CVE-2022-41717)
- Fedora kernel Update (FEDORA-2023-9e7774da21) (CVE-2023-1859)
- Fedora kernel Update (FEDORA-2023-e4e985b5dd) (CVE-2023-31248, CVE-2023-35001)
- Fedora kubernetes Update (FEDORA-2023-a1d7a29fe5) (CVE-2021-25743, CVE-2023-2431)
- Fedora kubernetes Update (FEDORA-2023-c7f63322b5) (CVE-2023-2431)
- Fedora mingw-nsis Update (FEDORA-2023-b9ec99605f) (CVE-2023-37378)
- Fedora mingw-nsis Update (FEDORA-2023-dfb6cc599f) (CVE-2023-37378)
- Fedora mod_auth_openidc Update (FEDORA-2023-b534ca7056) (CVE-2023-28625)
- Fedora pcs Update (FEDORA-2023-ae96dd6105) (CVE-2022-38900)
- Fedora pcs Update (FEDORA-2023-b86fd9ad80) (CVE-2022-38900)
- Fedora pcs Update (FEDORA-2023-e4cb7a5bda) (CVE-2022-38900)
- Fedora redis Update (FEDORA-2023-c406ba1ff6) (CVE-2022-24834, CVE-2023-36824)
- Fedora sysstat Update (FEDORA-2023-ac947ec260) (CVE-2023-33204)
- Fedora tang Update (FEDORA-2023-eb9bec6e8c) (CVE-2023-1672)
- Fedora wabt Update (FEDORA-2023-ab291ca614) (CVE-2023-27116, CVE-2023-30300, CVE-2023-31669)
- Fedora webkitgtk Update (FEDORA-2023-be1ed6a2b4) (CVE-2023-32439)
FreeBSD
- FreeBSD apache24 Update (8edeb3c1-bfe7-11ed-96f5-3497f65b111b) (CVE-2023-25690, CVE-2023-27522)
- FreeBSD chromium Update (90c48c04-d549-4fc0-a503-4775e32d438e) (CVE-2023-2133, CVE-2023-2134, CVE-2023-2135, CVE-2023-2136, CVE-2023-2137)
- FreeBSD chromium Update (ad05a737-14bd-11ee-8290-a8a1599412c6) (CVE-2023-3420, CVE-2023-3421, CVE-2023-3422)
- FreeBSD chromium Update (bea52545-f4a7-11ed-8290-a8a1599412c6) (CVE-2023-2721, CVE-2023-2722, CVE-2023-2723, CVE-2023-2724, CVE-2023-2725, CVE-2023-2726)
- FreeBSD curl Update (a4f8bb03-f52f-11ed-9859-080027083a05) (CVE-2023-28319, CVE-2023-28320, CVE-2023-28321, CVE-2023-28322)
- FreeBSD electron22 Update (b09d77d0-b27c-48ae-b69b-9641bb68b39e) (CVE-2023-29469)
- FreeBSD electron23 Update (a03b2d9e-b3f2-428c-8f66-21092ed2ba94) (CVE-2023-3215, CVE-2023-3216)
- FreeBSD electron23 Update (d1681df3-421e-4a63-95b4-a3d6e29d395d) (CVE-2023-3420, CVE-2023-3421, CVE-2023-3422)
- FreeBSD electron24 Update (aae2ab45-2d21-4cd5-a53b-07ec933400ac) (CVE-2023-2930, CVE-2023-2931, CVE-2023-2932, CVE-2023-2933, CVE-2023-2934, CVE-2023-2935, CVE-2023-2936, CVE-2023-3079)
- FreeBSD element-web Update (c70c3dc3-258c-11ee-b37b-901b0e9408dc) (CVE-2023-37259)
- FreeBSD gitlab-ce Update (89fdbd85-ebd2-11ed-9c88-001b217b3468) (CVE-2023-2478)
- FreeBSD gitlab-ce Update (cdb5338d-04ec-11ee-9c88-001b217b3468) (CVE-2023-0121, CVE-2023-0508, CVE-2023-0921, CVE-2023-1204, CVE-2023-1825, CVE-2023-2001, CVE-2023-2013, CVE-2023-2015, CVE-2023-2132, CVE-2023-2198, CVE-2023-2199, CVE-2023-2442, CVE-2023-2485, CVE-2023-2589)
- FreeBSD gitlab-ce Update (d8972bcd-1b64-11ee-9cd6-001b217b3468) (CVE-2023-3484)
- FreeBSD grafana Update (955eb3cc-ce0b-11ed-825f-6c3be5272acd) (CVE-2023-1410)
- FreeBSD grafana Update (fdbe9aec-118b-11ee-908a-6c3be5272acd) (CVE-2023-3128)
- FreeBSD jenkins Update (b4db7d78-bb62-4f4c-9326-6e9fc2ddd400) (CVE-2023-35141)
- FreeBSD librecad Update (b67d768c-1f53-11ee-82ed-4ccc6adda413) (CVE-2023-30259)
- FreeBSD mediawiki135 Update (95dad123-180e-11ee-86ba-080027eda32c) (CVE-2023-29197, CVE-2023-36674, CVE-2023-36675)
- FreeBSD openssh-portable Update (887eb570-27d3-11ee-adba-c80aa9043978) (CVE-2023-38408)
- FreeBSD php80-kanboard Update (79514fcd-feb4-11ed-92b5-b42e991fc52e) (CVE-2023-32685)
- FreeBSD php80-kanboard Update (bfca647c-0456-11ee-bafd-b42e991fc52e) (CVE-2023-33956, CVE-2023-33968, CVE-2023-33969, CVE-2023-33970)
- FreeBSD py310-pymatgen Update (951b513a-9f42-436d-888d-2162615d0fe4) (CVE-2022-42964)
- FreeBSD py310-slixmpp Update (93db4f92-9997-4f4f-8614-3963d9e2b0ec) (CVE-2022-45197)
- FreeBSD py39-joblib Update (845f8430-d0ee-4134-ae35-480a3e139b8a) (CVE-2022-21797)
- FreeBSD py39-redis Update (8aa6340d-e7c6-41e0-b2a3-3c9e9930312a) (CVE-2023-28859)
- FreeBSD py39-sqlalchemy11 Update (8ccff771-ceca-43a0-85ad-3e595e73b425) (CVE-2019-7164, CVE-2019-7548)
- FreeBSD python37 Update (d86becfe-05a4-11ee-9d4a-080027eda32c) (CVE-2022-4303, CVE-2023-0286, CVE-2023-0464, CVE-2023-0465, CVE-2023-0466, CVE-2023-24329, CVE-2023-2650)
- FreeBSD redis Update (96b2d4db-ddd2-11ed-b6ea-080027f5fec9) (CVE-2023-28856)
- FreeBSD ruby Update (9b60bba1-cf18-11ed-bd44-080027f5fec9) (CVE-2023-28755)
- FreeBSD softether Update (d821956f-1753-11ee-ad66-1c61b4739ac9) (CVE-2023-22325, CVE-2023-27395, CVE-2023-27516, CVE-2023-31192, CVE-2023-32275, CVE-2023-32634)
- FreeBSD virtualbox-ose Update (bc90e894-264b-11ee-a468-80fa5b29d485) (CVE-2023-22018)
- FreeBSD virtualbox-ose Update (cf40e8b7-264d-11ee-a468-80fa5b29d485) (CVE-2023-22017)
- FreeBSD virtualbox-ose Update (f32b1fbd-264d-11ee-a468-80fa5b29d485) (CVE-2023-22016)
- FreeBSD vscode Update (7913fe6d-2c6e-40ba-a7d7-35696f3db2b6) (CVE-2023-29338)
- FreeBSD xephyr Update (96d84238-b500-490b-b6aa-2b77090a0410) (CVE-2023-1393)
Microsoft
- Microsoft Windows August 2023 Security Updates Missing (CVE-2023-20569, CVE-2023-35359, CVE-2023-35376, CVE-2023-35377, CVE-2023-35378, CVE-2023-35380, CVE-2023-35381, CVE-2023-35382, CVE-2023-35383, CVE-2023-35384, CVE-2023-35385, CVE-2023-35386, CVE-2023-35387, CVE-2023-36882, CVE-2023-36884, CVE-2023-36889, CVE-2023-36900, CVE-2023-36903, CVE-2023-36904, CVE-2023-36905, CVE-2023-36906, CVE-2023-36907, CVE-2023-36908, CVE-2023-36909, CVE-2023-36910, CVE-2023-36911, CVE-2023-36912, CVE-2023-36913, CVE-2023-38154, CVE-2023-38172, CVE-2023-38184, CVE-2023-38254)
- Microsoft Windows July 2023 Security Updates Missing (CVE-2023-21526, CVE-2023-21756, CVE-2023-32033, CVE-2023-32034, CVE-2023-32035, CVE-2023-32037, CVE-2023-32038, CVE-2023-32039, CVE-2023-32040, CVE-2023-32041, CVE-2023-32042, CVE-2023-32043, CVE-2023-32044, CVE-2023-32045, CVE-2023-32046, CVE-2023-32049, CVE-2023-32053, CVE-2023-32054, CVE-2023-32055, CVE-2023-32056, CVE-2023-32057, CVE-2023-32083, CVE-2023-32084, CVE-2023-32085, CVE-2023-33154, CVE-2023-33155, CVE-2023-33163, CVE-2023-33164, CVE-2023-33166, CVE-2023-33167, CVE-2023-33168, CVE-2023-33169, CVE-2023-33172, CVE-2023-33173, CVE-2023-33174, CVE-2023-35296, CVE-2023-35297, CVE-2023-35299, CVE-2023-35300, CVE-2023-35302, CVE-2023-35303, CVE-2023-35304, CVE-2023-35305, CVE-2023-35306, CVE-2023-35308, CVE-2023-35309, CVE-2023-35310, CVE-2023-35312, CVE-2023-35313, CVE-2023-35314, CVE-2023-35315, CVE-2023-35316, CVE-2023-35317, CVE-2023-35318, CVE-2023-35319, CVE-2023-35320, CVE-2023-35321, CVE-2023-35322, CVE-2023-35324, CVE-2023-35325, CVE-2023-35326, CVE-2023-35328, CVE-2023-35329, CVE-2023-35330, CVE-2023-35331, CVE-2023-35332, CVE-2023-35336, CVE-2023-35338, CVE-2023-35339, CVE-2023-35340, CVE-2023-35341, CVE-2023-35342, CVE-2023-35343, CVE-2023-35344, CVE-2023-35345, CVE-2023-35346, CVE-2023-35348, CVE-2023-35350, CVE-2023-35351, CVE-2023-35352, CVE-2023-35353, CVE-2023-35356, CVE-2023-35357, CVE-2023-35358, CVE-2023-35360, CVE-2023-35361, CVE-2023-35362, CVE-2023-35363, CVE-2023-35364, CVE-2023-35365, CVE-2023-35366, CVE-2023-35367, CVE-2023-36871, CVE-2023-36874, CVE-2023-36884)
- Microsoft Windows September 2023 Security Updates Missing (CVE-2023-35355, CVE-2023-36801, CVE-2023-36802, CVE-2023-36803, CVE-2023-36804, CVE-2023-36805, CVE-2023-38139, CVE-2023-38140, CVE-2023-38141, CVE-2023-38142, CVE-2023-38143, CVE-2023-38144, CVE-2023-38146, CVE-2023-38147, CVE-2023-38148, CVE-2023-38149, CVE-2023-38150, CVE-2023-38152, CVE-2023-38160, CVE-2023-38161, CVE-2023-38162)
Moodle
SUSE
- SUSE Enterprise Linux bind Update (SUSE-SU-2023:2578-1) (CVE-2020-7753, CVE-2021-3807, CVE-2021-3918, CVE-2021-43138, CVE-2022-0155, CVE-2022-27664, CVE-2022-31097, CVE-2022-31107, CVE-2022-32149, CVE-2022-35957, CVE-2022-36062, CVE-2022-41715, CVE-2022-46146, CVE-2023-1387, CVE-2023-1410)
- SUSE Enterprise Linux bind Update (SUSE-SU-2023:2793-1) (CVE-2023-2828)
- SUSE Enterprise Linux bind Update (SUSE-SU-2023:2794-1) (CVE-2023-2828)
- SUSE Enterprise Linux bluez Update (SUSE-SU-2023:2562-1) (CVE-2023-27349)
- SUSE Enterprise Linux bouncycastle Update (SUSE-SU-2023:2843-1) (CVE-2023-33201)
- SUSE Enterprise Linux cups Update (SUSE-SU-2023:2616-1) (CVE-2023-34241)
- SUSE Enterprise Linux curl Update (SUSE-SU-2023:2880-1) (CVE-2023-32001)
- SUSE Enterprise Linux dbus-1 Update (SUSE-SU-2023:2876-1) (CVE-2023-34969)
- SUSE Enterprise Linux dnsdist Update (SUSE-SU-2023:2777-1) (CVE-2016-7069, CVE-2017-7557, CVE-2018-14663)
- SUSE Enterprise Linux ghostscript Update (SUSE-SU-2023:2829-1) (CVE-2023-36664)
- SUSE Enterprise Linux ghostscript Update (SUSE-SU-2023:2844-1) (CVE-2023-36664)
- SUSE Enterprise Linux ImageMagick-config-6-SUSE Update (SUSE-SU-2023:2870-1) (CVE-2023-3195)
- SUSE Enterprise Linux kernel-64kb Update (SUSE-SU-2023:2611-1) (CVE-2020-36694, CVE-2021-29650, CVE-2022-3566, CVE-2022-4269, CVE-2022-45884, CVE-2022-45885, CVE-2022-45886, CVE-2022-45887, CVE-2022-45919, CVE-2023-1079, CVE-2023-1380, CVE-2023-1637, CVE-2023-2156, CVE-2023-2194, CVE-2023-23586, CVE-2023-2483, CVE-2023-2513, CVE-2023-31084, CVE-2023-31436, CVE-2023-32233, CVE-2023-32269, CVE-2023-33288)
- SUSE Enterprise Linux kernel-64kb Update (SUSE-SU-2023:2859-1) (CVE-2023-1077, CVE-2023-1249, CVE-2023-2002, CVE-2023-3090, CVE-2023-3141, CVE-2023-3159, CVE-2023-3161, CVE-2023-3268, CVE-2023-3358, CVE-2023-35788, CVE-2023-35823, CVE-2023-35824, CVE-2023-35828)
- SUSE Enterprise Linux kernel-azure Update (SUSE-SU-2023:2808-1) (CVE-2023-1077, CVE-2023-1079, CVE-2023-1249, CVE-2023-1637, CVE-2023-2002, CVE-2023-3090, CVE-2023-3111, CVE-2023-3141, CVE-2023-3159, CVE-2023-3161, CVE-2023-3268, CVE-2023-3358, CVE-2023-35824)
- SUSE Enterprise Linux kernel-default Update (SUSE-SU-2023:2651-1) (CVE-2020-36694, CVE-2021-29650, CVE-2022-3566, CVE-2022-4269, CVE-2022-45884, CVE-2022-45885, CVE-2022-45886, CVE-2022-45887, CVE-2022-45919, CVE-2023-1079, CVE-2023-1380, CVE-2023-1637, CVE-2023-2124, CVE-2023-2194, CVE-2023-23586, CVE-2023-2483, CVE-2023-2513, CVE-2023-31084, CVE-2023-31436, CVE-2023-32233, CVE-2023-32269, CVE-2023-33288)
- SUSE Enterprise Linux kernel-default Update (SUSE-SU-2023:2822-1) (CVE-2023-1077, CVE-2023-1079, CVE-2023-1249, CVE-2023-1637, CVE-2023-2002, CVE-2023-3090, CVE-2023-3111, CVE-2023-3141, CVE-2023-3159, CVE-2023-3161, CVE-2023-3268, CVE-2023-3358, CVE-2023-35824)
- SUSE Enterprise Linux kernel-default Update (SUSE-SU-2023:2830-1) (CVE-2023-1079, CVE-2023-1249, CVE-2023-1637, CVE-2023-2002, CVE-2023-3090, CVE-2023-3111, CVE-2023-3141, CVE-2023-3159, CVE-2023-3161, CVE-2023-3268, CVE-2023-3358, CVE-2023-35824)
- SUSE Enterprise Linux kernel-default Update (SUSE-SU-2023:2834-1) (CVE-2023-1077, CVE-2023-1249, CVE-2023-2002, CVE-2023-3090, CVE-2023-3141, CVE-2023-3159, CVE-2023-3161, CVE-2023-3268, CVE-2023-3358, CVE-2023-35788, CVE-2023-35823, CVE-2023-35824, CVE-2023-35828)
- SUSE Enterprise Linux libcap-devel Update (SUSE-SU-2023:2764-1) (CVE-2023-2603)
- SUSE Enterprise Linux libdcerpc-binding0 Update (SUSE-SU-2023:2887-1) (CVE-2022-2127)
- SUSE Enterprise Linux libiniparser0 Update (SUSE-SU-2023:2692-1) (CVE-2023-33461)
- SUSE Enterprise Linux libjavascriptcoregtk-4_0-18 Update (SUSE-SU-2023:2606-1) (CVE-2023-28204, CVE-2023-32373)
- SUSE Enterprise Linux libjavascriptcoregtk-4_0-18 Update (SUSE-SU-2023:2607-1) (CVE-2023-28204, CVE-2023-32373)
- SUSE Enterprise Linux libmariadbd-devel Update (SUSE-SU-2023:2478-2) (CVE-2022-47015)
- SUSE Enterprise Linux libmysqld-devel Update (SUSE-SU-2023:2835-1) (CVE-2022-32084)
- SUSE Enterprise Linux libopenssl-1_0_0-devel Update (SUSE-SU-2023:2624-1) (CVE-2022-4304)
- SUSE Enterprise Linux libopenssl-1_1-devel Update (SUSE-SU-2023:2622-1) (CVE-2022-4304)
- SUSE Enterprise Linux libopenssl-1_1-devel Update (SUSE-SU-2023:2961-1) (CVE-2023-3446)
- SUSE Enterprise Linux libopenssl1_1 Update (SUSE-SU-2023:2623-1) (CVE-2022-4304)
- SUSE Enterprise Linux libopenssl1_1 Update (SUSE-SU-2023:2964-1) (CVE-2023-3446)
- SUSE Enterprise Linux libopenvswitch-2_11-0 Update (SUSE-SU-2023:2621-1) (CVE-2023-1668)
- SUSE Enterprise Linux libpoppler-glib8 Update (SUSE-SU-2023:2907-1) (CVE-2017-18267, CVE-2018-13988, CVE-2018-16646, CVE-2018-18897, CVE-2018-19058, CVE-2018-19059, CVE-2018-19060, CVE-2018-19149, CVE-2018-20481, CVE-2018-20650, CVE-2018-21009, CVE-2019-12293, CVE-2019-7310, CVE-2022-27337)
- SUSE Enterprise Linux libprotobuf-lite20 Update (SUSE-SU-2023:2783-1) (CVE-2018-1000518, CVE-2020-25659, CVE-2020-36242, CVE-2021-22569, CVE-2021-22570, CVE-2022-1941, CVE-2022-3171)
- SUSE Enterprise Linux libpython2_7-1_0 Update (SUSE-SU-2023:2639-1) (CVE-2023-24329)
- SUSE Enterprise Linux libpython3_9-1_0 Update (SUSE-SU-2023:2957-1) (CVE-2007-4559, CVE-2023-24329)
- SUSE Enterprise Linux libQt5Concurrent-devel Update (SUSE-SU-2023:2860-1) (CVE-2023-32763)
- SUSE Enterprise Linux libQt5Concurrent5 Update (SUSE-SU-2023:2816-1) (CVE-2020-24741, CVE-2023-32763)
- SUSE Enterprise Linux libsamba-policy-python3-devel Update (SUSE-SU-2023:2888-1) (CVE-2022-2127, CVE-2023-34966, CVE-2023-34967, CVE-2023-34968)
- SUSE Enterprise Linux libsqlite3-0 Update (SUSE-SU-2023:2668-1) (CVE-2022-46908)
- SUSE Enterprise Linux libvirt Update (SUSE-SU-2023:2754-1) (CVE-2022-0897)
- SUSE Enterprise Linux libX11-6 Update (SUSE-SU-2023:2614-1) (CVE-2023-3138)
- SUSE Enterprise Linux MozillaFirefox Update (SUSE-SU-2023:2849-1) (CVE-2023-3482, CVE-2023-37201, CVE-2023-37202, CVE-2023-37203, CVE-2023-37204, CVE-2023-37205, CVE-2023-37206, CVE-2023-37207, CVE-2023-37208, CVE-2023-37209, CVE-2023-37210, CVE-2023-37211, CVE-2023-37212)
- SUSE Enterprise Linux MozillaFirefox Update (SUSE-SU-2023:2850-1) (CVE-2023-3482, CVE-2023-37201, CVE-2023-37202, CVE-2023-37203, CVE-2023-37204, CVE-2023-37205, CVE-2023-37206, CVE-2023-37207, CVE-2023-37208, CVE-2023-37209, CVE-2023-37210, CVE-2023-37211, CVE-2023-37212)
- SUSE Enterprise Linux MozillaFirefox Update (SUSE-SU-2023:2886-1) (CVE-2023-3482, CVE-2023-37201, CVE-2023-37202, CVE-2023-37203, CVE-2023-37204, CVE-2023-37205, CVE-2023-37206, CVE-2023-37207, CVE-2023-37208, CVE-2023-37209, CVE-2023-37210, CVE-2023-37211, CVE-2023-37212)
- SUSE Enterprise Linux MozillaFirefox Update (SUSE-SU-2023:2958-1) (CVE-2023-3600)
- SUSE Enterprise Linux MozillaFirefox Update (SUSE-SU-2023:2959-1) (CVE-2023-3600)
- SUSE Enterprise Linux MozillaFirefox Update (SUSE-SU-2023:2960-1) (CVE-2023-3600)
- SUSE Enterprise Linux nodejs16 Update (SUSE-SU-2023:2861-1) (CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067)
- SUSE Enterprise Linux ntp Update (SUSE-SU-2023:2609-1) (CVE-2023-26555)
- SUSE Enterprise Linux openssh Update (SUSE-SU-2023:2945-1) (CVE-2023-38408)
- SUSE Enterprise Linux openssh Update (SUSE-SU-2023:2946-1) (CVE-2023-38408)
- SUSE Enterprise Linux openssh Update (SUSE-SU-2023:2947-1) (CVE-2023-38408)
- SUSE Enterprise Linux openssh Update (SUSE-SU-2023:2950-1) (CVE-2023-38408)
Ubuntu
- Canonical Ubuntu aspnetcore-runtime-6.0 Update (USN-6217-1) (CVE-2023-33170)
- Canonical Ubuntu avahi-daemon Update (USN-6129-2) (CVE-2023-1981)
- Canonical Ubuntu bind9 Update (USN-6183-1) (CVE-2023-2828, CVE-2023-2911)
- Canonical Ubuntu containerd Update (USN-6202-1) (CVE-2023-25153, CVE-2023-25173)
- Canonical Ubuntu cups Update (USN-6184-1) (CVE-2023-34241)
- Canonical Ubuntu cups Update (USN-6184-2) (CVE-2023-34241)
- Canonical Ubuntu cups-filters Update (USN-6083-2) (CVE-2023-24805)
- Canonical Ubuntu dwarves Update (USN-6215-1) (CVE-2022-3534, CVE-2022-3606)
- Canonical Ubuntu ecdsautils Update (USN-6239-1) (CVE-2022-24884)
- Canonical Ubuntu firefox Update (USN-6143-3) (CVE-2023-34414, CVE-2023-34415, CVE-2023-34416, CVE-2023-34417)
- Canonical Ubuntu firefox Update (USN-6201-1) (CVE-2023-3482, CVE-2023-37201, CVE-2023-37202, CVE-2023-37203, CVE-2023-37204, CVE-2023-37205, CVE-2023-37206, CVE-2023-37207, CVE-2023-37208, CVE-2023-37209, CVE-2023-37210, CVE-2023-37211, CVE-2023-37212)
- Canonical Ubuntu firefox Update (USN-6218-1) (CVE-2023-3600)
- Canonical Ubuntu frr Update (USN-6136-1) (CVE-2023-31489, CVE-2023-31490)
- Canonical Ubuntu frr Update (USN-6240-1) (CVE-2023-3748)
- Canonical Ubuntu ghostscript Update (USN-6213-1) (CVE-2023-36664)
- Canonical Ubuntu graphite-web Update (USN-6243-1) (CVE-2017-18638, CVE-2022-4728, CVE-2022-4729, CVE-2022-4730)
- Canonical Ubuntu knot-resolver Update (USN-6225-1) (CVE-2022-40188)
- Canonical Ubuntu lib3mf1 Update (USN-6216-1) (CVE-2021-21772)
- Canonical Ubuntu libbatik-java Update (USN-6117-1) (CVE-2019-17566, CVE-2020-11987, CVE-2022-38398, CVE-2022-38648, CVE-2022-40146, CVE-2022-41704, CVE-2022-42890)
- Canonical Ubuntu libcurl3-gnutls Update (USN-6237-2) (CVE-2023-28321, CVE-2023-28322, CVE-2023-32001)
- Canonical Ubuntu libmagick++-6.q16hdri-dev Update (USN-6200-1) (CVE-2020-29599, CVE-2021-20224, CVE-2021-20241, CVE-2021-20243, CVE-2021-20244, CVE-2021-20246, CVE-2021-20309, CVE-2021-20312, CVE-2021-20313, CVE-2021-3610, CVE-2021-39212, CVE-2022-28463, CVE-2022-32545, CVE-2022-32546, CVE-2022-32547, CVE-2023-1289, CVE-2023-1906, CVE-2023-3195, CVE-2023-34151, CVE-2023-3428)
- Canonical Ubuntu libmozjs-102-0 Update (USN-6120-1) (CVE-2023-25735, CVE-2023-25739, CVE-2023-25751, CVE-2023-29535, CVE-2023-29536, CVE-2023-29548, CVE-2023-29550, CVE-2023-32211, CVE-2023-32215)
- Canonical Ubuntu libmozjs-102-0 Update (USN-6227-1) (CVE-2023-37202, CVE-2023-37211)
- Canonical Ubuntu libraw20 Update (USN-6137-1) (CVE-2021-32142, CVE-2023-1729)
- Canonical Ubuntu libssh-4 Update (USN-6138-1) (CVE-2023-1667, CVE-2023-2283)
- Canonical Ubuntu libssl3 Update (USN-6119-1) (CVE-2023-1255, CVE-2023-2650)
- Canonical Ubuntu libtiff5 Update (USN-6229-1) (CVE-2023-25433, CVE-2023-26965, CVE-2023-26966, CVE-2023-3316)
- Canonical Ubuntu libvirt-daemon Update (USN-6126-1) (CVE-2022-0897, CVE-2023-2700)
- Canonical Ubuntu linux-image-4.15.0-1150-gcp Update (USN-6084-1) (CVE-2023-0459, CVE-2023-1118, CVE-2023-1513, CVE-2023-2162, CVE-2023-32269)
- Canonical Ubuntu linux-image-5.15.0-1030-intel-iotg Update (USN-6133-1) (CVE-2022-27672, CVE-2022-3707, CVE-2023-0459, CVE-2023-1075, CVE-2023-1078, CVE-2023-1118, CVE-2023-1513, CVE-2023-1829, CVE-2023-1872, CVE-2023-20938, CVE-2023-2162, CVE-2023-32269)
- Canonical Ubuntu linux-image-5.15.0-1034-intel-iotg Update (USN-6212-1) (CVE-2023-35788)
- Canonical Ubuntu linux-image-5.4.0-1064-bluefield Update (USN-6132-1) (CVE-2022-3707, CVE-2023-0459, CVE-2023-1075, CVE-2023-1078, CVE-2023-1118, CVE-2023-1380, CVE-2023-1513, CVE-2023-2162, CVE-2023-2612, CVE-2023-30456, CVE-2023-31436, CVE-2023-32233, CVE-2023-32269)
- Canonical Ubuntu linux-image-5.4.0-1101-oracle Update (USN-6118-1) (CVE-2022-3707, CVE-2023-0459, CVE-2023-1075, CVE-2023-1078, CVE-2023-1118, CVE-2023-1513, CVE-2023-2162, CVE-2023-32269)
- Canonical Ubuntu linux-image-6.1.0-1013-oem Update (USN-6122-1) (CVE-2023-2612, CVE-2023-32233)
- Canonical Ubuntu linux-image-6.2.0-1006-kvm Update (USN-6186-1) (CVE-2022-4269, CVE-2023-1380, CVE-2023-1583, CVE-2023-1611, CVE-2023-1670, CVE-2023-1855, CVE-2023-1859, CVE-2023-1989, CVE-2023-1990, CVE-2023-2194, CVE-2023-2235, CVE-2023-2612, CVE-2023-28466, CVE-2023-28866, CVE-2023-30456, CVE-2023-30772, CVE-2023-31436, CVE-2023-32233, CVE-2023-33203, CVE-2023-33288)
- Canonical Ubuntu linux-image-6.2.0-1007-oracle Update (USN-6228-1) (CVE-2023-2124, CVE-2023-2176)
- Canonical Ubuntu linux-image-azure-fde Update (USN-6135-1) (CVE-2023-1380, CVE-2023-2612, CVE-2023-30456, CVE-2023-31436, CVE-2023-32233)
- Canonical Ubuntu linux-image-gcp Update (USN-6220-1) (CVE-2023-35788)
- Canonical Ubuntu linux-image-gcp-lts-20.04 Update (USN-6131-1) (CVE-2023-1380, CVE-2023-2612, CVE-2023-30456, CVE-2023-31436, CVE-2023-32233)
- Canonical Ubuntu linux-image-gkeop Update (USN-6172-1) (CVE-2023-1076, CVE-2023-1077, CVE-2023-1079, CVE-2023-1670, CVE-2023-1859, CVE-2023-1998, CVE-2023-25012, CVE-2023-2985)
- Canonical Ubuntu linux-image-ibm Update (USN-6185-1) (CVE-2023-1076, CVE-2023-1077, CVE-2023-1079, CVE-2023-1670, CVE-2023-1859, CVE-2023-1998, CVE-2023-25012, CVE-2023-2985)
- Canonical Ubuntu linux-image-ibm Update (USN-6187-1) (CVE-2022-4269, CVE-2023-1076, CVE-2023-1077, CVE-2023-1079, CVE-2023-1670, CVE-2023-1859, CVE-2023-1998, CVE-2023-25012, CVE-2023-2985)
- Canonical Ubuntu linux-image-intel-iotg Update (USN-6134-1) (CVE-2022-27672, CVE-2022-3707, CVE-2022-4129, CVE-2022-47929, CVE-2022-4842, CVE-2023-0386, CVE-2023-0394, CVE-2023-0458, CVE-2023-0459, CVE-2023-1073, CVE-2023-1074, CVE-2023-1075, CVE-2023-1078, CVE-2023-1118, CVE-2023-1281, CVE-2023-1513, CVE-2023-1652, CVE-2023-1829, CVE-2023-1872, CVE-2023-20938, CVE-2023-21102, CVE-2023-2162, CVE-2023-26545, CVE-2023-32269)
- Canonical Ubuntu linux-image-oem-22.04 Update (USN-6124-1) (CVE-2022-3586, CVE-2022-4139, CVE-2023-1670, CVE-2023-2612, CVE-2023-30456, CVE-2023-32233)
- Canonical Ubuntu linux-image-oem-22.04b Update (USN-6123-1) (CVE-2023-1670, CVE-2023-2612, CVE-2023-26606, CVE-2023-30456, CVE-2023-32233)
- Canonical Ubuntu linux-image-oem-22.04c Update (USN-6173-1) (CVE-2023-1380, CVE-2023-2002, CVE-2023-2156, CVE-2023-2269, CVE-2023-31436, CVE-2023-32250, CVE-2023-32254)
- Canonical Ubuntu linux-image-oem-22.04c Update (USN-6194-1) (CVE-2023-2176, CVE-2023-2430, CVE-2023-35788)
- Canonical Ubuntu linux-image-oem-22.04c Update (USN-6231-1) (CVE-2023-2124, CVE-2023-3090, CVE-2023-31084, CVE-2023-3141, CVE-2023-3212)
- Canonical Ubuntu linux-image-xilinx-zynqmp Update (USN-6234-1) (CVE-2023-35788)
- Canonical Ubuntu nanopb Update (USN-6121-1) (CVE-2020-26243, CVE-2021-21401)
- Canonical Ubuntu node-fetch Update (USN-6158-1) (CVE-2022-0235)
- Canonical Ubuntu openssh-client Update (USN-6242-1) (CVE-2023-38408)
- Canonical Ubuntu openssl Update (USN-6188-1) (CVE-2023-2650)
- Canonical Ubuntu perl Update (USN-6112-2) (CVE-2023-31484)
- Canonical Ubuntu php8.1-cli Update (USN-6199-1) (CVE-2023-3247)
- Canonical Ubuntu pngcheck Update (USN-6182-1) (CVE-2020-27818, CVE-2020-35511)
- Canonical Ubuntu postgresql-9.5 Update (USN-6230-1) (CVE-2023-2454)
- Canonical Ubuntu python3-django Update (USN-6203-1) (CVE-2023-36053)
- Canonical Ubuntu python3-django Update (USN-6203-2) (CVE-2023-36053)
- Canonical Ubuntu python3-glance-store Update (USN-6241-1) (CVE-2023-2088)
- Canonical Ubuntu python3-reportlab Update (USN-6196-1) (CVE-2023-33733)
- Canonical Ubuntu python3-scipy Update (USN-6226-1) (CVE-2023-25399, CVE-2023-29824)
- Canonical Ubuntu python3-tornado Update (USN-6159-1) (CVE-2023-28370)
- Canonical Ubuntu python3.11 Update (USN-6139-1) (CVE-2023-24329)
- Canonical Ubuntu ruby-doorkeeper Update (USN-6210-1) (CVE-2023-34246)
- Canonical Ubuntu ruby3.1 Update (USN-6181-1) (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756)
- Canonical Ubuntu samba Update (USN-6238-1) (CVE-2022-2127, CVE-2023-3347, CVE-2023-34966, CVE-2023-34967, CVE-2023-34968)
- Canonical Ubuntu screen Update (USN-6198-1) (CVE-2023-24626)
- Canonical Ubuntu slapd Update (USN-6197-1) (CVE-2023-2953)
- Canonical Ubuntu snapd Update (USN-6125-1) (CVE-2023-1523)
- Canonical Ubuntu sysstat Update (USN-6145-1) (CVE-2022-39377, CVE-2023-33204)
- Canonical Ubuntu thunderbird Update (USN-6214-1) (CVE-2023-34414, CVE-2023-34416, CVE-2023-37201, CVE-2023-37202, CVE-2023-37207, CVE-2023-37208, CVE-2023-37211)
- Canonical Ubuntu vim-athena Update (USN-6195-1) (CVE-2022-0128, CVE-2022-0156, CVE-2022-0158, CVE-2022-0393, CVE-2022-0407, CVE-2022-0696)
- Canonical Ubuntu wkhtmltopdf Update (USN-6232-1) (CVE-2020-21365)
How to Update?
All VikingCloud customers using the Fusion Scan Engine receive the updates automatically as soon as an update is available. No action is required.