rpm package
suse/google-osconfig-agent&distro=SUSE Linux Micro 6.1
pkg:rpm/suse/google-osconfig-agent&distro=SUSE%20Linux%20Micro%206.1
Vulnerabilities (2)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2024-45339 | Hig | 7.1 | < 20250416.02-slfo.1.1_1.1 | 20250416.02-slfo.1.1_1.1 | Jan 28, 2025 | When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and | |
| CVE-2023-45288 | Hig | 7.5 | < 20250416.02-slfo.1.1_2.1 | 20250416.02-slfo.1.1_2.1 | Apr 4, 2024 | An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed Ma |
- affected < 20250416.02-slfo.1.1_1.1fixed 20250416.02-slfo.1.1_1.1
When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and
- affected < 20250416.02-slfo.1.1_2.1fixed 20250416.02-slfo.1.1_2.1
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed Ma