Upstream information
Description
** DISPUTED ** An HTML injection vulnerability exists in the Edit Content Layout module of Kirby CMS v4.1.0. NOTE: the vendor disputes the significance of this report because some HTML formatting (such as with an H1 element) is allowed, but there is backend sanitization such that the reporter's mentioned "injecting malicious scripts" would not occur.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having not set severity.
Note from the SUSE Security Team on the kernel-default package
SUSE will no longer fix all CVEs in the Linux Kernel anymore, but declare some bug classes as won't fix. Please refer to TID 21496 for more details. No SUSE Bugzilla entries cross referenced.SUSE Security Advisories:
- SUSE-SU-2024:2571-1, published Mon Jul 22 20:34:22 UTC 2024
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
Container bci/bci-sle15-kernel-module-devel:15.6.17.15 |
| |
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.8 Image SLES15-SP6 Image SLES15-SP6-BYOS Image SLES15-SP6-BYOS-Azure Image SLES15-SP6-BYOS-EC2 Image SLES15-SP6-BYOS-GCE Image SLES15-SP6-CHOST-BYOS Image SLES15-SP6-CHOST-BYOS-Aliyun Image SLES15-SP6-CHOST-BYOS-Azure Image SLES15-SP6-CHOST-BYOS-EC2 Image SLES15-SP6-CHOST-BYOS-GCE Image SLES15-SP6-CHOST-BYOS-GDC Image SLES15-SP6-CHOST-BYOS-SAP-CCloud Image SLES15-SP6-EC2 Image SLES15-SP6-EC2-ECS-HVM Image SLES15-SP6-GCE Image SLES15-SP6-HPC-BYOS Image SLES15-SP6-HPC-BYOS-Azure Image SLES15-SP6-HPC-BYOS-EC2 Image SLES15-SP6-HPC-BYOS-GCE Image SLES15-SP6-HPC-EC2 Image SLES15-SP6-HPC-GCE Image SLES15-SP6-Hardened-BYOS Image SLES15-SP6-Hardened-BYOS-Azure Image SLES15-SP6-Hardened-BYOS-EC2 Image SLES15-SP6-Hardened-BYOS-GCE Image SLES15-SP6-SAP Image SLES15-SP6-SAP-Azure Image SLES15-SP6-SAP-EC2 Image SLES15-SP6-SAP-GCE Image SLES15-SP6-SAPCAL Image SLES15-SP6-SAPCAL-Azure Image SLES15-SP6-SAPCAL-EC2 Image SLES15-SP6-SAPCAL-GCE |
| |
Image SLES15-SP6-SAP-Azure-LI-BYOS Image SLES15-SP6-SAP-Azure-LI-BYOS-Production Image SLES15-SP6-SAP-Azure-VLI-BYOS Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production Image SLES15-SP6-SAP-BYOS Image SLES15-SP6-SAP-BYOS-Azure Image SLES15-SP6-SAP-BYOS-EC2 Image SLES15-SP6-SAP-BYOS-GCE Image SLES15-SP6-SAP-Hardened Image SLES15-SP6-SAP-Hardened-Azure Image SLES15-SP6-SAP-Hardened-BYOS Image SLES15-SP6-SAP-Hardened-BYOS-Azure Image SLES15-SP6-SAP-Hardened-BYOS-EC2 Image SLES15-SP6-SAP-Hardened-BYOS-GCE Image SLES15-SP6-SAP-Hardened-EC2 Image SLES15-SP6-SAP-Hardened-GCE |
| |
SUSE Linux Enterprise Desktop 15 SP6 |
| Patchnames: SUSE-SLE-Module-Basesystem-15-SP6-2024-2571 SUSE-SLE-Module-Development-Tools-15-SP6-2024-2571 SUSE-SLE-Product-WE-15-SP6-2024-2571 |
SUSE Linux Enterprise High Availability Extension 15 SP6 |
| Patchnames: SUSE-SLE-Product-HA-15-SP6-2024-2571 |
SUSE Linux Enterprise High Performance Computing 15 SP6 |
| Patchnames: SUSE-SLE-Module-Basesystem-15-SP6-2024-2571 SUSE-SLE-Module-Development-Tools-15-SP6-2024-2571 SUSE-SLE-Module-Legacy-15-SP6-2024-2571 |
SUSE Linux Enterprise Live Patching 15 SP6 | Patchnames: SUSE-SLE-Module-Live-Patching-15-SP6-2024-2571 | |
SUSE Linux Enterprise Module for Basesystem 15 SP6 |
| Patchnames: SUSE-SLE-Module-Basesystem-15-SP6-2024-2571 |
SUSE Linux Enterprise Module for Development Tools 15 SP6 |
| Patchnames: SUSE-SLE-Module-Development-Tools-15-SP6-2024-2571 |
SUSE Linux Enterprise Module for Legacy 15 SP6 |
| Patchnames: SUSE-SLE-Module-Legacy-15-SP6-2024-2571 |
SUSE Linux Enterprise Server 15 SP6 SUSE Linux Enterprise Server for SAP Applications 15 SP6 |
| Patchnames: SUSE-SLE-Module-Basesystem-15-SP6-2024-2571 SUSE-SLE-Module-Development-Tools-15-SP6-2024-2571 SUSE-SLE-Module-Legacy-15-SP6-2024-2571 SUSE-SLE-Product-WE-15-SP6-2024-2571 |
SUSE Linux Enterprise Workstation Extension 15 SP6 |
| Patchnames: SUSE-SLE-Product-WE-15-SP6-2024-2571 |
openSUSE Leap 15.6 |
| Patchnames: openSUSE-SLE-15.6-2024-2571 |
First public cloud image revisions this CVE is fixed in:
- amazon/suse-sle-micro-6-0-byos-v20240912-hvm-ssd-arm64
- amazon/suse-sle-micro-6-0-byos-v20240913-hvm-ssd-x86_64
- amazon/suse-sle-micro-6-0-v20240913-hvm-ssd-arm64-llc
- amazon/suse-sle-micro-6-0-v20240922-hvm-ssd-arm64-ltd
- amazon/suse-sle-micro-6-0-v20240922-hvm-ssd-x86_64-llc
- amazon/suse-sle-micro-6-0-v20240922-hvm-ssd-x86_64-ltd
- google/sle-micro-6-0-byos-v20240912-x86-64
- google/sle-micro-6-0-byos-v20240913-arm64
- microsoft/suse-sle-hpc-15-sp6-v20241113-x86_64
- microsoft/suse-sle-micro-6-0-byos-v20240903-arm64
- microsoft/suse-sle-micro-6-0-byos-v20240903-x86_64
- microsoft/suse-sle-micro-6-0-v20240910-arm64-llc
- microsoft/suse-sle-micro-6-0-v20240910-arm64-ltd
- microsoft/suse-sle-micro-6-0-v20240910-x86_64-llc
- microsoft/suse-sle-micro-6-0-v20240910-x86_64-ltd
- microsoft/suse-sles-15-sp6-basic-v20241113-x86_64
- microsoft/suse-sles-15-sp6-v20241113-x86_64
SUSE Timeline for this CVE
CVE page created: Thu Feb 22 07:00:09 2024CVE page last modified: Mon Nov 18 14:15:43 2024