Vulnerability Database
Blog
FAQ
Docs
SUSE-SU-2022:4331-1
See a problem?
Please try reporting it
to the source
first.
Source
https://www.suse.com/support/update/announcement/2022/suse-su-20224331-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2022:4331-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2022:4331-1
Related
CVE-2022-42920
Published
2022-12-06T12:34:27Z
Modified
2022-12-06T12:34:27Z
Summary
Security update for bcel
Details
This update for bcel fixes the following issues:
CVE-2022-42920: Fixed producing arbitrary bytecode via out-of-bounds writing (bsc#1205125).
References
https://www.suse.com/support/update/announcement/2022/suse-su-20224331-1/
https://bugzilla.suse.com/1205125
https://www.suse.com/security/cve/CVE-2022-42920
Affected packages
SUSE:Linux Enterprise Server 12 SP5
/
bcel
Package
Name
bcel
Purl
pkg:rpm/suse/bcel&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
5.2-28.3.1
Ecosystem specific
{ "binaries": [ { "bcel": "5.2-28.3.1" } ] }
SUSE:Linux Enterprise Server for SAP Applications 12 SP5
/
bcel
Package
Name
bcel
Purl
pkg:rpm/suse/bcel&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
5.2-28.3.1
Ecosystem specific
{ "binaries": [ { "bcel": "5.2-28.3.1" } ] }
SUSE-SU-2022:4331-1 - OSV