Vulnerability Database
Blog
FAQ
Docs
SUSE-SU-2024:2060-1
See a problem?
Please try reporting it
to the source
first.
Source
https://www.suse.com/support/update/announcement/2024/suse-su-20242060-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:2060-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2024:2060-1
Related
CVE-2024-32487
Published
2024-06-18T11:11:48Z
Modified
2024-06-18T11:11:48Z
Summary
Security update for less
Details
This update for less fixes the following issues:
CVE-2024-32487: Fixed OS command injection via a newline character in the file name. (bsc#1222849)
References
https://www.suse.com/support/update/announcement/2024/suse-su-20242060-1/
https://bugzilla.suse.com/1222849
https://www.suse.com/security/cve/CVE-2024-32487
Affected packages
SUSE:Linux Enterprise Module for Basesystem 15 SP6
/
less
Package
Name
less
Purl
pkg:rpm/suse/less&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
643-150600.3.3.1
Ecosystem specific
{ "binaries": [ { "less": "643-150600.3.3.1" } ] }
openSUSE:Leap 15.6
/
less
Package
Name
less
Purl
pkg:rpm/opensuse/less&distro=openSUSE%20Leap%2015.6
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
643-150600.3.3.1
Ecosystem specific
{ "binaries": [ { "less": "643-150600.3.3.1" } ] }
SUSE-SU-2024:2060-1 - OSV