Risk | High |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2021-38297 CVE-2022-23806 |
CWE-ID | CWE-119 CWE-252 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Public Cloud Module Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system SUSE Manager Retail Branch Server Operating systems & Components / Operating system SUSE Manager Proxy Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system google-guest-agent Operating systems & Components / Operating system package or component |
Vendor | SuSE |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU57579
Risk: High
CVSSv3.1:
CVE-ID: CVE-2021-38297
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can trigger memory corruption via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.
MitigationUpdate the affected package google-guest-agent to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP1 - 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP1 - SP4
SUSE Linux Enterprise Server 15: SP1 - SP4
SUSE Linux Enterprise High Performance Computing 15: SP1 - SP4
SUSE Manager Retail Branch Server: 4.0 - 4.3
SUSE Manager Proxy: 4.0 - 4.3
SUSE Manager Server: 4.0 - 4.3
openSUSE Leap: 15.4
google-guest-agent: before 20230221.00-150000.1.34.1
http://www.suse.com/support/update/announcement/2023/suse-su-20230600-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU62036
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-23806
CWE-ID:
CWE-252 - Unchecked Return Value
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to unchecked return value within the Curve.IsOnCurve() function in crypto/elliptic. A remote attacker can force the application to incorrectly return true in situations with a big.Int value that is not a valid field element. As a result, an attacker can modify application flow, which can lead to unauthorized data modification or denial of service.
Update the affected package google-guest-agent to the latest version.
Vulnerable software versionsPublic Cloud Module: 15-SP1 - 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP1 - SP4
SUSE Linux Enterprise Server 15: SP1 - SP4
SUSE Linux Enterprise High Performance Computing 15: SP1 - SP4
SUSE Manager Retail Branch Server: 4.0 - 4.3
SUSE Manager Proxy: 4.0 - 4.3
SUSE Manager Server: 4.0 - 4.3
openSUSE Leap: 15.4
google-guest-agent: before 20230221.00-150000.1.34.1
http://www.suse.com/support/update/announcement/2023/suse-su-20230600-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?