SUSE update for wireshark



Risk High
Patch available YES
Number of vulnerabilities 9
CVE-ID CVE-2023-0667
CVE-2023-0668
CVE-2023-2855
CVE-2023-2856
CVE-2023-2857
CVE-2023-2858
CVE-2023-2879
CVE-2023-2952
CVE-2023-3648
CWE-ID CWE-787
CWE-20
CWE-835
Exploitation vector Network
Public exploit N/A
Vulnerable software
Desktop Applications Module
Operating systems & Components / Operating system

Basesystem Module
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Real Time 15
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Desktop 15
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

SUSE Manager Retail Branch Server
Operating systems & Components / Operating system

SUSE Manager Server
Operating systems & Components / Operating system

SUSE Manager Proxy
Operating systems & Components / Operating system

libwireshark15-debuginfo
Operating systems & Components / Operating system package or component

libwireshark15
Operating systems & Components / Operating system package or component

wireshark-debugsource
Operating systems & Components / Operating system package or component

wireshark-debuginfo
Operating systems & Components / Operating system package or component

libwsutil13
Operating systems & Components / Operating system package or component

wireshark-devel
Operating systems & Components / Operating system package or component

wireshark
Operating systems & Components / Operating system package or component

libwsutil13-debuginfo
Operating systems & Components / Operating system package or component

libwiretap12
Operating systems & Components / Operating system package or component

wireshark-ui-qt
Operating systems & Components / Operating system package or component

libwiretap12-debuginfo
Operating systems & Components / Operating system package or component

wireshark-ui-qt-debuginfo
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 9 vulnerabilities.

1) Out-of-bounds write

EUVDB-ID: #VU78549

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2023-0667

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing MSMMS packets. A remote attacker can send specially crafted packets via the network trigger an out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Update the affected package wireshark to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP4 - 15-SP5

Basesystem Module: 15-SP4 - 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5

SUSE Linux Enterprise Server 15: SP4 - SP5

SUSE Linux Enterprise Real Time 15: SP3 - SP5

SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5

SUSE Linux Enterprise Desktop 15: SP4 - SP5

openSUSE Leap: 15.4 - 15.5

SUSE Manager Retail Branch Server: 4.2 - 4.3

SUSE Manager Server: 4.2 - 4.3

SUSE Manager Proxy: 4.2 - 4.3

libwireshark15-debuginfo: before 3.6.15-150000.3.97.1

libwireshark15: before 3.6.15-150000.3.97.1

wireshark-debugsource: before 3.6.15-150000.3.97.1

wireshark-debuginfo: before 3.6.15-150000.3.97.1

libwsutil13: before 3.6.15-150000.3.97.1

wireshark-devel: before 3.6.15-150000.3.97.1

wireshark: before 3.6.15-150000.3.97.1

libwsutil13-debuginfo: before 3.6.15-150000.3.97.1

libwiretap12: before 3.6.15-150000.3.97.1

wireshark-ui-qt: before 3.6.15-150000.3.97.1

libwiretap12-debuginfo: before 3.6.15-150000.3.97.1

wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Input validation error

EUVDB-ID: #VU76497

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-0668

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the IEEE C37.118 Synchrophasor dissector. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected package wireshark to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP4 - 15-SP5

Basesystem Module: 15-SP4 - 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5

SUSE Linux Enterprise Server 15: SP4 - SP5

SUSE Linux Enterprise Real Time 15: SP3 - SP5

SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5

SUSE Linux Enterprise Desktop 15: SP4 - SP5

openSUSE Leap: 15.4 - 15.5

SUSE Manager Retail Branch Server: 4.2 - 4.3

SUSE Manager Server: 4.2 - 4.3

SUSE Manager Proxy: 4.2 - 4.3

libwireshark15-debuginfo: before 3.6.15-150000.3.97.1

libwireshark15: before 3.6.15-150000.3.97.1

wireshark-debugsource: before 3.6.15-150000.3.97.1

wireshark-debuginfo: before 3.6.15-150000.3.97.1

libwsutil13: before 3.6.15-150000.3.97.1

wireshark-devel: before 3.6.15-150000.3.97.1

wireshark: before 3.6.15-150000.3.97.1

libwsutil13-debuginfo: before 3.6.15-150000.3.97.1

libwiretap12: before 3.6.15-150000.3.97.1

wireshark-ui-qt: before 3.6.15-150000.3.97.1

libwiretap12-debuginfo: before 3.6.15-150000.3.97.1

wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

EUVDB-ID: #VU76490

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-2855

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in Candump log file parser. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected package wireshark to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP4 - 15-SP5

Basesystem Module: 15-SP4 - 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5

SUSE Linux Enterprise Server 15: SP4 - SP5

SUSE Linux Enterprise Real Time 15: SP3 - SP5

SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5

SUSE Linux Enterprise Desktop 15: SP4 - SP5

openSUSE Leap: 15.4 - 15.5

SUSE Manager Retail Branch Server: 4.2 - 4.3

SUSE Manager Server: 4.2 - 4.3

SUSE Manager Proxy: 4.2 - 4.3

libwireshark15-debuginfo: before 3.6.15-150000.3.97.1

libwireshark15: before 3.6.15-150000.3.97.1

wireshark-debugsource: before 3.6.15-150000.3.97.1

wireshark-debuginfo: before 3.6.15-150000.3.97.1

libwsutil13: before 3.6.15-150000.3.97.1

wireshark-devel: before 3.6.15-150000.3.97.1

wireshark: before 3.6.15-150000.3.97.1

libwsutil13-debuginfo: before 3.6.15-150000.3.97.1

libwiretap12: before 3.6.15-150000.3.97.1

wireshark-ui-qt: before 3.6.15-150000.3.97.1

libwiretap12-debuginfo: before 3.6.15-150000.3.97.1

wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Input validation error

EUVDB-ID: #VU76494

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-2856

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in VMS TCPIPtrace file parser. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected package wireshark to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP4 - 15-SP5

Basesystem Module: 15-SP4 - 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5

SUSE Linux Enterprise Server 15: SP4 - SP5

SUSE Linux Enterprise Real Time 15: SP3 - SP5

SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5

SUSE Linux Enterprise Desktop 15: SP4 - SP5

openSUSE Leap: 15.4 - 15.5

SUSE Manager Retail Branch Server: 4.2 - 4.3

SUSE Manager Server: 4.2 - 4.3

SUSE Manager Proxy: 4.2 - 4.3

libwireshark15-debuginfo: before 3.6.15-150000.3.97.1

libwireshark15: before 3.6.15-150000.3.97.1

wireshark-debugsource: before 3.6.15-150000.3.97.1

wireshark-debuginfo: before 3.6.15-150000.3.97.1

libwsutil13: before 3.6.15-150000.3.97.1

wireshark-devel: before 3.6.15-150000.3.97.1

wireshark: before 3.6.15-150000.3.97.1

libwsutil13-debuginfo: before 3.6.15-150000.3.97.1

libwiretap12: before 3.6.15-150000.3.97.1

wireshark-ui-qt: before 3.6.15-150000.3.97.1

libwiretap12-debuginfo: before 3.6.15-150000.3.97.1

wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Input validation error

EUVDB-ID: #VU76491

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-2857

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in BLF file parser. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected package wireshark to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP4 - 15-SP5

Basesystem Module: 15-SP4 - 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5

SUSE Linux Enterprise Server 15: SP4 - SP5

SUSE Linux Enterprise Real Time 15: SP3 - SP5

SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5

SUSE Linux Enterprise Desktop 15: SP4 - SP5

openSUSE Leap: 15.4 - 15.5

SUSE Manager Retail Branch Server: 4.2 - 4.3

SUSE Manager Server: 4.2 - 4.3

SUSE Manager Proxy: 4.2 - 4.3

libwireshark15-debuginfo: before 3.6.15-150000.3.97.1

libwireshark15: before 3.6.15-150000.3.97.1

wireshark-debugsource: before 3.6.15-150000.3.97.1

wireshark-debuginfo: before 3.6.15-150000.3.97.1

libwsutil13: before 3.6.15-150000.3.97.1

wireshark-devel: before 3.6.15-150000.3.97.1

wireshark: before 3.6.15-150000.3.97.1

libwsutil13-debuginfo: before 3.6.15-150000.3.97.1

libwiretap12: before 3.6.15-150000.3.97.1

wireshark-ui-qt: before 3.6.15-150000.3.97.1

libwiretap12-debuginfo: before 3.6.15-150000.3.97.1

wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Input validation error

EUVDB-ID: #VU76493

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-2858

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in NetScaler file parser. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected package wireshark to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP4 - 15-SP5

Basesystem Module: 15-SP4 - 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5

SUSE Linux Enterprise Server 15: SP4 - SP5

SUSE Linux Enterprise Real Time 15: SP3 - SP5

SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5

SUSE Linux Enterprise Desktop 15: SP4 - SP5

openSUSE Leap: 15.4 - 15.5

SUSE Manager Retail Branch Server: 4.2 - 4.3

SUSE Manager Server: 4.2 - 4.3

SUSE Manager Proxy: 4.2 - 4.3

libwireshark15-debuginfo: before 3.6.15-150000.3.97.1

libwireshark15: before 3.6.15-150000.3.97.1

wireshark-debugsource: before 3.6.15-150000.3.97.1

wireshark-debuginfo: before 3.6.15-150000.3.97.1

libwsutil13: before 3.6.15-150000.3.97.1

wireshark-devel: before 3.6.15-150000.3.97.1

wireshark: before 3.6.15-150000.3.97.1

libwsutil13-debuginfo: before 3.6.15-150000.3.97.1

libwiretap12: before 3.6.15-150000.3.97.1

wireshark-ui-qt: before 3.6.15-150000.3.97.1

libwiretap12-debuginfo: before 3.6.15-150000.3.97.1

wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Infinite loop

EUVDB-ID: #VU76492

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-2879

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the GDSDB dissector. A remote attacker can pass specially crafted input to the application, consume all available system resources and cause denial of service conditions.

Mitigation

Update the affected package wireshark to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP4 - 15-SP5

Basesystem Module: 15-SP4 - 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5

SUSE Linux Enterprise Server 15: SP4 - SP5

SUSE Linux Enterprise Real Time 15: SP3 - SP5

SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5

SUSE Linux Enterprise Desktop 15: SP4 - SP5

openSUSE Leap: 15.4 - 15.5

SUSE Manager Retail Branch Server: 4.2 - 4.3

SUSE Manager Server: 4.2 - 4.3

SUSE Manager Proxy: 4.2 - 4.3

libwireshark15-debuginfo: before 3.6.15-150000.3.97.1

libwireshark15: before 3.6.15-150000.3.97.1

wireshark-debugsource: before 3.6.15-150000.3.97.1

wireshark-debuginfo: before 3.6.15-150000.3.97.1

libwsutil13: before 3.6.15-150000.3.97.1

wireshark-devel: before 3.6.15-150000.3.97.1

wireshark: before 3.6.15-150000.3.97.1

libwsutil13-debuginfo: before 3.6.15-150000.3.97.1

libwiretap12: before 3.6.15-150000.3.97.1

wireshark-ui-qt: before 3.6.15-150000.3.97.1

libwiretap12-debuginfo: before 3.6.15-150000.3.97.1

wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Infinite loop

EUVDB-ID: #VU76498

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-2952

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the XRA dissector. A remote attacker can pass specially crafted input to the application, consume all available system resources and cause denial of service conditions.

Mitigation

Update the affected package wireshark to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP4 - 15-SP5

Basesystem Module: 15-SP4 - 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5

SUSE Linux Enterprise Server 15: SP4 - SP5

SUSE Linux Enterprise Real Time 15: SP3 - SP5

SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5

SUSE Linux Enterprise Desktop 15: SP4 - SP5

openSUSE Leap: 15.4 - 15.5

SUSE Manager Retail Branch Server: 4.2 - 4.3

SUSE Manager Server: 4.2 - 4.3

SUSE Manager Proxy: 4.2 - 4.3

libwireshark15-debuginfo: before 3.6.15-150000.3.97.1

libwireshark15: before 3.6.15-150000.3.97.1

wireshark-debugsource: before 3.6.15-150000.3.97.1

wireshark-debuginfo: before 3.6.15-150000.3.97.1

libwsutil13: before 3.6.15-150000.3.97.1

wireshark-devel: before 3.6.15-150000.3.97.1

wireshark: before 3.6.15-150000.3.97.1

libwsutil13-debuginfo: before 3.6.15-150000.3.97.1

libwiretap12: before 3.6.15-150000.3.97.1

wireshark-ui-qt: before 3.6.15-150000.3.97.1

libwiretap12-debuginfo: before 3.6.15-150000.3.97.1

wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Input validation error

EUVDB-ID: #VU79311

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-3648

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in Kafka dissector. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected package wireshark to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP4 - 15-SP5

Basesystem Module: 15-SP4 - 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5

SUSE Linux Enterprise Server 15: SP4 - SP5

SUSE Linux Enterprise Real Time 15: SP3 - SP5

SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5

SUSE Linux Enterprise Desktop 15: SP4 - SP5

openSUSE Leap: 15.4 - 15.5

SUSE Manager Retail Branch Server: 4.2 - 4.3

SUSE Manager Server: 4.2 - 4.3

SUSE Manager Proxy: 4.2 - 4.3

libwireshark15-debuginfo: before 3.6.15-150000.3.97.1

libwireshark15: before 3.6.15-150000.3.97.1

wireshark-debugsource: before 3.6.15-150000.3.97.1

wireshark-debuginfo: before 3.6.15-150000.3.97.1

libwsutil13: before 3.6.15-150000.3.97.1

wireshark-devel: before 3.6.15-150000.3.97.1

wireshark: before 3.6.15-150000.3.97.1

libwsutil13-debuginfo: before 3.6.15-150000.3.97.1

libwiretap12: before 3.6.15-150000.3.97.1

wireshark-ui-qt: before 3.6.15-150000.3.97.1

libwiretap12-debuginfo: before 3.6.15-150000.3.97.1

wireshark-ui-qt-debuginfo: before 3.6.15-150000.3.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20233252-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###