Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU79797
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-32731
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient validation of user-supplied input when parsing HTTP2 requests. When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. This could lead to requests from the proxy being interpreted as containing headers from different proxy clients, leading to an information leak that can be used for privilege escalation or data exfiltration.
MitigationUpdate the affected package abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP4
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4
SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise Micro: 5.3 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
Python 3 Module: 15-SP5
SUSE Linux Enterprise Workstation Extension 15: SP5
Public Cloud Module: 15-SP4 - 15-SP5
Development Tools Module: 15-SP5
SUSE Package Hub 15: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.3 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
libre2-11-64bit: before 20240201-150400.9.3.1
libre2-11-64bit-debuginfo: before 20240201-150400.9.3.1
libabsl2308_0_0-64bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-64bit: before 25.1-150400.9.3.1
libabsl2308_0_0-64bit: before 20230802.1-150400.10.4.1
opencensus-proto-source: before 0.3.0+git.20200721-150400.9.3.1
python311-abseil: before 1.4.0-150400.9.3.1
grpc-source: before 1.60.0-150400.8.3.2
libprotobuf25_1_0-32bit: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit: before 20230802.1-150400.10.4.1
libprotoc25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-32bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-32bit: before 25.1-150400.9.3.1
libre2-11-32bit: before 20240201-150400.9.3.1
libre2-11-32bit-debuginfo: before 20240201-150400.9.3.1
grpc-devel-debuginfo: before 1.60.0-150400.8.3.2
abseil-cpp-devel: before 20230802.1-150400.10.4.1
libgrpc37: before 1.60.0-150400.8.3.2
libprotobuf-lite25_1_0-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0: before 25.1-150400.9.3.1
protobuf-devel: before 25.1-150400.9.3.1
libprotoc25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-devel: before 20240201-150400.9.3.1
libgrpc1_60-debuginfo: before 1.60.0-150400.8.3.2
grpc-debuginfo: before 1.60.0-150400.8.3.2
libgrpc++1_60: before 1.60.0-150400.8.3.2
libgrpc++1_60-debuginfo: before 1.60.0-150400.8.3.2
libre2-11-debuginfo: before 20240201-150400.9.3.1
upb-devel: before 1.60.0-150400.8.3.2
abseil-cpp-debugsource: before 20230802.1-150400.10.4.1
libprotobuf25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-debugsource: before 20240201-150400.9.3.1
python-grpcio-debugsource: before 1.60.0-150400.9.3.2
protobuf-devel-debuginfo: before 25.1-150400.9.3.1
python311-grpcio: before 1.60.0-150400.9.3.2
grpc-devel: before 1.60.0-150400.8.3.2
libre2-11: before 20240201-150400.9.3.1
libupb37: before 1.60.0-150400.8.3.2
python311-protobuf: before 4.25.1-150400.9.3.1
libgrpc1_60: before 1.60.0-150400.8.3.2
libabsl2308_0_0: before 20230802.1-150400.10.4.1
protobuf-debugsource: before 25.1-150400.9.3.1
libabsl2308_0_0-debuginfo: before 20230802.1-150400.10.4.1
grpc-debugsource: before 1.60.0-150400.8.3.2
libupb37-debuginfo: before 1.60.0-150400.8.3.2
libgrpc37-debuginfo: before 1.60.0-150400.8.3.2
libprotobuf25_1_0: before 25.1-150400.9.3.1
protobuf-java: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0: before 25.1-150400.9.3.1
python311-grpcio-debuginfo: before 1.60.0-150400.9.3.2
External linkshttp://www.suse.com/support/update/announcement/2024/suse-su-20240573-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79796
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-32732
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can pass specially crafted input to the application and cause a termination of connection between a HTTP2 proxy and a gRPC server.
MitigationUpdate the affected package abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP4
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4
SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise Micro: 5.3 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
Python 3 Module: 15-SP5
SUSE Linux Enterprise Workstation Extension 15: SP5
Public Cloud Module: 15-SP4 - 15-SP5
Development Tools Module: 15-SP5
SUSE Package Hub 15: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.3 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
libre2-11-64bit: before 20240201-150400.9.3.1
libre2-11-64bit-debuginfo: before 20240201-150400.9.3.1
libabsl2308_0_0-64bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-64bit: before 25.1-150400.9.3.1
libabsl2308_0_0-64bit: before 20230802.1-150400.10.4.1
opencensus-proto-source: before 0.3.0+git.20200721-150400.9.3.1
python311-abseil: before 1.4.0-150400.9.3.1
grpc-source: before 1.60.0-150400.8.3.2
libprotobuf25_1_0-32bit: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit: before 20230802.1-150400.10.4.1
libprotoc25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-32bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-32bit: before 25.1-150400.9.3.1
libre2-11-32bit: before 20240201-150400.9.3.1
libre2-11-32bit-debuginfo: before 20240201-150400.9.3.1
grpc-devel-debuginfo: before 1.60.0-150400.8.3.2
abseil-cpp-devel: before 20230802.1-150400.10.4.1
libgrpc37: before 1.60.0-150400.8.3.2
libprotobuf-lite25_1_0-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0: before 25.1-150400.9.3.1
protobuf-devel: before 25.1-150400.9.3.1
libprotoc25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-devel: before 20240201-150400.9.3.1
libgrpc1_60-debuginfo: before 1.60.0-150400.8.3.2
grpc-debuginfo: before 1.60.0-150400.8.3.2
libgrpc++1_60: before 1.60.0-150400.8.3.2
libgrpc++1_60-debuginfo: before 1.60.0-150400.8.3.2
libre2-11-debuginfo: before 20240201-150400.9.3.1
upb-devel: before 1.60.0-150400.8.3.2
abseil-cpp-debugsource: before 20230802.1-150400.10.4.1
libprotobuf25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-debugsource: before 20240201-150400.9.3.1
python-grpcio-debugsource: before 1.60.0-150400.9.3.2
protobuf-devel-debuginfo: before 25.1-150400.9.3.1
python311-grpcio: before 1.60.0-150400.9.3.2
grpc-devel: before 1.60.0-150400.8.3.2
libre2-11: before 20240201-150400.9.3.1
libupb37: before 1.60.0-150400.8.3.2
python311-protobuf: before 4.25.1-150400.9.3.1
libgrpc1_60: before 1.60.0-150400.8.3.2
libabsl2308_0_0: before 20230802.1-150400.10.4.1
protobuf-debugsource: before 25.1-150400.9.3.1
libabsl2308_0_0-debuginfo: before 20230802.1-150400.10.4.1
grpc-debugsource: before 1.60.0-150400.8.3.2
libupb37-debuginfo: before 1.60.0-150400.8.3.2
libgrpc37-debuginfo: before 1.60.0-150400.8.3.2
libprotobuf25_1_0: before 25.1-150400.9.3.1
protobuf-java: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0: before 25.1-150400.9.3.1
python311-grpcio-debuginfo: before 1.60.0-150400.9.3.2
External linkshttp://www.suse.com/support/update/announcement/2024/suse-su-20240573-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80828
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-33953
CWE-ID:
CWE-770 - Allocation of Resources Without Limits or Throttling
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationUpdate the affected package abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP4
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4
SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise Micro: 5.3 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
Python 3 Module: 15-SP5
SUSE Linux Enterprise Workstation Extension 15: SP5
Public Cloud Module: 15-SP4 - 15-SP5
Development Tools Module: 15-SP5
SUSE Package Hub 15: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.3 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
libre2-11-64bit: before 20240201-150400.9.3.1
libre2-11-64bit-debuginfo: before 20240201-150400.9.3.1
libabsl2308_0_0-64bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-64bit: before 25.1-150400.9.3.1
libabsl2308_0_0-64bit: before 20230802.1-150400.10.4.1
opencensus-proto-source: before 0.3.0+git.20200721-150400.9.3.1
python311-abseil: before 1.4.0-150400.9.3.1
grpc-source: before 1.60.0-150400.8.3.2
libprotobuf25_1_0-32bit: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit: before 20230802.1-150400.10.4.1
libprotoc25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-32bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-32bit: before 25.1-150400.9.3.1
libre2-11-32bit: before 20240201-150400.9.3.1
libre2-11-32bit-debuginfo: before 20240201-150400.9.3.1
grpc-devel-debuginfo: before 1.60.0-150400.8.3.2
abseil-cpp-devel: before 20230802.1-150400.10.4.1
libgrpc37: before 1.60.0-150400.8.3.2
libprotobuf-lite25_1_0-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0: before 25.1-150400.9.3.1
protobuf-devel: before 25.1-150400.9.3.1
libprotoc25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-devel: before 20240201-150400.9.3.1
libgrpc1_60-debuginfo: before 1.60.0-150400.8.3.2
grpc-debuginfo: before 1.60.0-150400.8.3.2
libgrpc++1_60: before 1.60.0-150400.8.3.2
libgrpc++1_60-debuginfo: before 1.60.0-150400.8.3.2
libre2-11-debuginfo: before 20240201-150400.9.3.1
upb-devel: before 1.60.0-150400.8.3.2
abseil-cpp-debugsource: before 20230802.1-150400.10.4.1
libprotobuf25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-debugsource: before 20240201-150400.9.3.1
python-grpcio-debugsource: before 1.60.0-150400.9.3.2
protobuf-devel-debuginfo: before 25.1-150400.9.3.1
python311-grpcio: before 1.60.0-150400.9.3.2
grpc-devel: before 1.60.0-150400.8.3.2
libre2-11: before 20240201-150400.9.3.1
libupb37: before 1.60.0-150400.8.3.2
python311-protobuf: before 4.25.1-150400.9.3.1
libgrpc1_60: before 1.60.0-150400.8.3.2
libabsl2308_0_0: before 20230802.1-150400.10.4.1
protobuf-debugsource: before 25.1-150400.9.3.1
libabsl2308_0_0-debuginfo: before 20230802.1-150400.10.4.1
grpc-debugsource: before 1.60.0-150400.8.3.2
libupb37-debuginfo: before 1.60.0-150400.8.3.2
libgrpc37-debuginfo: before 1.60.0-150400.8.3.2
libprotobuf25_1_0: before 25.1-150400.9.3.1
protobuf-java: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0: before 25.1-150400.9.3.1
python311-grpcio-debuginfo: before 1.60.0-150400.9.3.2
External linkshttp://www.suse.com/support/update/announcement/2024/suse-su-20240573-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU81728
Risk: High
CVSSv3.1: 5.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H/RL:O/RC:C]
CVE-ID: CVE-2023-44487
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improperly control of consumption for internal resources when handling HTTP/2 requests with compressed HEADERS frames. A remote attacker can send a sequence of compressed HEADERS frames followed by RST_STREAM frames and perform a denial of service (DoS) attack, a.k.a. "Rapid Reset".
Note, the vulnerability is being actively exploited in the wild.
Update the affected package abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP4
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4
SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise Micro: 5.3 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
Python 3 Module: 15-SP5
SUSE Linux Enterprise Workstation Extension 15: SP5
Public Cloud Module: 15-SP4 - 15-SP5
Development Tools Module: 15-SP5
SUSE Package Hub 15: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.3 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
libre2-11-64bit: before 20240201-150400.9.3.1
libre2-11-64bit-debuginfo: before 20240201-150400.9.3.1
libabsl2308_0_0-64bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-64bit: before 25.1-150400.9.3.1
libabsl2308_0_0-64bit: before 20230802.1-150400.10.4.1
opencensus-proto-source: before 0.3.0+git.20200721-150400.9.3.1
python311-abseil: before 1.4.0-150400.9.3.1
grpc-source: before 1.60.0-150400.8.3.2
libprotobuf25_1_0-32bit: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit: before 20230802.1-150400.10.4.1
libprotoc25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-32bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-32bit: before 25.1-150400.9.3.1
libre2-11-32bit: before 20240201-150400.9.3.1
libre2-11-32bit-debuginfo: before 20240201-150400.9.3.1
grpc-devel-debuginfo: before 1.60.0-150400.8.3.2
abseil-cpp-devel: before 20230802.1-150400.10.4.1
libgrpc37: before 1.60.0-150400.8.3.2
libprotobuf-lite25_1_0-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0: before 25.1-150400.9.3.1
protobuf-devel: before 25.1-150400.9.3.1
libprotoc25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-devel: before 20240201-150400.9.3.1
libgrpc1_60-debuginfo: before 1.60.0-150400.8.3.2
grpc-debuginfo: before 1.60.0-150400.8.3.2
libgrpc++1_60: before 1.60.0-150400.8.3.2
libgrpc++1_60-debuginfo: before 1.60.0-150400.8.3.2
libre2-11-debuginfo: before 20240201-150400.9.3.1
upb-devel: before 1.60.0-150400.8.3.2
abseil-cpp-debugsource: before 20230802.1-150400.10.4.1
libprotobuf25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-debugsource: before 20240201-150400.9.3.1
python-grpcio-debugsource: before 1.60.0-150400.9.3.2
protobuf-devel-debuginfo: before 25.1-150400.9.3.1
python311-grpcio: before 1.60.0-150400.9.3.2
grpc-devel: before 1.60.0-150400.8.3.2
libre2-11: before 20240201-150400.9.3.1
libupb37: before 1.60.0-150400.8.3.2
python311-protobuf: before 4.25.1-150400.9.3.1
libgrpc1_60: before 1.60.0-150400.8.3.2
libabsl2308_0_0: before 20230802.1-150400.10.4.1
protobuf-debugsource: before 25.1-150400.9.3.1
libabsl2308_0_0-debuginfo: before 20230802.1-150400.10.4.1
grpc-debugsource: before 1.60.0-150400.8.3.2
libupb37-debuginfo: before 1.60.0-150400.8.3.2
libgrpc37-debuginfo: before 1.60.0-150400.8.3.2
libprotobuf25_1_0: before 25.1-150400.9.3.1
protobuf-java: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0: before 25.1-150400.9.3.1
python311-grpcio-debuginfo: before 1.60.0-150400.9.3.2
External linkshttp://www.suse.com/support/update/announcement/2024/suse-su-20240573-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU82653
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-4785
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to lack of error handling in the TCP server in Google's gRPC. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack by initiating a significant number of connections with the server.
MitigationUpdate the affected package abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP4
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4
SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise Micro: 5.3 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
Python 3 Module: 15-SP5
SUSE Linux Enterprise Workstation Extension 15: SP5
Public Cloud Module: 15-SP4 - 15-SP5
Development Tools Module: 15-SP5
SUSE Package Hub 15: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.3 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
libre2-11-64bit: before 20240201-150400.9.3.1
libre2-11-64bit-debuginfo: before 20240201-150400.9.3.1
libabsl2308_0_0-64bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-64bit: before 25.1-150400.9.3.1
libabsl2308_0_0-64bit: before 20230802.1-150400.10.4.1
opencensus-proto-source: before 0.3.0+git.20200721-150400.9.3.1
python311-abseil: before 1.4.0-150400.9.3.1
grpc-source: before 1.60.0-150400.8.3.2
libprotobuf25_1_0-32bit: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit: before 20230802.1-150400.10.4.1
libprotoc25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-32bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-32bit: before 25.1-150400.9.3.1
libre2-11-32bit: before 20240201-150400.9.3.1
libre2-11-32bit-debuginfo: before 20240201-150400.9.3.1
grpc-devel-debuginfo: before 1.60.0-150400.8.3.2
abseil-cpp-devel: before 20230802.1-150400.10.4.1
libgrpc37: before 1.60.0-150400.8.3.2
libprotobuf-lite25_1_0-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0: before 25.1-150400.9.3.1
protobuf-devel: before 25.1-150400.9.3.1
libprotoc25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-devel: before 20240201-150400.9.3.1
libgrpc1_60-debuginfo: before 1.60.0-150400.8.3.2
grpc-debuginfo: before 1.60.0-150400.8.3.2
libgrpc++1_60: before 1.60.0-150400.8.3.2
libgrpc++1_60-debuginfo: before 1.60.0-150400.8.3.2
libre2-11-debuginfo: before 20240201-150400.9.3.1
upb-devel: before 1.60.0-150400.8.3.2
abseil-cpp-debugsource: before 20230802.1-150400.10.4.1
libprotobuf25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-debugsource: before 20240201-150400.9.3.1
python-grpcio-debugsource: before 1.60.0-150400.9.3.2
protobuf-devel-debuginfo: before 25.1-150400.9.3.1
python311-grpcio: before 1.60.0-150400.9.3.2
grpc-devel: before 1.60.0-150400.8.3.2
libre2-11: before 20240201-150400.9.3.1
libupb37: before 1.60.0-150400.8.3.2
python311-protobuf: before 4.25.1-150400.9.3.1
libgrpc1_60: before 1.60.0-150400.8.3.2
libabsl2308_0_0: before 20230802.1-150400.10.4.1
protobuf-debugsource: before 25.1-150400.9.3.1
libabsl2308_0_0-debuginfo: before 20230802.1-150400.10.4.1
grpc-debugsource: before 1.60.0-150400.8.3.2
libupb37-debuginfo: before 1.60.0-150400.8.3.2
libgrpc37-debuginfo: before 1.60.0-150400.8.3.2
libprotobuf25_1_0: before 25.1-150400.9.3.1
protobuf-java: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0: before 25.1-150400.9.3.1
python311-grpcio-debuginfo: before 1.60.0-150400.9.3.2
External linkshttp://www.suse.com/support/update/announcement/2024/suse-su-20240573-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.