Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-22313 |
CWE-ID | CWE-119 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openSUSE Leap Operating systems & Components / Operating system qatlib Operating systems & Components / Operating system package or component qatlib-devel Operating systems & Components / Operating system package or component qatlib-debuginfo Operating systems & Components / Operating system package or component qatlib-debugsource Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU83458
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-22313
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a boundary error. A local administrator can trigger memory corruption and gain access to sensitive information on the system.
MitigationUpdate the affected package qatlib to the latest version.
Vulnerable software versionsopenSUSE Leap: 15.4
qatlib: before 21.08.0-150400.3.3.3
qatlib-devel: before 21.08.0-150400.3.3.3
qatlib-debuginfo: before 21.08.0-150400.3.3.3
qatlib-debugsource: before 21.08.0-150400.3.3.3
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243558-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.