vulnerability
SUSE: CVE-2020-26420: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | 2020-12-11 | 2021-06-23 | 2021-10-22 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
2020-12-11
Added
2021-06-23
Modified
2021-10-22
Description
Memory leak in RTPS protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.
Solution(s)
suse-upgrade-libqt5-qtmultimedia-develsuse-upgrade-libqt5-qtmultimedia-private-headers-develsuse-upgrade-libqt5multimedia5suse-upgrade-libsbc1suse-upgrade-libsbc1-32bitsuse-upgrade-libvirtsuse-upgrade-libvirt-adminsuse-upgrade-libvirt-clientsuse-upgrade-libvirt-daemonsuse-upgrade-libvirt-daemon-config-networksuse-upgrade-libvirt-daemon-config-nwfiltersuse-upgrade-libvirt-daemon-driver-interfacesuse-upgrade-libvirt-daemon-driver-libxlsuse-upgrade-libvirt-daemon-driver-lxcsuse-upgrade-libvirt-daemon-driver-networksuse-upgrade-libvirt-daemon-driver-nodedevsuse-upgrade-libvirt-daemon-driver-nwfiltersuse-upgrade-libvirt-daemon-driver-qemususe-upgrade-libvirt-daemon-driver-secretsuse-upgrade-libvirt-daemon-driver-storagesuse-upgrade-libvirt-daemon-driver-storage-coresuse-upgrade-libvirt-daemon-driver-storage-disksuse-upgrade-libvirt-daemon-driver-storage-iscsisuse-upgrade-libvirt-daemon-driver-storage-logicalsuse-upgrade-libvirt-daemon-driver-storage-mpathsuse-upgrade-libvirt-daemon-driver-storage-rbdsuse-upgrade-libvirt-daemon-driver-storage-scsisuse-upgrade-libvirt-daemon-hookssuse-upgrade-libvirt-daemon-lxcsuse-upgrade-libvirt-daemon-qemususe-upgrade-libvirt-daemon-xensuse-upgrade-libvirt-develsuse-upgrade-libvirt-docsuse-upgrade-libvirt-libssuse-upgrade-libvirt-lock-sanlocksuse-upgrade-libvirt-nsssuse-upgrade-libwireshark14suse-upgrade-libwiretap11suse-upgrade-libwsutil12suse-upgrade-sbcsuse-upgrade-sbc-develsuse-upgrade-wiresharksuse-upgrade-wireshark-develsuse-upgrade-wireshark-ui-qt

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.