vulnerability

SUSE: CVE-2021-22207: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Apr 23, 2021
Added
Jun 23, 2021
Modified
Oct 26, 2022

Description

Excessive memory consumption in MS-WSP dissector in Wireshark 3.4.0 to 3.4.4 and 3.2.0 to 3.2.12 allows denial of service via packet injection or crafted capture file

Solutions

suse-upgrade-libqt5-qtmultimedia-develsuse-upgrade-libqt5-qtmultimedia-private-headers-develsuse-upgrade-libqt5multimedia5suse-upgrade-libsbc1suse-upgrade-libsbc1-32bitsuse-upgrade-libvirtsuse-upgrade-libvirt-adminsuse-upgrade-libvirt-clientsuse-upgrade-libvirt-daemonsuse-upgrade-libvirt-daemon-config-networksuse-upgrade-libvirt-daemon-config-nwfiltersuse-upgrade-libvirt-daemon-driver-interfacesuse-upgrade-libvirt-daemon-driver-libxlsuse-upgrade-libvirt-daemon-driver-lxcsuse-upgrade-libvirt-daemon-driver-networksuse-upgrade-libvirt-daemon-driver-nodedevsuse-upgrade-libvirt-daemon-driver-nwfiltersuse-upgrade-libvirt-daemon-driver-qemususe-upgrade-libvirt-daemon-driver-secretsuse-upgrade-libvirt-daemon-driver-storagesuse-upgrade-libvirt-daemon-driver-storage-coresuse-upgrade-libvirt-daemon-driver-storage-disksuse-upgrade-libvirt-daemon-driver-storage-iscsisuse-upgrade-libvirt-daemon-driver-storage-logicalsuse-upgrade-libvirt-daemon-driver-storage-mpathsuse-upgrade-libvirt-daemon-driver-storage-rbdsuse-upgrade-libvirt-daemon-driver-storage-scsisuse-upgrade-libvirt-daemon-hookssuse-upgrade-libvirt-daemon-lxcsuse-upgrade-libvirt-daemon-qemususe-upgrade-libvirt-daemon-xensuse-upgrade-libvirt-develsuse-upgrade-libvirt-docsuse-upgrade-libvirt-libssuse-upgrade-libvirt-lock-sanlocksuse-upgrade-libvirt-nsssuse-upgrade-libwireshark14suse-upgrade-libwireshark15suse-upgrade-libwiretap11suse-upgrade-libwiretap12suse-upgrade-libwsutil12suse-upgrade-libwsutil13suse-upgrade-sbcsuse-upgrade-sbc-develsuse-upgrade-wiresharksuse-upgrade-wireshark-develsuse-upgrade-wireshark-ui-qt
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.