Risk | High |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | CVE-2023-32731 CVE-2023-32732 CVE-2023-33953 CVE-2023-44487 CVE-2023-4785 |
CWE-ID | CWE-20 CWE-770 CWE-400 |
Exploitation vector | Network |
Public exploit | Vulnerability #4 is being exploited in the wild. |
Vulnerable software |
SUSE Linux Enterprise Server 15 SP4 LTSS Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing LTSS 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing ESPOS 15 Operating systems & Components / Operating system SUSE Linux Enterprise Desktop 15 SP4 LTSS Operating systems & Components / Operating system SUSE Linux Enterprise Micro Operating systems & Components / Operating system openSUSE Leap Micro Operating systems & Components / Operating system Python 3 Module Operating systems & Components / Operating system SUSE Linux Enterprise Workstation Extension 15 Operating systems & Components / Operating system Public Cloud Module Operating systems & Components / Operating system Development Tools Module Operating systems & Components / Operating system SUSE Package Hub 15 Operating systems & Components / Operating system Basesystem Module Operating systems & Components / Operating system SUSE Linux Enterprise Micro for Rancher Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system SUSE Linux Enterprise Desktop 15 Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system SUSE Manager Retail Branch Server Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system SUSE Manager Proxy Operating systems & Components / Operating system libre2-11-64bit Operating systems & Components / Operating system package or component libre2-11-64bit-debuginfo Operating systems & Components / Operating system package or component libabsl2308_0_0-64bit-debuginfo Operating systems & Components / Operating system package or component libprotobuf-lite25_1_0-64bit-debuginfo Operating systems & Components / Operating system package or component libprotoc25_1_0-64bit Operating systems & Components / Operating system package or component libprotobuf25_1_0-64bit-debuginfo Operating systems & Components / Operating system package or component libprotobuf25_1_0-64bit Operating systems & Components / Operating system package or component libprotoc25_1_0-64bit-debuginfo Operating systems & Components / Operating system package or component libprotobuf-lite25_1_0-64bit Operating systems & Components / Operating system package or component libabsl2308_0_0-64bit Operating systems & Components / Operating system package or component opencensus-proto-source Operating systems & Components / Operating system package or component python311-abseil Operating systems & Components / Operating system package or component grpc-source Operating systems & Components / Operating system package or component libprotobuf25_1_0-32bit Operating systems & Components / Operating system package or component libabsl2308_0_0-32bit Operating systems & Components / Operating system package or component libprotoc25_1_0-32bit-debuginfo Operating systems & Components / Operating system package or component libprotoc25_1_0-32bit Operating systems & Components / Operating system package or component libprotobuf25_1_0-32bit-debuginfo Operating systems & Components / Operating system package or component libprotobuf-lite25_1_0-32bit-debuginfo Operating systems & Components / Operating system package or component libabsl2308_0_0-32bit-debuginfo Operating systems & Components / Operating system package or component libprotobuf-lite25_1_0-32bit Operating systems & Components / Operating system package or component libre2-11-32bit Operating systems & Components / Operating system package or component libre2-11-32bit-debuginfo Operating systems & Components / Operating system package or component grpc-devel-debuginfo Operating systems & Components / Operating system package or component abseil-cpp-devel Operating systems & Components / Operating system package or component libgrpc37 Operating systems & Components / Operating system package or component libprotobuf-lite25_1_0-debuginfo Operating systems & Components / Operating system package or component libprotoc25_1_0 Operating systems & Components / Operating system package or component protobuf-devel Operating systems & Components / Operating system package or component libprotoc25_1_0-debuginfo Operating systems & Components / Operating system package or component re2-devel Operating systems & Components / Operating system package or component libgrpc1_60-debuginfo Operating systems & Components / Operating system package or component grpc-debuginfo Operating systems & Components / Operating system package or component libgrpc++1_60 Operating systems & Components / Operating system package or component libgrpc++1_60-debuginfo Operating systems & Components / Operating system package or component libre2-11-debuginfo Operating systems & Components / Operating system package or component upb-devel Operating systems & Components / Operating system package or component abseil-cpp-debugsource Operating systems & Components / Operating system package or component libprotobuf25_1_0-debuginfo Operating systems & Components / Operating system package or component re2-debugsource Operating systems & Components / Operating system package or component python-grpcio-debugsource Operating systems & Components / Operating system package or component protobuf-devel-debuginfo Operating systems & Components / Operating system package or component python311-grpcio Operating systems & Components / Operating system package or component grpc-devel Operating systems & Components / Operating system package or component libre2-11 Operating systems & Components / Operating system package or component libupb37 Operating systems & Components / Operating system package or component python311-protobuf Operating systems & Components / Operating system package or component libgrpc1_60 Operating systems & Components / Operating system package or component libabsl2308_0_0 Operating systems & Components / Operating system package or component protobuf-debugsource Operating systems & Components / Operating system package or component libabsl2308_0_0-debuginfo Operating systems & Components / Operating system package or component grpc-debugsource Operating systems & Components / Operating system package or component libupb37-debuginfo Operating systems & Components / Operating system package or component libgrpc37-debuginfo Operating systems & Components / Operating system package or component libprotobuf25_1_0 Operating systems & Components / Operating system package or component protobuf-java Operating systems & Components / Operating system package or component libprotobuf-lite25_1_0 Operating systems & Components / Operating system package or component python311-grpcio-debuginfo Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU79797
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-32731
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient validation of user-supplied input when parsing HTTP2 requests. When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. This could lead to requests from the proxy being interpreted as containing headers from different proxy clients, leading to an information leak that can be used for privilege escalation or data exfiltration.
MitigationUpdate the affected package abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP4
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4
SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise Micro: 5.3 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
Python 3 Module: 15-SP5
SUSE Linux Enterprise Workstation Extension 15: SP5
Public Cloud Module: 15-SP4 - 15-SP5
Development Tools Module: 15-SP5
SUSE Package Hub 15: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.3 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
libre2-11-64bit: before 20240201-150400.9.3.1
libre2-11-64bit-debuginfo: before 20240201-150400.9.3.1
libabsl2308_0_0-64bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-64bit: before 25.1-150400.9.3.1
libabsl2308_0_0-64bit: before 20230802.1-150400.10.4.1
opencensus-proto-source: before 0.3.0+git.20200721-150400.9.3.1
python311-abseil: before 1.4.0-150400.9.3.1
grpc-source: before 1.60.0-150400.8.3.2
libprotobuf25_1_0-32bit: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit: before 20230802.1-150400.10.4.1
libprotoc25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-32bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-32bit: before 25.1-150400.9.3.1
libre2-11-32bit: before 20240201-150400.9.3.1
libre2-11-32bit-debuginfo: before 20240201-150400.9.3.1
grpc-devel-debuginfo: before 1.60.0-150400.8.3.2
abseil-cpp-devel: before 20230802.1-150400.10.4.1
libgrpc37: before 1.60.0-150400.8.3.2
libprotobuf-lite25_1_0-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0: before 25.1-150400.9.3.1
protobuf-devel: before 25.1-150400.9.3.1
libprotoc25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-devel: before 20240201-150400.9.3.1
libgrpc1_60-debuginfo: before 1.60.0-150400.8.3.2
grpc-debuginfo: before 1.60.0-150400.8.3.2
libgrpc++1_60: before 1.60.0-150400.8.3.2
libgrpc++1_60-debuginfo: before 1.60.0-150400.8.3.2
libre2-11-debuginfo: before 20240201-150400.9.3.1
upb-devel: before 1.60.0-150400.8.3.2
abseil-cpp-debugsource: before 20230802.1-150400.10.4.1
libprotobuf25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-debugsource: before 20240201-150400.9.3.1
python-grpcio-debugsource: before 1.60.0-150400.9.3.2
protobuf-devel-debuginfo: before 25.1-150400.9.3.1
python311-grpcio: before 1.60.0-150400.9.3.2
grpc-devel: before 1.60.0-150400.8.3.2
libre2-11: before 20240201-150400.9.3.1
libupb37: before 1.60.0-150400.8.3.2
python311-protobuf: before 4.25.1-150400.9.3.1
libgrpc1_60: before 1.60.0-150400.8.3.2
libabsl2308_0_0: before 20230802.1-150400.10.4.1
protobuf-debugsource: before 25.1-150400.9.3.1
libabsl2308_0_0-debuginfo: before 20230802.1-150400.10.4.1
grpc-debugsource: before 1.60.0-150400.8.3.2
libupb37-debuginfo: before 1.60.0-150400.8.3.2
libgrpc37-debuginfo: before 1.60.0-150400.8.3.2
libprotobuf25_1_0: before 25.1-150400.9.3.1
protobuf-java: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0: before 25.1-150400.9.3.1
python311-grpcio-debuginfo: before 1.60.0-150400.9.3.2
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20240573-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79796
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-32732
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can pass specially crafted input to the application and cause a termination of connection between a HTTP2 proxy and a gRPC server.
MitigationUpdate the affected package abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP4
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4
SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise Micro: 5.3 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
Python 3 Module: 15-SP5
SUSE Linux Enterprise Workstation Extension 15: SP5
Public Cloud Module: 15-SP4 - 15-SP5
Development Tools Module: 15-SP5
SUSE Package Hub 15: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.3 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
libre2-11-64bit: before 20240201-150400.9.3.1
libre2-11-64bit-debuginfo: before 20240201-150400.9.3.1
libabsl2308_0_0-64bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-64bit: before 25.1-150400.9.3.1
libabsl2308_0_0-64bit: before 20230802.1-150400.10.4.1
opencensus-proto-source: before 0.3.0+git.20200721-150400.9.3.1
python311-abseil: before 1.4.0-150400.9.3.1
grpc-source: before 1.60.0-150400.8.3.2
libprotobuf25_1_0-32bit: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit: before 20230802.1-150400.10.4.1
libprotoc25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-32bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-32bit: before 25.1-150400.9.3.1
libre2-11-32bit: before 20240201-150400.9.3.1
libre2-11-32bit-debuginfo: before 20240201-150400.9.3.1
grpc-devel-debuginfo: before 1.60.0-150400.8.3.2
abseil-cpp-devel: before 20230802.1-150400.10.4.1
libgrpc37: before 1.60.0-150400.8.3.2
libprotobuf-lite25_1_0-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0: before 25.1-150400.9.3.1
protobuf-devel: before 25.1-150400.9.3.1
libprotoc25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-devel: before 20240201-150400.9.3.1
libgrpc1_60-debuginfo: before 1.60.0-150400.8.3.2
grpc-debuginfo: before 1.60.0-150400.8.3.2
libgrpc++1_60: before 1.60.0-150400.8.3.2
libgrpc++1_60-debuginfo: before 1.60.0-150400.8.3.2
libre2-11-debuginfo: before 20240201-150400.9.3.1
upb-devel: before 1.60.0-150400.8.3.2
abseil-cpp-debugsource: before 20230802.1-150400.10.4.1
libprotobuf25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-debugsource: before 20240201-150400.9.3.1
python-grpcio-debugsource: before 1.60.0-150400.9.3.2
protobuf-devel-debuginfo: before 25.1-150400.9.3.1
python311-grpcio: before 1.60.0-150400.9.3.2
grpc-devel: before 1.60.0-150400.8.3.2
libre2-11: before 20240201-150400.9.3.1
libupb37: before 1.60.0-150400.8.3.2
python311-protobuf: before 4.25.1-150400.9.3.1
libgrpc1_60: before 1.60.0-150400.8.3.2
libabsl2308_0_0: before 20230802.1-150400.10.4.1
protobuf-debugsource: before 25.1-150400.9.3.1
libabsl2308_0_0-debuginfo: before 20230802.1-150400.10.4.1
grpc-debugsource: before 1.60.0-150400.8.3.2
libupb37-debuginfo: before 1.60.0-150400.8.3.2
libgrpc37-debuginfo: before 1.60.0-150400.8.3.2
libprotobuf25_1_0: before 25.1-150400.9.3.1
protobuf-java: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0: before 25.1-150400.9.3.1
python311-grpcio-debuginfo: before 1.60.0-150400.9.3.2
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20240573-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80828
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-33953
CWE-ID:
CWE-770 - Allocation of Resources Without Limits or Throttling
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationUpdate the affected package abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP4
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4
SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise Micro: 5.3 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
Python 3 Module: 15-SP5
SUSE Linux Enterprise Workstation Extension 15: SP5
Public Cloud Module: 15-SP4 - 15-SP5
Development Tools Module: 15-SP5
SUSE Package Hub 15: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.3 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
libre2-11-64bit: before 20240201-150400.9.3.1
libre2-11-64bit-debuginfo: before 20240201-150400.9.3.1
libabsl2308_0_0-64bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-64bit: before 25.1-150400.9.3.1
libabsl2308_0_0-64bit: before 20230802.1-150400.10.4.1
opencensus-proto-source: before 0.3.0+git.20200721-150400.9.3.1
python311-abseil: before 1.4.0-150400.9.3.1
grpc-source: before 1.60.0-150400.8.3.2
libprotobuf25_1_0-32bit: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit: before 20230802.1-150400.10.4.1
libprotoc25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-32bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-32bit: before 25.1-150400.9.3.1
libre2-11-32bit: before 20240201-150400.9.3.1
libre2-11-32bit-debuginfo: before 20240201-150400.9.3.1
grpc-devel-debuginfo: before 1.60.0-150400.8.3.2
abseil-cpp-devel: before 20230802.1-150400.10.4.1
libgrpc37: before 1.60.0-150400.8.3.2
libprotobuf-lite25_1_0-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0: before 25.1-150400.9.3.1
protobuf-devel: before 25.1-150400.9.3.1
libprotoc25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-devel: before 20240201-150400.9.3.1
libgrpc1_60-debuginfo: before 1.60.0-150400.8.3.2
grpc-debuginfo: before 1.60.0-150400.8.3.2
libgrpc++1_60: before 1.60.0-150400.8.3.2
libgrpc++1_60-debuginfo: before 1.60.0-150400.8.3.2
libre2-11-debuginfo: before 20240201-150400.9.3.1
upb-devel: before 1.60.0-150400.8.3.2
abseil-cpp-debugsource: before 20230802.1-150400.10.4.1
libprotobuf25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-debugsource: before 20240201-150400.9.3.1
python-grpcio-debugsource: before 1.60.0-150400.9.3.2
protobuf-devel-debuginfo: before 25.1-150400.9.3.1
python311-grpcio: before 1.60.0-150400.9.3.2
grpc-devel: before 1.60.0-150400.8.3.2
libre2-11: before 20240201-150400.9.3.1
libupb37: before 1.60.0-150400.8.3.2
python311-protobuf: before 4.25.1-150400.9.3.1
libgrpc1_60: before 1.60.0-150400.8.3.2
libabsl2308_0_0: before 20230802.1-150400.10.4.1
protobuf-debugsource: before 25.1-150400.9.3.1
libabsl2308_0_0-debuginfo: before 20230802.1-150400.10.4.1
grpc-debugsource: before 1.60.0-150400.8.3.2
libupb37-debuginfo: before 1.60.0-150400.8.3.2
libgrpc37-debuginfo: before 1.60.0-150400.8.3.2
libprotobuf25_1_0: before 25.1-150400.9.3.1
protobuf-java: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0: before 25.1-150400.9.3.1
python311-grpcio-debuginfo: before 1.60.0-150400.9.3.2
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20240573-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU81728
Risk: High
CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A/U:Amber]
CVE-ID: CVE-2023-44487
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improperly control of consumption for internal resources when handling HTTP/2 requests with compressed HEADERS frames. A remote attacker can send a sequence of compressed HEADERS frames followed by RST_STREAM frames and perform a denial of service (DoS) attack, a.k.a. "Rapid Reset".
Note, the vulnerability is being actively exploited in the wild.
Update the affected package abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP4
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4
SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise Micro: 5.3 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
Python 3 Module: 15-SP5
SUSE Linux Enterprise Workstation Extension 15: SP5
Public Cloud Module: 15-SP4 - 15-SP5
Development Tools Module: 15-SP5
SUSE Package Hub 15: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.3 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
libre2-11-64bit: before 20240201-150400.9.3.1
libre2-11-64bit-debuginfo: before 20240201-150400.9.3.1
libabsl2308_0_0-64bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-64bit: before 25.1-150400.9.3.1
libabsl2308_0_0-64bit: before 20230802.1-150400.10.4.1
opencensus-proto-source: before 0.3.0+git.20200721-150400.9.3.1
python311-abseil: before 1.4.0-150400.9.3.1
grpc-source: before 1.60.0-150400.8.3.2
libprotobuf25_1_0-32bit: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit: before 20230802.1-150400.10.4.1
libprotoc25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-32bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-32bit: before 25.1-150400.9.3.1
libre2-11-32bit: before 20240201-150400.9.3.1
libre2-11-32bit-debuginfo: before 20240201-150400.9.3.1
grpc-devel-debuginfo: before 1.60.0-150400.8.3.2
abseil-cpp-devel: before 20230802.1-150400.10.4.1
libgrpc37: before 1.60.0-150400.8.3.2
libprotobuf-lite25_1_0-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0: before 25.1-150400.9.3.1
protobuf-devel: before 25.1-150400.9.3.1
libprotoc25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-devel: before 20240201-150400.9.3.1
libgrpc1_60-debuginfo: before 1.60.0-150400.8.3.2
grpc-debuginfo: before 1.60.0-150400.8.3.2
libgrpc++1_60: before 1.60.0-150400.8.3.2
libgrpc++1_60-debuginfo: before 1.60.0-150400.8.3.2
libre2-11-debuginfo: before 20240201-150400.9.3.1
upb-devel: before 1.60.0-150400.8.3.2
abseil-cpp-debugsource: before 20230802.1-150400.10.4.1
libprotobuf25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-debugsource: before 20240201-150400.9.3.1
python-grpcio-debugsource: before 1.60.0-150400.9.3.2
protobuf-devel-debuginfo: before 25.1-150400.9.3.1
python311-grpcio: before 1.60.0-150400.9.3.2
grpc-devel: before 1.60.0-150400.8.3.2
libre2-11: before 20240201-150400.9.3.1
libupb37: before 1.60.0-150400.8.3.2
python311-protobuf: before 4.25.1-150400.9.3.1
libgrpc1_60: before 1.60.0-150400.8.3.2
libabsl2308_0_0: before 20230802.1-150400.10.4.1
protobuf-debugsource: before 25.1-150400.9.3.1
libabsl2308_0_0-debuginfo: before 20230802.1-150400.10.4.1
grpc-debugsource: before 1.60.0-150400.8.3.2
libupb37-debuginfo: before 1.60.0-150400.8.3.2
libgrpc37-debuginfo: before 1.60.0-150400.8.3.2
libprotobuf25_1_0: before 25.1-150400.9.3.1
protobuf-java: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0: before 25.1-150400.9.3.1
python311-grpcio-debuginfo: before 1.60.0-150400.9.3.2
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20240573-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU82653
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-4785
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to lack of error handling in the TCP server in Google's gRPC. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack by initiating a significant number of connections with the server.
MitigationUpdate the affected package abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP4
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4
SUSE Linux Enterprise Desktop 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise Micro: 5.3 - 5.5
openSUSE Leap Micro: 5.3 - 5.4
Python 3 Module: 15-SP5
SUSE Linux Enterprise Workstation Extension 15: SP5
Public Cloud Module: 15-SP4 - 15-SP5
Development Tools Module: 15-SP5
SUSE Package Hub 15: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Micro for Rancher: 5.3 - 5.4
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
libre2-11-64bit: before 20240201-150400.9.3.1
libre2-11-64bit-debuginfo: before 20240201-150400.9.3.1
libabsl2308_0_0-64bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf25_1_0-64bit: before 25.1-150400.9.3.1
libprotoc25_1_0-64bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-64bit: before 25.1-150400.9.3.1
libabsl2308_0_0-64bit: before 20230802.1-150400.10.4.1
opencensus-proto-source: before 0.3.0+git.20200721-150400.9.3.1
python311-abseil: before 1.4.0-150400.9.3.1
grpc-source: before 1.60.0-150400.8.3.2
libprotobuf25_1_0-32bit: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit: before 20230802.1-150400.10.4.1
libprotoc25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0-32bit: before 25.1-150400.9.3.1
libprotobuf25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0-32bit-debuginfo: before 25.1-150400.9.3.1
libabsl2308_0_0-32bit-debuginfo: before 20230802.1-150400.10.4.1
libprotobuf-lite25_1_0-32bit: before 25.1-150400.9.3.1
libre2-11-32bit: before 20240201-150400.9.3.1
libre2-11-32bit-debuginfo: before 20240201-150400.9.3.1
grpc-devel-debuginfo: before 1.60.0-150400.8.3.2
abseil-cpp-devel: before 20230802.1-150400.10.4.1
libgrpc37: before 1.60.0-150400.8.3.2
libprotobuf-lite25_1_0-debuginfo: before 25.1-150400.9.3.1
libprotoc25_1_0: before 25.1-150400.9.3.1
protobuf-devel: before 25.1-150400.9.3.1
libprotoc25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-devel: before 20240201-150400.9.3.1
libgrpc1_60-debuginfo: before 1.60.0-150400.8.3.2
grpc-debuginfo: before 1.60.0-150400.8.3.2
libgrpc++1_60: before 1.60.0-150400.8.3.2
libgrpc++1_60-debuginfo: before 1.60.0-150400.8.3.2
libre2-11-debuginfo: before 20240201-150400.9.3.1
upb-devel: before 1.60.0-150400.8.3.2
abseil-cpp-debugsource: before 20230802.1-150400.10.4.1
libprotobuf25_1_0-debuginfo: before 25.1-150400.9.3.1
re2-debugsource: before 20240201-150400.9.3.1
python-grpcio-debugsource: before 1.60.0-150400.9.3.2
protobuf-devel-debuginfo: before 25.1-150400.9.3.1
python311-grpcio: before 1.60.0-150400.9.3.2
grpc-devel: before 1.60.0-150400.8.3.2
libre2-11: before 20240201-150400.9.3.1
libupb37: before 1.60.0-150400.8.3.2
python311-protobuf: before 4.25.1-150400.9.3.1
libgrpc1_60: before 1.60.0-150400.8.3.2
libabsl2308_0_0: before 20230802.1-150400.10.4.1
protobuf-debugsource: before 25.1-150400.9.3.1
libabsl2308_0_0-debuginfo: before 20230802.1-150400.10.4.1
grpc-debugsource: before 1.60.0-150400.8.3.2
libupb37-debuginfo: before 1.60.0-150400.8.3.2
libgrpc37-debuginfo: before 1.60.0-150400.8.3.2
libprotobuf25_1_0: before 25.1-150400.9.3.1
protobuf-java: before 25.1-150400.9.3.1
libprotobuf-lite25_1_0: before 25.1-150400.9.3.1
python311-grpcio-debuginfo: before 1.60.0-150400.9.3.2
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20240573-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.