Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-26964 (GCVE-0-2023-26964)
Vulnerability from cvelistv5 – Published: 2023-04-11 00:00 – Updated: 2025-02-11 15:46
VLAI?
EPSS
Summary
An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).
Severity ?
7.5 (High)
CWE
- n/a
Assigner
References
3 references
| URL | Tags |
|---|---|
| https://github.com/hyperium/hyper/issues/2877 | |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisory |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisory |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:01:31.858Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/hyperium/hyper/issues/2877"
},
{
"name": "FEDORA-2023-cc21019773",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYRZ5Y2ALATKKPIITAFAJIS4TR4LUAHO/"
},
{
"name": "FEDORA-2023-37ae269843",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZHBAE7LQARMPUEEV4TWET4D7G6WCWBUD/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-26964",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-11T15:45:51.467025Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770 Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-11T15:46:26.268Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-18T00:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/hyperium/hyper/issues/2877"
},
{
"name": "FEDORA-2023-cc21019773",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYRZ5Y2ALATKKPIITAFAJIS4TR4LUAHO/"
},
{
"name": "FEDORA-2023-37ae269843",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZHBAE7LQARMPUEEV4TWET4D7G6WCWBUD/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-26964",
"datePublished": "2023-04-11T00:00:00.000Z",
"dateReserved": "2023-02-27T00:00:00.000Z",
"dateUpdated": "2025-02-11T15:46:26.268Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2023-26964",
"date": "2026-05-21",
"epss": "0.00318",
"percentile": "0.54952"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hyper:h2:0.2.4:*:*:*:*:rust:*:*\", \"matchCriteriaId\": \"54D7E5A6-2BD2-423F-B2BF-0A6A801C9AAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hyper:hyper:0.13.7:*:*:*:*:rust:*:*\", \"matchCriteriaId\": \"9845E21C-7B0F-4770-A63E-D89A428CC393\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).\"}]",
"id": "CVE-2023-26964",
"lastModified": "2024-11-21T07:52:07.607",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2023-04-11T14:15:07.677",
"references": "[{\"url\": \"https://github.com/hyperium/hyper/issues/2877\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Issue Tracking\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZHBAE7LQARMPUEEV4TWET4D7G6WCWBUD/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYRZ5Y2ALATKKPIITAFAJIS4TR4LUAHO/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://github.com/hyperium/hyper/issues/2877\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZHBAE7LQARMPUEEV4TWET4D7G6WCWBUD/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYRZ5Y2ALATKKPIITAFAJIS4TR4LUAHO/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-770\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-26964\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-04-11T14:15:07.677\",\"lastModified\":\"2025-02-11T16:15:36.943\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hyper:h2:0.2.4:*:*:*:*:rust:*:*\",\"matchCriteriaId\":\"54D7E5A6-2BD2-423F-B2BF-0A6A801C9AAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hyper:hyper:0.13.7:*:*:*:*:rust:*:*\",\"matchCriteriaId\":\"9845E21C-7B0F-4770-A63E-D89A428CC393\"}]}]}],\"references\":[{\"url\":\"https://github.com/hyperium/hyper/issues/2877\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZHBAE7LQARMPUEEV4TWET4D7G6WCWBUD/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYRZ5Y2ALATKKPIITAFAJIS4TR4LUAHO/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/hyperium/hyper/issues/2877\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZHBAE7LQARMPUEEV4TWET4D7G6WCWBUD/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYRZ5Y2ALATKKPIITAFAJIS4TR4LUAHO/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/hyperium/hyper/issues/2877\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYRZ5Y2ALATKKPIITAFAJIS4TR4LUAHO/\", \"name\": \"FEDORA-2023-cc21019773\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZHBAE7LQARMPUEEV4TWET4D7G6WCWBUD/\", \"name\": \"FEDORA-2023-37ae269843\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T12:01:31.858Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-26964\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-11T15:45:51.467025Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-770\", \"description\": \"CWE-770 Allocation of Resources Without Limits or Throttling\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-11T15:46:16.576Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://github.com/hyperium/hyper/issues/2877\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYRZ5Y2ALATKKPIITAFAJIS4TR4LUAHO/\", \"name\": \"FEDORA-2023-cc21019773\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZHBAE7LQARMPUEEV4TWET4D7G6WCWBUD/\", \"name\": \"FEDORA-2023-37ae269843\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2023-05-18T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-26964\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-11T15:46:26.268Z\", \"dateReserved\": \"2023-02-27T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2023-04-11T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
BDU:2023-03248
Vulnerability from fstec - Published: 16.04.2023
VLAI Severity ?
Title
Уязвимость HTTP-библиотеки для Rust Hyper, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость HTTP-библиотеки для Rust Hyper связана с неограниченным распределением ресурсов. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании
Severity ?
Vendor
Сообщество свободного программного обеспечения, Novell Inc., Fedora Project, Hyperium
Software Name
Debian GNU/Linux, SUSE Linux Enterprise Server for SAP Applications, Suse Linux Enterprise Server, Suse Linux Enterprise Desktop, Fedora, Hyper, h2
Software Version
10 (Debian GNU/Linux), 15 SP3 (SUSE Linux Enterprise Server for SAP Applications), 15 SP4 (Suse Linux Enterprise Server), 15 SP4 (Suse Linux Enterprise Desktop), 37 (Fedora), 38 (Fedora), 15 SP5 (SUSE Linux Enterprise Server for SAP Applications), 15 SP5 (Suse Linux Enterprise Server), 15 SP5 (Suse Linux Enterprise Desktop), 0.13.7 (Hyper), 0.2.4 (h2)
Possible Mitigations
Использование рекомендаций:
Для Rust Hyper:
https://github.com/hyperium/hyper/issues/2877
ДляDebian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2023-26964
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2023-26964.html
Для Fedora:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHBAE7LQARMPUEEV4TWET4D7G6WCWBUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYRZ5Y2ALATKKPIITAFAJIS4TR4LUAHO/
Reference
https://github.com/hyperium/hyper/issues/2877
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHBAE7LQARMPUEEV4TWET4D7G6WCWBUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYRZ5Y2ALATKKPIITAFAJIS4TR4LUAHO/
https://security-tracker.debian.org/tracker/CVE-2023-26964
https://www.suse.com/security/cve/CVE-2023-26964.html
https://security-tracker.debian.org/tracker/CVE-2023-26964
CWE
CWE-400, CWE-770
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Novell Inc., Fedora Project, Hyperium",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "10 (Debian GNU/Linux), 15 SP3 (SUSE Linux Enterprise Server for SAP Applications), 15 SP4 (Suse Linux Enterprise Server), 15 SP4 (Suse Linux Enterprise Desktop), 37 (Fedora), 38 (Fedora), 15 SP5 (SUSE Linux Enterprise Server for SAP Applications), 15 SP5 (Suse Linux Enterprise Server), 15 SP5 (Suse Linux Enterprise Desktop), 0.13.7 (Hyper), 0.2.4 (h2)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Rust Hyper:\nhttps://github.com/hyperium/hyper/issues/2877\n\n\u0414\u043b\u044fDebian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2023-26964\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2023-26964.html\n\n\u0414\u043b\u044f Fedora:\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHBAE7LQARMPUEEV4TWET4D7G6WCWBUD/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYRZ5Y2ALATKKPIITAFAJIS4TR4LUAHO/",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "16.04.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "20.06.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "20.06.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-03248",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-26964",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, SUSE Linux Enterprise Server for SAP Applications, Suse Linux Enterprise Server, Suse Linux Enterprise Desktop, Fedora, Hyper, h2",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Fedora Project Fedora 37 , Fedora Project Fedora 38 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c HTTP-\u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0434\u043b\u044f Rust Hyper, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u0439 \u0440\u0430\u0441\u0445\u043e\u0434 \u0440\u0435\u0441\u0443\u0440\u0441\u0430 (\u00ab\u0418\u0441\u0442\u043e\u0449\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u00bb) (CWE-400), \u041d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0435 \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u0438\u043b\u0438 \u0434\u0440\u043e\u0441\u0441\u0435\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 (CWE-770)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c HTTP-\u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0434\u043b\u044f Rust Hyper \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432, \u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/hyperium/hyper/issues/2877\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHBAE7LQARMPUEEV4TWET4D7G6WCWBUD/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYRZ5Y2ALATKKPIITAFAJIS4TR4LUAHO/\nhttps://security-tracker.debian.org/tracker/CVE-2023-26964\nhttps://www.suse.com/security/cve/CVE-2023-26964.html\nhttps://security-tracker.debian.org/tracker/CVE-2023-26964",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-400, CWE-770",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
FKIE_CVE-2023-26964
Vulnerability from fkie_nvd - Published: 2023-04-11 14:15 - Updated: 2025-02-11 16:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hyper:h2:0.2.4:*:*:*:*:rust:*:*",
"matchCriteriaId": "54D7E5A6-2BD2-423F-B2BF-0A6A801C9AAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hyper:hyper:0.13.7:*:*:*:*:rust:*:*",
"matchCriteriaId": "9845E21C-7B0F-4770-A63E-D89A428CC393",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS)."
}
],
"id": "CVE-2023-26964",
"lastModified": "2025-02-11T16:15:36.943",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-04-11T14:15:07.677",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/hyperium/hyper/issues/2877"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZHBAE7LQARMPUEEV4TWET4D7G6WCWBUD/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYRZ5Y2ALATKKPIITAFAJIS4TR4LUAHO/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/hyperium/hyper/issues/2877"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZHBAE7LQARMPUEEV4TWET4D7G6WCWBUD/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYRZ5Y2ALATKKPIITAFAJIS4TR4LUAHO/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-F8VR-R385-RH5R
Vulnerability from github – Published: 2023-04-11 15:30 – Updated: 2023-05-01 21:22
VLAI?
Summary
h2 vulnerable to denial of service
Details
Hyper is an HTTP library for Rust and h2 is an HTTP 2.0 client & server implementation for Rust. An issue was discovered in h2 v0.2.4 when processing header frames. It incorrectly processes the HTTP2 RST_STREAM frames by not always releasing the memory immediately upon receiving the reset frame, leading to stream stacking. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).
This issue affects users only when dealing with http2 connections.
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "h2"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.17"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2023-26964"
],
"database_specific": {
"cwe_ids": [
"CWE-770"
],
"github_reviewed": true,
"github_reviewed_at": "2023-04-11T21:47:01Z",
"nvd_published_at": "2023-04-11T14:15:00Z",
"severity": "MODERATE"
},
"details": "Hyper is an HTTP library for Rust and h2 is an HTTP 2.0 client \u0026 server implementation for Rust. An issue was discovered in h2 v0.2.4 when processing header frames. It incorrectly processes the HTTP2 `RST_STREAM` frames by not always releasing the memory immediately upon receiving the reset frame, leading to stream stacking. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).\n\nThis issue affects users only when dealing with http2 connections.",
"id": "GHSA-f8vr-r385-rh5r",
"modified": "2023-05-01T21:22:01Z",
"published": "2023-04-11T15:30:30Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26964"
},
{
"type": "WEB",
"url": "https://github.com/hyperium/h2/issues/621"
},
{
"type": "WEB",
"url": "https://github.com/hyperium/hyper/issues/2877"
},
{
"type": "WEB",
"url": "https://github.com/hyperium/h2/pull/668"
},
{
"type": "PACKAGE",
"url": "https://github.com/hyperium/hyper"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2023-0034.html"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "h2 vulnerable to denial of service"
}
GSD-2023-26964
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2023-26964",
"id": "GSD-2023-26964"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-26964"
],
"details": "An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).",
"id": "GSD-2023-26964",
"modified": "2023-12-13T01:20:54.132623Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2023-26964",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/hyperium/hyper/issues/2877",
"refsource": "MISC",
"url": "https://github.com/hyperium/hyper/issues/2877"
},
{
"name": "FEDORA-2023-cc21019773",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYRZ5Y2ALATKKPIITAFAJIS4TR4LUAHO/"
},
{
"name": "FEDORA-2023-37ae269843",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHBAE7LQARMPUEEV4TWET4D7G6WCWBUD/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:hyper:h2:0.2.4:*:*:*:*:rust:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:hyper:hyper:0.13.7:*:*:*:*:rust:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2023-26964"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/hyperium/hyper/issues/2877",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/hyperium/hyper/issues/2877"
},
{
"name": "FEDORA-2023-cc21019773",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYRZ5Y2ALATKKPIITAFAJIS4TR4LUAHO/"
},
{
"name": "FEDORA-2023-37ae269843",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHBAE7LQARMPUEEV4TWET4D7G6WCWBUD/"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-05-18T03:15Z",
"publishedDate": "2023-04-11T14:15Z"
}
}
}
MSRC_CVE-2023-26964
Vulnerability from csaf_microsoft - Published: 2023-04-01 00:00 - Updated: 2026-02-19 01:05Summary
An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result the memory and CPU usage are high which can lead to a Denial of Service (DoS).
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
7.5 (High)
Affected products
Fixed
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 18815-17084 | — | ||
| Unresolved product id: 19686-17084 | — | ||
| Unresolved product id: 18368-17086 | — | ||
| Unresolved product id: 18011-17086 | — | ||
| Unresolved product id: 18369-17084 | — | ||
| Unresolved product id: 17811-17084 | — | ||
| Unresolved product id: 18370-17084 | — | ||
| Unresolved product id: 19706-17084 | — |
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17084-3 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 17084-2 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 17086-7 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 17086-8 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 17084-6 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 17084-9 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 17084-5 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 17084-1 | — |
Vendor Fix
fix
|
Known not affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17084-4 | — |
References
4 references
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2023/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2023/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26964 An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result the memory and CPU usage are high which can lead to a Denial of Service (DoS). - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-26964.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result the memory and CPU usage are high which can lead to a Denial of Service (DoS).",
"tracking": {
"current_release_date": "2026-02-19T01:05:56.000Z",
"generator": {
"date": "2026-02-21T01:51:07.886Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2023-26964",
"initial_release_date": "2023-04-01T00:00:00.000Z",
"revision_history": [
{
"date": "2023-05-17T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-06-30T07:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
},
{
"date": "2024-08-26T00:00:00.000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Information published."
},
{
"date": "2024-08-27T00:00:00.000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Information published."
},
{
"date": "2024-08-28T00:00:00.000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Information published."
},
{
"date": "2024-08-29T00:00:00.000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Information published."
},
{
"date": "2024-08-30T00:00:00.000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Information published."
},
{
"date": "2024-08-31T00:00:00.000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Information published."
},
{
"date": "2024-09-01T00:00:00.000Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Information published."
},
{
"date": "2024-09-02T00:00:00.000Z",
"legacy_version": "1.9",
"number": "10",
"summary": "Information published."
},
{
"date": "2024-09-03T00:00:00.000Z",
"legacy_version": "2",
"number": "11",
"summary": "Information published."
},
{
"date": "2024-09-05T00:00:00.000Z",
"legacy_version": "2.1",
"number": "12",
"summary": "Information published."
},
{
"date": "2024-09-06T00:00:00.000Z",
"legacy_version": "2.2",
"number": "13",
"summary": "Information published."
},
{
"date": "2024-09-07T00:00:00.000Z",
"legacy_version": "2.3",
"number": "14",
"summary": "Information published."
},
{
"date": "2024-09-08T00:00:00.000Z",
"legacy_version": "2.4",
"number": "15",
"summary": "Information published."
},
{
"date": "2024-09-11T00:00:00.000Z",
"legacy_version": "2.5",
"number": "16",
"summary": "Information published."
},
{
"date": "2026-02-19T01:05:56.000Z",
"legacy_version": "2.6",
"number": "17",
"summary": "Information published."
}
],
"status": "final",
"version": "17"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 rpm-ostree 2022.1-7",
"product": {
"name": "\u003cazl3 rpm-ostree 2022.1-7",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 rpm-ostree 2022.1-7",
"product": {
"name": "azl3 rpm-ostree 2022.1-7",
"product_id": "18815"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 rpm-ostree 2022.1-7",
"product": {
"name": "\u003ccbl2 rpm-ostree 2022.1-7",
"product_id": "8"
}
},
{
"category": "product_version",
"name": "cbl2 rpm-ostree 2022.1-7",
"product": {
"name": "cbl2 rpm-ostree 2022.1-7",
"product_id": "18011"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 rpm-ostree 2024.4-1",
"product": {
"name": "\u003cazl3 rpm-ostree 2024.4-1",
"product_id": "9"
}
},
{
"category": "product_version",
"name": "azl3 rpm-ostree 2024.4-1",
"product": {
"name": "azl3 rpm-ostree 2024.4-1",
"product_id": "17811"
}
}
],
"category": "product_name",
"name": "rpm-ostree"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 rust 1.86.0-1",
"product": {
"name": "\u003cazl3 rust 1.86.0-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 rust 1.86.0-1",
"product": {
"name": "azl3 rust 1.86.0-1",
"product_id": "19686"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 rust h2-0.3.26",
"product": {
"name": "\u003cazl3 rust h2-0.3.26",
"product_id": "6"
}
},
{
"category": "product_version",
"name": "azl3 rust h2-0.3.26",
"product": {
"name": "azl3 rust h2-0.3.26",
"product_id": "18369"
}
}
],
"category": "product_name",
"name": "rust"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 kata-containers 3.2.0.azl0-1",
"product": {
"name": "\u003ccbl2 kata-containers 3.2.0.azl0-1",
"product_id": "7"
}
},
{
"category": "product_version",
"name": "cbl2 kata-containers 3.2.0.azl0-1",
"product": {
"name": "cbl2 kata-containers 3.2.0.azl0-1",
"product_id": "18368"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 kata-containers 3.2.0.azl0-2",
"product": {
"name": "\u003cazl3 kata-containers 3.2.0.azl0-2",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "azl3 kata-containers 3.2.0.azl0-2",
"product": {
"name": "azl3 kata-containers 3.2.0.azl0-2",
"product_id": "18370"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 kata-containers 3.1.3-2",
"product": {
"name": "\u003cazl3 kata-containers 3.1.3-2",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 kata-containers 3.1.3-2",
"product": {
"name": "azl3 kata-containers 3.1.3-2",
"product_id": "19706"
}
}
],
"category": "product_name",
"name": "kata-containers"
},
{
"category": "product_name",
"name": "azl3 mozjs 102.15.1-1",
"product": {
"name": "azl3 mozjs 102.15.1-1",
"product_id": "4"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 rpm-ostree 2022.1-7 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rpm-ostree 2022.1-7 as a component of Azure Linux 3.0",
"product_id": "18815-17084"
},
"product_reference": "18815",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 rust 1.86.0-1 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rust 1.86.0-1 as a component of Azure Linux 3.0",
"product_id": "19686-17084"
},
"product_reference": "19686",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 kata-containers 3.2.0.azl0-1 as a component of CBL Mariner 2.0",
"product_id": "17086-7"
},
"product_reference": "7",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 kata-containers 3.2.0.azl0-1 as a component of CBL Mariner 2.0",
"product_id": "18368-17086"
},
"product_reference": "18368",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 rpm-ostree 2022.1-7 as a component of CBL Mariner 2.0",
"product_id": "17086-8"
},
"product_reference": "8",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 rpm-ostree 2022.1-7 as a component of CBL Mariner 2.0",
"product_id": "18011-17086"
},
"product_reference": "18011",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 rust h2-0.3.26 as a component of Azure Linux 3.0",
"product_id": "17084-6"
},
"product_reference": "6",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rust h2-0.3.26 as a component of Azure Linux 3.0",
"product_id": "18369-17084"
},
"product_reference": "18369",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 rpm-ostree 2024.4-1 as a component of Azure Linux 3.0",
"product_id": "17084-9"
},
"product_reference": "9",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rpm-ostree 2024.4-1 as a component of Azure Linux 3.0",
"product_id": "17811-17084"
},
"product_reference": "17811",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 kata-containers 3.2.0.azl0-2 as a component of Azure Linux 3.0",
"product_id": "17084-5"
},
"product_reference": "5",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kata-containers 3.2.0.azl0-2 as a component of Azure Linux 3.0",
"product_id": "18370-17084"
},
"product_reference": "18370",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 kata-containers 3.1.3-2 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kata-containers 3.1.3-2 as a component of Azure Linux 3.0",
"product_id": "19706-17084"
},
"product_reference": "19706",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 mozjs 102.15.1-1 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26964",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-4"
]
}
],
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"18815-17084",
"19686-17084",
"18368-17086",
"18011-17086",
"18369-17084",
"17811-17084",
"18370-17084",
"19706-17084"
],
"known_affected": [
"17084-3",
"17084-2",
"17086-7",
"17086-8",
"17084-6",
"17084-9",
"17084-5",
"17084-1"
],
"known_not_affected": [
"17084-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26964 An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result the memory and CPU usage are high which can lead to a Denial of Service (DoS). - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-26964.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-17T00:00:00.000Z",
"details": "2024.4-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-3",
"17084-9"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-05-17T00:00:00.000Z",
"details": "Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-05-17T00:00:00.000Z",
"details": "3.2.0.azl0-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-7"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-05-17T00:00:00.000Z",
"details": "2022.1-7:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-8"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-05-17T00:00:00.000Z",
"details": "h2-0.3.26:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-6"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-05-17T00:00:00.000Z",
"details": "3.2.0.azl0-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-5",
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"17084-3",
"17084-2",
"17086-7",
"17086-8",
"17084-6",
"17084-9",
"17084-5",
"17084-1"
]
}
],
"title": "An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result the memory and CPU usage are high which can lead to a Denial of Service (DoS)."
}
]
}
OPENSUSE-SU-2024:0294-1
Vulnerability from csaf_opensuse - Published: 2024-09-09 12:04 - Updated: 2024-09-09 12:04Summary
Security update for kanidm
Severity
Moderate
Notes
Title of the patch: Security update for kanidm
Description of the patch: This update for kanidm fixes the following issues:
- kanidm version 1.3.3~git0.f075d13:
* Release 1.3.3
* Mail substr index (#2981)
Patchnames: openSUSE-2024-294
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Affected products
Recommended
20 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
low
4.3 (Medium)
Affected products
Recommended
20 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.7 (Medium)
Affected products
Recommended
20 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
18 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kanidm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kanidm fixes the following issues:\n\n- kanidm version 1.3.3~git0.f075d13:\n * Release 1.3.3\n * Mail substr index (#2981)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2024-294",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0294-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2024:0294-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5D6EJD2U437T6U4EHNYRU44B2UOGLUUB/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2024:0294-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5D6EJD2U437T6U4EHNYRU44B2UOGLUUB/"
},
{
"category": "self",
"summary": "SUSE Bug 1191031",
"url": "https://bugzilla.suse.com/1191031"
},
{
"category": "self",
"summary": "SUSE Bug 1194119",
"url": "https://bugzilla.suse.com/1194119"
},
{
"category": "self",
"summary": "SUSE Bug 1196972",
"url": "https://bugzilla.suse.com/1196972"
},
{
"category": "self",
"summary": "SUSE Bug 1210356",
"url": "https://bugzilla.suse.com/1210356"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45710 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24713 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24713/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26964 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26964/"
}
],
"title": "Security update for kanidm",
"tracking": {
"current_release_date": "2024-09-09T12:04:21Z",
"generator": {
"date": "2024-09-09T12:04:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:0294-1",
"initial_release_date": "2024-09-09T12:04:21Z",
"revision_history": [
{
"date": "2024-09-09T12:04:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"product": {
"name": "kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"product_id": "kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"product": {
"name": "kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"product_id": "kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"product": {
"name": "kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"product_id": "kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"product": {
"name": "kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"product_id": "kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"product": {
"name": "kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"product_id": "kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"product": {
"name": "kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"product_id": "kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"product": {
"name": "kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"product_id": "kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"product": {
"name": "kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"product_id": "kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"product": {
"name": "kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"product_id": "kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"product": {
"name": "kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"product_id": "kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP6",
"product": {
"name": "SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64"
},
"product_reference": "kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64"
},
"product_reference": "kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64"
},
"product_reference": "kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64"
},
"product_reference": "kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64"
},
"product_reference": "kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64"
},
"product_reference": "kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64"
},
"product_reference": "kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64"
},
"product_reference": "kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64"
},
"product_reference": "kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64"
},
"product_reference": "kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64"
},
"product_reference": "kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64"
},
"product_reference": "kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64"
},
"product_reference": "kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64"
},
"product_reference": "kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64"
},
"product_reference": "kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64"
},
"product_reference": "kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64"
},
"product_reference": "kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64"
},
"product_reference": "kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64"
},
"product_reference": "kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64"
},
"product_reference": "kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-45710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45710"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the tokio crate before 1.8.4, and 1.9.x through 1.13.x before 1.13.1, for Rust. In certain circumstances involving a closed oneshot channel, there is a data race and memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45710",
"url": "https://www.suse.com/security/cve/CVE-2021-45710"
},
{
"category": "external",
"summary": "SUSE Bug 1194119 for CVE-2021-45710",
"url": "https://bugzilla.suse.com/1194119"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-09T12:04:21Z",
"details": "low"
}
],
"title": "CVE-2021-45710"
},
{
"cve": "CVE-2022-24713",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24713"
}
],
"notes": [
{
"category": "general",
"text": "regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it\u0027s considered part of the crate\u0027s API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it\u0027s possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24713",
"url": "https://www.suse.com/security/cve/CVE-2022-24713"
},
{
"category": "external",
"summary": "SUSE Bug 1196972 for CVE-2022-24713",
"url": "https://bugzilla.suse.com/1196972"
},
{
"category": "external",
"summary": "SUSE Bug 1197903 for CVE-2022-24713",
"url": "https://bugzilla.suse.com/1197903"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-09T12:04:21Z",
"details": "moderate"
}
],
"title": "CVE-2022-24713"
},
{
"cve": "CVE-2023-26964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26964"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26964",
"url": "https://www.suse.com/security/cve/CVE-2023-26964"
},
{
"category": "external",
"summary": "SUSE Bug 1210339 for CVE-2023-26964",
"url": "https://bugzilla.suse.com/1210339"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"SUSE Package Hub 15 SP6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-docs-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-server-1.3.3~git0.f075d13-bp156.4.1.x86_64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.aarch64",
"openSUSE Leap 15.6:kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-09T12:04:21Z",
"details": "moderate"
}
],
"title": "CVE-2023-26964"
}
]
}
OPENSUSE-SU-2024:12859-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1 on GA media
Severity
Moderate
Notes
Title of the patch: kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1 on GA media
Description of the patch: These are all security issues fixed in the kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-12859
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.7 (Medium)
Affected products
Recommended
20 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
5 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12859",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12859-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26964 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26964/"
}
],
"title": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12859-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"product": {
"name": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"product_id": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"product": {
"name": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"product_id": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"product": {
"name": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"product_id": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"product": {
"name": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"product_id": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"product": {
"name": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"product_id": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"product": {
"name": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"product_id": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"product": {
"name": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"product_id": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"product": {
"name": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"product_id": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"product": {
"name": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"product_id": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"product": {
"name": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"product_id": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"product": {
"name": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"product_id": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x"
}
},
{
"category": "product_version",
"name": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"product": {
"name": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"product_id": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x"
}
},
{
"category": "product_version",
"name": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"product": {
"name": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"product_id": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x"
}
},
{
"category": "product_version",
"name": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"product": {
"name": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"product_id": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x"
}
},
{
"category": "product_version",
"name": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"product": {
"name": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"product_id": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"product": {
"name": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"product_id": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"product": {
"name": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"product_id": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"product": {
"name": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"product_id": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"product": {
"name": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"product_id": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"product": {
"name": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"product_id": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64"
},
"product_reference": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le"
},
"product_reference": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x"
},
"product_reference": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64"
},
"product_reference": "kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64"
},
"product_reference": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le"
},
"product_reference": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x"
},
"product_reference": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64"
},
"product_reference": "kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64"
},
"product_reference": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le"
},
"product_reference": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x"
},
"product_reference": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64"
},
"product_reference": "kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64"
},
"product_reference": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le"
},
"product_reference": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x"
},
"product_reference": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64"
},
"product_reference": "kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64"
},
"product_reference": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le"
},
"product_reference": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x"
},
"product_reference": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64"
},
"product_reference": "kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26964"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26964",
"url": "https://www.suse.com/security/cve/CVE-2023-26964"
},
{
"category": "external",
"summary": "SUSE Bug 1210339 for CVE-2023-26964",
"url": "https://bugzilla.suse.com/1210339"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"openSUSE Tumbleweed:kanidm-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"openSUSE Tumbleweed:kanidm-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"openSUSE Tumbleweed:kanidm-docs-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"openSUSE Tumbleweed:kanidm-server-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64",
"openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.aarch64",
"openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.ppc64le",
"openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.s390x",
"openSUSE Tumbleweed:kanidm-unixd-clients-1.1.0~alpha11~git0.d3a2a6b-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-26964"
}
]
}
OPENSUSE-SU-2024:12861-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
rustup-1.25.2~0-4.1 on GA media
Severity
Moderate
Notes
Title of the patch: rustup-1.25.2~0-4.1 on GA media
Description of the patch: These are all security issues fixed in the rustup-1.25.2~0-4.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-12861
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.7 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rustup-1.25.2~0-4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rustup-1.25.2~0-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rustup-1.25.2~0-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rustup-1.25.2~0-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
5 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "rustup-1.25.2~0-4.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the rustup-1.25.2~0-4.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12861",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12861-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26964 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26964/"
}
],
"title": "rustup-1.25.2~0-4.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12861-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rustup-1.25.2~0-4.1.aarch64",
"product": {
"name": "rustup-1.25.2~0-4.1.aarch64",
"product_id": "rustup-1.25.2~0-4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rustup-1.25.2~0-4.1.ppc64le",
"product": {
"name": "rustup-1.25.2~0-4.1.ppc64le",
"product_id": "rustup-1.25.2~0-4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rustup-1.25.2~0-4.1.s390x",
"product": {
"name": "rustup-1.25.2~0-4.1.s390x",
"product_id": "rustup-1.25.2~0-4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rustup-1.25.2~0-4.1.x86_64",
"product": {
"name": "rustup-1.25.2~0-4.1.x86_64",
"product_id": "rustup-1.25.2~0-4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rustup-1.25.2~0-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rustup-1.25.2~0-4.1.aarch64"
},
"product_reference": "rustup-1.25.2~0-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rustup-1.25.2~0-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rustup-1.25.2~0-4.1.ppc64le"
},
"product_reference": "rustup-1.25.2~0-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rustup-1.25.2~0-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rustup-1.25.2~0-4.1.s390x"
},
"product_reference": "rustup-1.25.2~0-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rustup-1.25.2~0-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rustup-1.25.2~0-4.1.x86_64"
},
"product_reference": "rustup-1.25.2~0-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26964"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rustup-1.25.2~0-4.1.aarch64",
"openSUSE Tumbleweed:rustup-1.25.2~0-4.1.ppc64le",
"openSUSE Tumbleweed:rustup-1.25.2~0-4.1.s390x",
"openSUSE Tumbleweed:rustup-1.25.2~0-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26964",
"url": "https://www.suse.com/security/cve/CVE-2023-26964"
},
{
"category": "external",
"summary": "SUSE Bug 1210339 for CVE-2023-26964",
"url": "https://bugzilla.suse.com/1210339"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rustup-1.25.2~0-4.1.aarch64",
"openSUSE Tumbleweed:rustup-1.25.2~0-4.1.ppc64le",
"openSUSE Tumbleweed:rustup-1.25.2~0-4.1.s390x",
"openSUSE Tumbleweed:rustup-1.25.2~0-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:rustup-1.25.2~0-4.1.aarch64",
"openSUSE Tumbleweed:rustup-1.25.2~0-4.1.ppc64le",
"openSUSE Tumbleweed:rustup-1.25.2~0-4.1.s390x",
"openSUSE Tumbleweed:rustup-1.25.2~0-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-26964"
}
]
}
OPENSUSE-SU-2024:12862-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
sccache-0.4.1~18-2.1 on GA media
Severity
Moderate
Notes
Title of the patch: sccache-0.4.1~18-2.1 on GA media
Description of the patch: These are all security issues fixed in the sccache-0.4.1~18-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-12862
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.7 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:sccache-0.4.1~18-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:sccache-0.4.1~18-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:sccache-0.4.1~18-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:sccache-0.4.1~18-2.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
5 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "sccache-0.4.1~18-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the sccache-0.4.1~18-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12862",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12862-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26964 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26964/"
}
],
"title": "sccache-0.4.1~18-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12862-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "sccache-0.4.1~18-2.1.aarch64",
"product": {
"name": "sccache-0.4.1~18-2.1.aarch64",
"product_id": "sccache-0.4.1~18-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "sccache-0.4.1~18-2.1.ppc64le",
"product": {
"name": "sccache-0.4.1~18-2.1.ppc64le",
"product_id": "sccache-0.4.1~18-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "sccache-0.4.1~18-2.1.s390x",
"product": {
"name": "sccache-0.4.1~18-2.1.s390x",
"product_id": "sccache-0.4.1~18-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "sccache-0.4.1~18-2.1.x86_64",
"product": {
"name": "sccache-0.4.1~18-2.1.x86_64",
"product_id": "sccache-0.4.1~18-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "sccache-0.4.1~18-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sccache-0.4.1~18-2.1.aarch64"
},
"product_reference": "sccache-0.4.1~18-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sccache-0.4.1~18-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sccache-0.4.1~18-2.1.ppc64le"
},
"product_reference": "sccache-0.4.1~18-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sccache-0.4.1~18-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sccache-0.4.1~18-2.1.s390x"
},
"product_reference": "sccache-0.4.1~18-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sccache-0.4.1~18-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sccache-0.4.1~18-2.1.x86_64"
},
"product_reference": "sccache-0.4.1~18-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26964"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:sccache-0.4.1~18-2.1.aarch64",
"openSUSE Tumbleweed:sccache-0.4.1~18-2.1.ppc64le",
"openSUSE Tumbleweed:sccache-0.4.1~18-2.1.s390x",
"openSUSE Tumbleweed:sccache-0.4.1~18-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26964",
"url": "https://www.suse.com/security/cve/CVE-2023-26964"
},
{
"category": "external",
"summary": "SUSE Bug 1210339 for CVE-2023-26964",
"url": "https://bugzilla.suse.com/1210339"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:sccache-0.4.1~18-2.1.aarch64",
"openSUSE Tumbleweed:sccache-0.4.1~18-2.1.ppc64le",
"openSUSE Tumbleweed:sccache-0.4.1~18-2.1.s390x",
"openSUSE Tumbleweed:sccache-0.4.1~18-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:sccache-0.4.1~18-2.1.aarch64",
"openSUSE Tumbleweed:sccache-0.4.1~18-2.1.ppc64le",
"openSUSE Tumbleweed:sccache-0.4.1~18-2.1.s390x",
"openSUSE Tumbleweed:sccache-0.4.1~18-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-26964"
}
]
}
OPENSUSE-SU-2024:12863-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
tealdeer-1.6.1-2.1 on GA media
Severity
Moderate
Notes
Title of the patch: tealdeer-1.6.1-2.1 on GA media
Description of the patch: These are all security issues fixed in the tealdeer-1.6.1-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-12863
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.7 (Medium)
Affected products
Recommended
16 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:tealdeer-1.6.1-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tealdeer-1.6.1-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tealdeer-1.6.1-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tealdeer-1.6.1-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
5 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "tealdeer-1.6.1-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the tealdeer-1.6.1-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12863",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12863-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26964 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26964/"
}
],
"title": "tealdeer-1.6.1-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12863-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "tealdeer-1.6.1-2.1.aarch64",
"product": {
"name": "tealdeer-1.6.1-2.1.aarch64",
"product_id": "tealdeer-1.6.1-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "tealdeer-bash-completion-1.6.1-2.1.aarch64",
"product": {
"name": "tealdeer-bash-completion-1.6.1-2.1.aarch64",
"product_id": "tealdeer-bash-completion-1.6.1-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "tealdeer-fish-completion-1.6.1-2.1.aarch64",
"product": {
"name": "tealdeer-fish-completion-1.6.1-2.1.aarch64",
"product_id": "tealdeer-fish-completion-1.6.1-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "tealdeer-zsh-completion-1.6.1-2.1.aarch64",
"product": {
"name": "tealdeer-zsh-completion-1.6.1-2.1.aarch64",
"product_id": "tealdeer-zsh-completion-1.6.1-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tealdeer-1.6.1-2.1.ppc64le",
"product": {
"name": "tealdeer-1.6.1-2.1.ppc64le",
"product_id": "tealdeer-1.6.1-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "tealdeer-bash-completion-1.6.1-2.1.ppc64le",
"product": {
"name": "tealdeer-bash-completion-1.6.1-2.1.ppc64le",
"product_id": "tealdeer-bash-completion-1.6.1-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "tealdeer-fish-completion-1.6.1-2.1.ppc64le",
"product": {
"name": "tealdeer-fish-completion-1.6.1-2.1.ppc64le",
"product_id": "tealdeer-fish-completion-1.6.1-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "tealdeer-zsh-completion-1.6.1-2.1.ppc64le",
"product": {
"name": "tealdeer-zsh-completion-1.6.1-2.1.ppc64le",
"product_id": "tealdeer-zsh-completion-1.6.1-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tealdeer-1.6.1-2.1.s390x",
"product": {
"name": "tealdeer-1.6.1-2.1.s390x",
"product_id": "tealdeer-1.6.1-2.1.s390x"
}
},
{
"category": "product_version",
"name": "tealdeer-bash-completion-1.6.1-2.1.s390x",
"product": {
"name": "tealdeer-bash-completion-1.6.1-2.1.s390x",
"product_id": "tealdeer-bash-completion-1.6.1-2.1.s390x"
}
},
{
"category": "product_version",
"name": "tealdeer-fish-completion-1.6.1-2.1.s390x",
"product": {
"name": "tealdeer-fish-completion-1.6.1-2.1.s390x",
"product_id": "tealdeer-fish-completion-1.6.1-2.1.s390x"
}
},
{
"category": "product_version",
"name": "tealdeer-zsh-completion-1.6.1-2.1.s390x",
"product": {
"name": "tealdeer-zsh-completion-1.6.1-2.1.s390x",
"product_id": "tealdeer-zsh-completion-1.6.1-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tealdeer-1.6.1-2.1.x86_64",
"product": {
"name": "tealdeer-1.6.1-2.1.x86_64",
"product_id": "tealdeer-1.6.1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "tealdeer-bash-completion-1.6.1-2.1.x86_64",
"product": {
"name": "tealdeer-bash-completion-1.6.1-2.1.x86_64",
"product_id": "tealdeer-bash-completion-1.6.1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "tealdeer-fish-completion-1.6.1-2.1.x86_64",
"product": {
"name": "tealdeer-fish-completion-1.6.1-2.1.x86_64",
"product_id": "tealdeer-fish-completion-1.6.1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "tealdeer-zsh-completion-1.6.1-2.1.x86_64",
"product": {
"name": "tealdeer-zsh-completion-1.6.1-2.1.x86_64",
"product_id": "tealdeer-zsh-completion-1.6.1-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tealdeer-1.6.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tealdeer-1.6.1-2.1.aarch64"
},
"product_reference": "tealdeer-1.6.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tealdeer-1.6.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tealdeer-1.6.1-2.1.ppc64le"
},
"product_reference": "tealdeer-1.6.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tealdeer-1.6.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tealdeer-1.6.1-2.1.s390x"
},
"product_reference": "tealdeer-1.6.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tealdeer-1.6.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tealdeer-1.6.1-2.1.x86_64"
},
"product_reference": "tealdeer-1.6.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tealdeer-bash-completion-1.6.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.aarch64"
},
"product_reference": "tealdeer-bash-completion-1.6.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tealdeer-bash-completion-1.6.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.ppc64le"
},
"product_reference": "tealdeer-bash-completion-1.6.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tealdeer-bash-completion-1.6.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.s390x"
},
"product_reference": "tealdeer-bash-completion-1.6.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tealdeer-bash-completion-1.6.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.x86_64"
},
"product_reference": "tealdeer-bash-completion-1.6.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tealdeer-fish-completion-1.6.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.aarch64"
},
"product_reference": "tealdeer-fish-completion-1.6.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tealdeer-fish-completion-1.6.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.ppc64le"
},
"product_reference": "tealdeer-fish-completion-1.6.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tealdeer-fish-completion-1.6.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.s390x"
},
"product_reference": "tealdeer-fish-completion-1.6.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tealdeer-fish-completion-1.6.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.x86_64"
},
"product_reference": "tealdeer-fish-completion-1.6.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tealdeer-zsh-completion-1.6.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.aarch64"
},
"product_reference": "tealdeer-zsh-completion-1.6.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tealdeer-zsh-completion-1.6.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.ppc64le"
},
"product_reference": "tealdeer-zsh-completion-1.6.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tealdeer-zsh-completion-1.6.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.s390x"
},
"product_reference": "tealdeer-zsh-completion-1.6.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tealdeer-zsh-completion-1.6.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.x86_64"
},
"product_reference": "tealdeer-zsh-completion-1.6.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26964"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:tealdeer-1.6.1-2.1.aarch64",
"openSUSE Tumbleweed:tealdeer-1.6.1-2.1.ppc64le",
"openSUSE Tumbleweed:tealdeer-1.6.1-2.1.s390x",
"openSUSE Tumbleweed:tealdeer-1.6.1-2.1.x86_64",
"openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.aarch64",
"openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.ppc64le",
"openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.s390x",
"openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.x86_64",
"openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.aarch64",
"openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.ppc64le",
"openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.s390x",
"openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.x86_64",
"openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.aarch64",
"openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.ppc64le",
"openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.s390x",
"openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26964",
"url": "https://www.suse.com/security/cve/CVE-2023-26964"
},
{
"category": "external",
"summary": "SUSE Bug 1210339 for CVE-2023-26964",
"url": "https://bugzilla.suse.com/1210339"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:tealdeer-1.6.1-2.1.aarch64",
"openSUSE Tumbleweed:tealdeer-1.6.1-2.1.ppc64le",
"openSUSE Tumbleweed:tealdeer-1.6.1-2.1.s390x",
"openSUSE Tumbleweed:tealdeer-1.6.1-2.1.x86_64",
"openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.aarch64",
"openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.ppc64le",
"openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.s390x",
"openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.x86_64",
"openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.aarch64",
"openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.ppc64le",
"openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.s390x",
"openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.x86_64",
"openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.aarch64",
"openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.ppc64le",
"openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.s390x",
"openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:tealdeer-1.6.1-2.1.aarch64",
"openSUSE Tumbleweed:tealdeer-1.6.1-2.1.ppc64le",
"openSUSE Tumbleweed:tealdeer-1.6.1-2.1.s390x",
"openSUSE Tumbleweed:tealdeer-1.6.1-2.1.x86_64",
"openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.aarch64",
"openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.ppc64le",
"openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.s390x",
"openSUSE Tumbleweed:tealdeer-bash-completion-1.6.1-2.1.x86_64",
"openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.aarch64",
"openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.ppc64le",
"openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.s390x",
"openSUSE Tumbleweed:tealdeer-fish-completion-1.6.1-2.1.x86_64",
"openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.aarch64",
"openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.ppc64le",
"openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.s390x",
"openSUSE Tumbleweed:tealdeer-zsh-completion-1.6.1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-26964"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…