www.suse.com Open in urlscan Pro
18.64.119.31  Public Scan

URL: https://www.suse.com/security/cve/CVE-2023-44821.html
Submission: On November 03 via api from IN — Scanned from DE

Form analysis 1 forms found in the DOM

https://www.suse.com/search/

<form id="searchform" action="https://www.suse.com/search/">
  <input type="text" class="search-text" name="s" placeholder="Search">
  <button type="submit" class="fa fa-search search-submit" aria-hidden="true"></button>
</form>

Text Content

Exit SUSE Federal  >
Careers

Customer Center

Account

HI

Update Your Account Log Out
Login Create an Account Update Your Account

English  

LANGUAGE

Choose Your Language

Deutsch English Español Français 中文(简体) 日本語 Português (Brasil)

EXPLORE

See what's happening around the world

Polska 대한민국



Shop
View Cart
Exit SUSE Federal  >
Shop Careers
Federal Solutions
Back

IT Modernization


SAP Solutions


AI and Analytics


Hybrid Cloud Solutions


Nonstop IT


Exit Federal Government

Products
Back

BUSINESS-CRITICAL LINUX

 * SUSE Linux Enterprise Server
   
   
   Run your business-critical apps in any environment

 * SUSE Linux Enterprise Server for SAP Applications
   
   
   #1 operating system to run SAP workloads

 * SUSE Manager
   
   
   Infrastructure Management

ENTERPRISE CONTAINER MANAGEMENT

 * Rancher
   
   
   Kubernetes Management

 * Harvester
   
   
   Hyperconverged Infrastructure

 * NeuVector
   
   
   Zero Trust Container Security

EDGE

 * K3s
   
   
   Lightweight Kubernetes built for Edge use cases

 * SUSE Linux Enterprise Micro
   
   
   Ultra-reliable, immutable Linux operating system

 * SUSE Linux Enterprise Real Time
   
   
   Reduce system latencies & boost response times

All Products
 * Run SAP
 * SUSE for Public Cloud
 * Security

Solutions
Back

SOLUTIONS

Business-critical Linux

Run & secure cloud and on-prem workloads

Run SAP

Deliver mission-critical SAP solutions

Enterprise Container Management

Orchestrate cloud-native apps

Edge

Deploy intelligent devices to the edge

SUSE for Public Cloud

Accelerate innovation across your clouds

Security

Secure your digital enterprise

INDUSTRIES

 * Automotive
 * Telecom
 * Banking and Financial Services
 * Healthcare
 * Manufacturing
 * Retail
 * Technology & Software
 * Federal
 * Pharma
 * Energy

Support
Back

SUPPORT

Product Support
Premium Support Services

Dedicated support services from a premium team


Long Term Service Support

Stay on your existing product version


SUSE Liberty Linux

Mixed Linux Environment Support


Renew Your Support Subscription


SERVICES

Consulting Services
Training & Certification
Premium Technical Advisory Services


RESOURCES

SUSE Support User Guide
Patches & Updates
Product Documentation
Knowledgebase
SUSE Customer Center
Product Support Life Cycle
Licensing
Package Hub

Community packages for SUSE Linux Enterprise Server


Driver Search
Support Forums
Developer Services
Beta Program
Security

Partners
Back

PARTNERS

Partner Program


Find a Partner


Become a Partner


Login to the SUSE Partner Portal

Communities
Back

COMMUNITIES

Community


Blog


Forum


Academic


Open Source Projects


openSUSE.org



SUSE Polska

About
Back

ABOUT

About Us


Leadership


Careers


Newsroom


Success Stories


Investor Relations


Social Impact


SUSE Logo and Brand


Events & Webinars


Merchandise Store


Communications Preferences

Contact Us

Free Downloads
 
 
 
 
X




CVE-2023-44821


COMMON VULNERABILITIES AND EXPOSURES

[Previous] [Index] [Next]


UPSTREAM INFORMATION

CVE-2023-44821 at MITRE

DESCRIPTION

** DISPUTED ** Gifsicle through 1.94, if deployed in a way that allows untrusted
input to affect Gif_Realloc calls, might allow a denial of service (memory
consumption). NOTE: this has been disputed by multiple parties because the
Gifsicle code is not commonly used for unattended operation in which new input
arrives for a long-running process, does not ship with functionality to link it
into another application as a library, and does not have realistic use cases in
which an adversary controls the entire command line.

--------------------------------------------------------------------------------


SUSE INFORMATION

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v3 Scores   National Vulnerability Database Base Score 5.5 Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Attack Vector Local Attack
Complexity Low Privileges Required Low User Interaction None Scope Unchanged
Confidentiality Impact None Integrity Impact None Availability Impact High
CVSSv3 Version 3.1

SUSE Bugzilla entry: 1216077 [RESOLVED / WONTFIX]

No SUSE Security Announcements cross referenced.



--------------------------------------------------------------------------------


SUSE TIMELINE FOR THIS CVE

CVE page created: Tue Oct 10 00:00:03 2023
CVE page last modified: Tue Oct 24 19:34:57 2023



LANGUAGE

Choose Your Language

Deutsch English Español Français 中文(简体) 日本語 Português (Brasil)

EXPLORE

See what's happening around the world

Polska 대한민국

HI

Update Your Account Log Out
Login Create an Account Update Your Account
 * Careers
 * Legal
 * Anti-Slavery Statement
 * Anti-slavery
 * About
 * Communications Preferences
 * Contact Us
 * Let's Chat

 * 
 * 
 * 


Support: Open a Support Case
© 2023 SUSE, All Rights Reserved Cookie Settings Privacy and Cookie Policy


×

Give Us Feedback

Got some feedback about the website? Let us know so we can fix it.





For support information, please visit Support.

Sales:
1-800-796-3700
Support:
Open a Support Case

CONNECT WITH US



Feedback Form

We adapt, you succeed.


Read Privacy Policy
Required Fields*
×