www.suse.com
Open in
urlscan Pro
18.64.119.31
Public Scan
URL:
https://www.suse.com/security/cve/CVE-2023-44821.html
Submission: On November 03 via api from IN — Scanned from DE
Submission: On November 03 via api from IN — Scanned from DE
Form analysis
1 forms found in the DOMhttps://www.suse.com/search/
<form id="searchform" action="https://www.suse.com/search/">
<input type="text" class="search-text" name="s" placeholder="Search">
<button type="submit" class="fa fa-search search-submit" aria-hidden="true"></button>
</form>
Text Content
Exit SUSE Federal > Careers Customer Center Account HI Update Your Account Log Out Login Create an Account Update Your Account English LANGUAGE Choose Your Language Deutsch English Español Français 中文(简体) 日本語 Português (Brasil) EXPLORE See what's happening around the world Polska 대한민국 Shop View Cart Exit SUSE Federal > Shop Careers Federal Solutions Back IT Modernization SAP Solutions AI and Analytics Hybrid Cloud Solutions Nonstop IT Exit Federal Government Products Back BUSINESS-CRITICAL LINUX * SUSE Linux Enterprise Server Run your business-critical apps in any environment * SUSE Linux Enterprise Server for SAP Applications #1 operating system to run SAP workloads * SUSE Manager Infrastructure Management ENTERPRISE CONTAINER MANAGEMENT * Rancher Kubernetes Management * Harvester Hyperconverged Infrastructure * NeuVector Zero Trust Container Security EDGE * K3s Lightweight Kubernetes built for Edge use cases * SUSE Linux Enterprise Micro Ultra-reliable, immutable Linux operating system * SUSE Linux Enterprise Real Time Reduce system latencies & boost response times All Products * Run SAP * SUSE for Public Cloud * Security Solutions Back SOLUTIONS Business-critical Linux Run & secure cloud and on-prem workloads Run SAP Deliver mission-critical SAP solutions Enterprise Container Management Orchestrate cloud-native apps Edge Deploy intelligent devices to the edge SUSE for Public Cloud Accelerate innovation across your clouds Security Secure your digital enterprise INDUSTRIES * Automotive * Telecom * Banking and Financial Services * Healthcare * Manufacturing * Retail * Technology & Software * Federal * Pharma * Energy Support Back SUPPORT Product Support Premium Support Services Dedicated support services from a premium team Long Term Service Support Stay on your existing product version SUSE Liberty Linux Mixed Linux Environment Support Renew Your Support Subscription SERVICES Consulting Services Training & Certification Premium Technical Advisory Services RESOURCES SUSE Support User Guide Patches & Updates Product Documentation Knowledgebase SUSE Customer Center Product Support Life Cycle Licensing Package Hub Community packages for SUSE Linux Enterprise Server Driver Search Support Forums Developer Services Beta Program Security Partners Back PARTNERS Partner Program Find a Partner Become a Partner Login to the SUSE Partner Portal Communities Back COMMUNITIES Community Blog Forum Academic Open Source Projects openSUSE.org SUSE Polska About Back ABOUT About Us Leadership Careers Newsroom Success Stories Investor Relations Social Impact SUSE Logo and Brand Events & Webinars Merchandise Store Communications Preferences Contact Us Free Downloads X CVE-2023-44821 COMMON VULNERABILITIES AND EXPOSURES [Previous] [Index] [Next] UPSTREAM INFORMATION CVE-2023-44821 at MITRE DESCRIPTION ** DISPUTED ** Gifsicle through 1.94, if deployed in a way that allows untrusted input to affect Gif_Realloc calls, might allow a denial of service (memory consumption). NOTE: this has been disputed by multiple parties because the Gifsicle code is not commonly used for unattended operation in which new input arrives for a long-running process, does not ship with functionality to link it into another application as a library, and does not have realistic use cases in which an adversary controls the entire command line. -------------------------------------------------------------------------------- SUSE INFORMATION Overall state of this security issue: Does not affect SUSE products This issue is currently rated as having moderate severity. CVSS v3 Scores National Vulnerability Database Base Score 5.5 Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Attack Vector Local Attack Complexity Low Privileges Required Low User Interaction None Scope Unchanged Confidentiality Impact None Integrity Impact None Availability Impact High CVSSv3 Version 3.1 SUSE Bugzilla entry: 1216077 [RESOLVED / WONTFIX] No SUSE Security Announcements cross referenced. -------------------------------------------------------------------------------- SUSE TIMELINE FOR THIS CVE CVE page created: Tue Oct 10 00:00:03 2023 CVE page last modified: Tue Oct 24 19:34:57 2023 LANGUAGE Choose Your Language Deutsch English Español Français 中文(简体) 日本語 Português (Brasil) EXPLORE See what's happening around the world Polska 대한민국 HI Update Your Account Log Out Login Create an Account Update Your Account * Careers * Legal * Anti-Slavery Statement * Anti-slavery * About * Communications Preferences * Contact Us * Let's Chat * * * Support: Open a Support Case © 2023 SUSE, All Rights Reserved Cookie Settings Privacy and Cookie Policy × Give Us Feedback Got some feedback about the website? Let us know so we can fix it. For support information, please visit Support. Sales: 1-800-796-3700 Support: Open a Support Case CONNECT WITH US Feedback Form We adapt, you succeed. Read Privacy Policy Required Fields* ×